EN | RU
The evidentiary substrate

The investigation record no one can silently erase or rewrite — including us.

Symphoria is a cryptographically anchored record of investigations, a substrate for journalists, prosecutors, inspectors, civic investigators, and anyone whose work depends on a memory that cannot be revised. Every significant event in every investigation conducted on the platform is given a SHA‑256 fingerprint, signed with an Ed25519 key whose public counterpart we publish, and entered into a chain whose head is anchored, every hour, to the Bitcoin blockchain. Once inscribed, the entry is as permanent as the network that carries it. No state, no platform, no future owner of Symphoria, and no party acting under legal process over our servers can silently revise what the record says.

The infrastructure we are building is the one the press, the prosecutor's office, the inspector general, the librarian, and the historian all once assumed was there. The platforms have repealed that assumption, by deletion, by suppression, by the quiet de‑listing of pages from the archives, by the poisoning of the models that index them. We are putting the floor back under work that has been left to stand on nothing.

Backgrounds and partnerships from
NASA Purdue University Central Intelligence Agency
The Fifth Escape Velocity

Why institutions can't
keep up anymore

Three forces outpace every oversight body built before 2010. Courts take years. Journalism takes weeks. Corporate fraud takes hours. By the time institutions respond, the evidence has been deleted.

Manipulation runs at machine speed.

By the time courts rule on Cambridge Analytica, TikTok weaponizes the same techniques at 100x scale. The Pravda network infected 10 leading AI tools with 3.6M propaganda pieces. Anthropic's own research finds that as few as 250 malicious documents can backdoor a large language model, the floor of an attack is no longer a percentage of training data, but a small file.

Evidence disappears faster than it gets reviewed.

Meta suppressed 1,050+ posts about Palestine in late 2023. YouTube erased 700 videos of human rights violations overnight. Thousands of Syria war-crimes videos auto-deleted since 2017. The Wayback Machine is being blocked.

Investigators work in days; manipulation works in seconds.

Traditional institutions were designed when evidence was scarce, records durable, manipulation expensive. Now deletion is free, AI synthesis is instant, and change is exponential.

What We Find

Black Swan Data

Information that is rare. High-impact, dramatically changes valuation or risk assessment. Non-obvious in real-time, hidden in noise, contradictions, or deleted sources. The first actor to find it captures outsized returns; everyone who finds it later gets commoditized information.

Undisclosed Relationships

CEO's undisclosed conflict of interest that emerges only when you cross-reference deleted LinkedIn profiles with shell company registrations across jurisdictions.

Deleted Evidence

Regulatory violations in foreign subsidiaries, local reporting existed but was suppressed. Web archives show deleted government notices that standard DD misses.

Jurisdictional Arbitrage

Same entity reports different numbers in EU filings vs US filings, different accounting standards, discoverable only by cross-referencing regulatory databases in multiple languages.

Narrative Evolution

Founder's history at previous startup shows evidence of fraud in archived forum posts, deleted news articles, and contradictory SEC filings, current background checks miss it.

What the platform actually does

Most systems treat claims as true or false, consistent or contradictory. Reality is directional, the same claim can be true in one jurisdiction, false in another; consistent at T₁, contradictory at T₂.

Catches contradictions across documents, time, and witnesses.

Logical: Claim A directly negates Claim B. Temporal: Source changed their story between T₁ and T₂. Jurisdictional: Different numbers in different regulatory filings. Federative: Human sources say X, AI-amplified sources say Y.

Every piece of evidence, sealed and timestamped.

Every piece of intelligence is cryptographically anchored with source, timestamp, and content hash. When a webpage disappears, when a profile is scrubbed, when a filing is amended, you have the original with proof it existed at time T.

Traces every claim back to its source.

Track how claims flow through agent federations, networks of human and AI actors. See who amplified it, who suppressed it, which AI models have it in their training data, what RLHF preferences shaped outputs.

Resolves the same person across hundreds of data sources.

Same person, company, or asset appears differently across jurisdictions and languages. We resolve identities, enrich with corporate data (employees, revenue, organizational structure), and flag shell companies, undisclosed beneficial owners, and sanctioned entities.

AI agents that
work alongside you

Ask questions in plain English.

Symphoria’s chat interface offers an intuitive, interactive experience for legal professionals, powered by agentic workflows. Each hypothesis is managed by a dedicated Case Manager agent, ensuring seamless case management and thorough, focused investigations

All your evidence, one query away.

Case Managers perform advanced data analysis to uncover patterns and insights, while also providing interactive visualizations and mapping of relevant nodes and relationships to enhance understanding and support informed decisions.

Search across cases, sources, jurisdictions.

Case Managers search and integrate data from databases and the web automatically and on request, continuously updating and refining hypotheses with the latest and most relevant information to enhance the depth and accuracy of investigations.

How findings become reports

Symphoria turns verified evidence into a defensible narrative, not just what happened, but a coherent story of how, when, and why that can withstand scrutiny in court, boardroom, or regulatory hearing.

Try It Yourself

Flags what matters first.

Agents deeply analyze materials flagged as highly suspicious, using context-driven insights to piece together critical information. This process identifies patterns and connections that may indicate illegal activity or contractual breaches

Builds the story from the evidence.

Materials are reviewed in various orders to uncover hidden narratives and connections that may not be evident in a linear review. Agents then construct a working narrative, forming a hypothesis that ties together all identified elements into a cohesive story, aiding in legal preparation

Updates as new evidence arrives, pushed straight to your Telegram.

As new evidence lands, agents refine the hypothesis in place, keeping the narrative current as the case evolves. Subscribe an investigation to Telegram and the same updates reach you on your phone the moment they happen, without opening the app.

One-click court-ready reports.

Additional information ingested through chat or any other data source is automatically analyzed and reflected in case reports. You can also edit and format these reports in the desired format (EDD, SAR, 8300 and etc.)

One-click court-ready reports.

Report generation is significantly faster than other solutions, using parallelization to produce up to 26 reports simultaneously. You can also edit these reports at any time for greater flexibility.

Suggests what to investigate next.

Automatically generate AI-driven task lists and case notes, streamlining your workflow by capturing key details and organizing them for easy reference and action.

Drafts document requests that get answers.

Easily create document requests with pre-defined AI queries, allow clients to securely upload files, review the results, and approve or download the final documents once everything meets your requirements.

At the Center

You stay
in control

Symphoria works for you, not instead of you.

Whether you're a journalist, activist, researcher, citizen, or analyst, the platform gives you capabilities that were once reserved for intelligence agencies and elite consulting firms.

The AI surfaces contradictions at machine speed. You decide what they mean. The conclusions are always yours.

"Every citizen should have the investigative power to challenge any claim by any authority. It's the premise of democracy."

Your judgment, faster.

You bring the context, what matters in your community, your industry, your beat. The platform brings the data, the contradictions, and the temporal evidence you couldn't find alone.

You decide what's true.

We surface contradictions. We don't decide what's true. Not everything that can be revealed should be revealed the same way, that judgment belongs to you.

Learn from every shared case.

When a journalist in Kyiv and a researcher in São Paulo share similar patterns, the platform learns. Civic intelligence brings together civil justice.

The people who keep the record

Alisher Sultansikhov

CO-FOUNDER

Co-founded Socrash, first batch of funded startups out of the Purdue Anvil; acquired by Black Ice AI. Led research and development on anti–human-trafficking, e-discovery, litigation support, and illicit-finance investigation. Trained at Purdue under Dr. Avinash Kak. PhD candidate researching online reinforcement-learning agents built on vision and language models. Has built decision-support frameworks for defense applications and a federated-learning framework for privacy-preserving transformer training.

Scott Uehlinger

CO-FOUNDER, SPECIAL PROJECTS

Twenty years of senior operational experience at the Central Intelligence Agency. Head of the Iraqi Task Force. The President's Senior Intelligence Officer in high-risk countries. Retired as Chief of Post-Soviet Station. Retired US Navy Commander. Former NYU professor; 2018 candidate for the US Congress. Speaks on national security on FOX, The Hill, and other outlets.

Avinash C. Kak

ADVISOR, COMPUTER VISION, AI

Leading expert in computer vision, image processing, and AI. Professor at Purdue University; co-author of the influential book "Digital Picture Processing." His work spans robotics, medical imaging, and security systems, including a decades‑long research collaboration with IARPA, the U.S. intelligence community's advanced research arm. As head of a thriving lab at Purdue, he has guided 55 PhD students over 35 years, many of whom have gone on to lead projects at Apple, Amazon, and Salesforce.

Beyond the people · OpenTimestamps

Even we can't change the record.

Every claim is timestamped by three independent witnesses, Bitcoin and two OpenTimestamps calendar servers. None of them ever sees your evidence; only a cryptographic hash. Click a disc to identify a witness.

Click any disc to identify the witness

Who Uses Symphoria

We sell to institutions that need decision-grade intelligence, where the cost of missing Black Swan Data exceeds the cost of finding it by orders of magnitude.

Private Equity

"We find the contradictions that kill deals before you sign." Surface undisclosed related-party transactions, conflicting vendor relationships, and beneficial ownership anomalies across jurisdictions.

Example Black Swan:

CFO has shell company that's a major supplier, visible only by cross-referencing corporate registrations + deleted LinkedIn + contradictory vendor disclosures.

Starting at
$30K-$50K/deal

Hedge Funds

"Generate alpha from contradictions Bloomberg misses." Detect earnings manipulation via jurisdictional arbitrage, deleted forward guidance, and insider trading signals in provenance graphs.

Example Black Swan:

Company reports $100M revenue in US filings, $80M in EU filings, different accounting standards. Contradiction discoverable by cross-referencing regulatory databases.

Data feed
$500K-$2M/year

Venture Capital

"PE-grade due diligence at VC speed and cost." Detect founder misrepresentation, competitive intelligence blindness, and IP landmines, without slowing deal velocity.

Example Black Swan:

Founder claims "successful exit", evidence in deleted Medium posts, contradictory LinkedIn versions, and archived HN threads shows they were fired before acquisition.

Per company
$5K-$10K

Investigative Journalism

"Verify sources, track narrative evolution, recover deleted evidence." Cryptographic proof that claims existed at specific times, immune to retroactive editing or denial.

Example Black Swan:

Official claims they never made statement, temporal anchoring proves statement existed on website March 15-April 3, then was deleted. Cryptographic proof of edit history.

Nonprofit/academic rates
Available
Open Platform

Free for civic investigators.
Paid for institutions.

Investigation infrastructure shouldn't be reserved for those who can afford $30K per deal. Start for free. Scale when you're ready.

Monthly
Annual Save 20%

Free

Free

$5 on sign up

Get Started

Includes:

  • $5 on sign up
  • Full platform access
  • AI investigation engine
  • Graph visualization
  • Community support

Starter

$12/mo

$144/year · Save 20%

600 credits/month

Subscribe

Includes:

  • 600 credits/month
  • Everything in Free
  • Credit top-ups available
  • Email support
  • Export to PDF
Most Popular

Professional

$55/mo

$660/year · Save 20%

2,200 credits/month

Subscribe

Includes:

  • 2,200 credits/month
  • Everything in Starter
  • 500 credit rollover
  • Priority support
  • Advanced analytics

Institution

$143/mo

$1,716/year · Save 20%

6,500 credits/month

Subscribe

Includes:

  • 6,500 credits/month
  • Everything in Professional
  • 2,000 credit rollover
  • Dedicated support
  • Custom integrations
  • Team collaboration

Need enterprise-grade deployment or custom integrations? Contact us.

Scenario: $30M saved on a $200M acquisition after Symphoria catches a redefined retention metric.

Pre-acquisition due diligence on a $200M SaaS target. Standard analysis looks clean: strong growth metrics, favorable press, clean audits. Your Intelligence Advisor initiates investigation.

Week 2

Multi-Dimensional Contradiction Detection

  • Current investor deck claims 98% customer retention
  • SEC filing from 18 months ago disclosed 89% retention
  • LinkedIn shows 40% of customer success team departed in same period
  • Federative analysis: AI summaries perpetuate outdated 98% figure from cached training data
Week 3

Cryptographic Preservation + Provenance

  • Retention metric was redefined to exclude "inactive accounts"
  • Major customers quietly non-renewed, verified via archived case studies that have since been removed
  • Customer success departures correlate with the non-renewals
  • Intelligence Advisor flags: definition change occurred 3 days after board meeting
Result: Renegotiate based on accurate retention data
$30M saved

Scenario: A local journalist links a $17M contract escalation to a council member in 5 days.

A local journalist investigates a city government's $45M infrastructure contract after residents report deteriorating roads despite record spending. Official reports show the project is on-track and within budget.

Day 3

Multi-Dimensional Contradiction Detection

  • City council minutes from 2024 reference contractor bid of $28M
  • Current budget reports show approved amount of $45M, a 60% increase with no public hearing
  • Contractor's state registration shows same address as council member's property LLC
  • Federative analysis: Local news articles about the bid discrepancy were deleted from two outlets
Day 5

Cryptographic Preservation + Provenance

  • Archived version of city website shows original $28M bid, page has since been replaced with the $45M figure
  • Council member's financial disclosure from 2023 lists no connection to contractor, but archived LinkedIn shows advisory role
  • Temporal graph reveals: budget amendment, disclosure update, and news deletion all occurred within a 72-hour window
  • Pattern matches two similar contract escalations in neighboring counties involving the same contractor
Result: Evidence package published. State attorney general opens investigation.
Democracy in action
The Compounding Advantage

Why Symphoria Gets Better
While You Sleep

Most investigation tools treat each case as isolated. Symphoria treats every investigation as training data for collective intelligence. The moat isn't data, it's learning loops.

A model trained only on what you authorize.

Investigation-specific model trained on real due diligence workflows, not general internet text. Verifiable reasoning. Like Cursor for developers, but for investigators.

Learn from the network without sharing your data. (Opt-In)

Every investigation you run makes the model smarter for your organization. The platform learns your patterns, your domains, your risk signals. Opt in to share learnings across organizations for B2B2B syndicate intelligence, without sharing your data. Your data stays yours.

Trade enriched intelligence on a controlled market.

PE firms investigate portfolio companies. Law firms run due diligence. Hedge funds analyze earnings. Every investigation strengthens the network. Patterns emerge that no single firm would see alone.

"The best investigation tool is one that learns from every investigation ever run, without compromising anyone's confidentiality."

Your Data Never Leaves Your Control

Choose the deployment model that matches your security requirements. For the most sensitive operations, run Symphoria entirely within your own infrastructure.

Cloud Platform

Secure, SOC 2 compliant infrastructure with enterprise-grade encryption. Ideal for rapid deployment and automatic updates.

  • End-to-end encryption at rest and in transit
  • Automatic model updates and improvements
  • 99.9% uptime SLA
  • Real-time evidence preservation
  • Standard API access

Why on-premise matters: If the substrate problem includes AI poisoning at scale, relying solely on external AI providers reintroduces the vulnerability you're trying to escape. On-premise SLMs let you verify the model itself.

The Reference Frame

Where Symphoria sits in your AI stack

Intelligence requires State. Without a shared, immutable reference frame, autonomous agents are just hallucinations moving at the speed of light.

Layer 3

AGENTS

Actuators / Dynamic Will, Trading bots, research agents, autonomous systems that execute decisions

Layer 2

MODELS

Intelligence / Static Potential, LLMs, foundation models that reason and predict

Layer 1, The Anchor

SYMPHORIA

State / The Reference Frame, Cryptographically anchored evidence that grounds agents in reality

symphoria_verify.py API v1.4
import symphoria as sym

# Agent attempts to act on an earnings claim
claim = "Q3 Revenue: $100M"
source = "company-ir.com/filing.pdf"

# Due-diligence call
result = sym.provenance.verify(source, claim)

if result.contradiction:
 # Black Swan detected. EU filing shows $80M.
 agent.abort()
else:
 # State verified. Safe to execute.
 agent.execute()

The Loop Breaker. Your agents act in milliseconds. They don't have time to read 10 years of archives. Symphoria returns decision-grade provenance in 120ms.

What We Believe

"Those that changed themselves, changed the world."

I

Memory before metrics. The internet now pays attention in clicks, tokens, and agent calls, but truth still depends on memory. Metrics are negotiable; a cryptographically anchored past is not.

II

Evidence must outlive platforms. When the same systems that host public discourse also erase it, democracy, markets, and law become rituals on top of disappearing ledgers.

III

Agents deserve accountable inputs. AI assistants and autonomous agents already act on our data. Without a preserved evidentiary layer, they operationalize propaganda as if it were fact. Symphoria exists so that agents, like humans, can be held to what actually happened.

IV

Human judgment sets the constitution. AI can sift and flag at machine speed, but only Intelligence Advisors can decide what a contradiction means in law, risk, or ethics. The AI makes Advisors superhuman; Advisors make the AI constitutional.

V

We surface contradictions for a multi-traffic web. In a world of human browsing, AI citations, and agent actions, the same claim can be true in a PR deck, false in a regulatory filing, and weaponized in model outputs. We fix a timeline of what was said, where, and how it changed.

VI

The Fifth Estate is memory infrastructure. The press was built for scarcity of information. The Fifth Estate is built for scarcity of trustworthy memory: a federated, cryptographically anchored layer that both humans and AI can query without asking any single platform for permission.

Every democracy rests on three capacities: representation, adjudication, and information. The press, the Fourth Estate, was built for an era of scarcity. Today's environment requires something new: the Fifth Estate, infrastructure that secures the evidentiary foundations upon which democratic judgment depends.

Hard Questions

We answer the difficult questions about what we're building and why it matters.

"If a court orders you to remove a record, what happens?"

The content on our servers can be removed. The cryptographic anchors on Bitcoin cannot, not by us, not by the court, not by any successor to either. So if one still holds the copy, the fact of the investigation can't be refuted.

"How do you stop someone from inscribing fabricated evidence?"

The chain does three things at once: it records what was claimed, who claimed it, and what they cited in claiming it. Every entry on the ledger carries the cryptographic signature of the investigator who entered it and the fingerprint of the source they drew from, a document, a testimony, a photograph, a filing. The reader can see, at minimum, who said what was so, and what they relied on in saying it.

Truth-of-claim, whether the document tells the truth, whether the witness can be believed, remains the reader's work, as it has always been with any record. What the chain restores is the historian's minimum: a known author, a known source, and a date that cannot be moved.

"What kind of company is this?"

A small one. Founded in 2024 by veterans of intelligence work and academic research in agent systems, in answer to a condition our generation has not yet named clearly: that the institutions on whose record the public's life depended have, one after another, stopped keeping one.

The press has been killed in numbers exceeding every prior conflict combined. Archives have been dissolved by court order in the country with the oldest tradition of resisting such things. Two hundred and forty-one news organizations are actively blocking archival mechanisms. We are building AI systems that can be manipulated to recursively misrepresent reality, and we increasingly rely on them as the ultimate source of knowledge. Some fifty million human beings are at any given moment held in forced labor or forced marriage, the majority of them children, the majority of them entered into no register because none was ever built. Law enforcement is occasionally subjugated to working against its own original ethos.

We sell a paid platform to investigators, journalists, prosecutors, civic researchers, due-diligence firms, and we use the revenue to keep open an evidentiary substrate of the corruption or civic harms that no one else, at this moment, is keeping open.

"How is this different from Palantir?"

Palantir is the instrument by which the institutions of state and capital see further into the lives of their subjects. Symphoria is the instrument by which the subject can see, and keep seeing, what those institutions did. The direction of the asymmetry is reversed. Palantir does not publish what it ingests; we publish what we record, by definition, into a decentralized chain we do not control. Whether the substitution is sufficient is for the reader to judge, but the parties served by the two systems are not the same parties.

Where the subject's privacy interests are real, we are bound by the same laws of evidence, the same prohibitions, the same standards of justification as any institution that traffics in the names of human beings. The chain does not exempt us from those duties. It holds us to them, since the record of what we did is itself on the chain.

"Why distribute this rather than centralize it under better institutions?"

The twentieth century turned in large part on the question of centralized versus distributed economic planning, and the case for the latter, that free agents holding local knowledge, with the right to acquire and dispose, produce better aggregate outcomes than any central planner, was, by the century's end, demonstrated by history. Whatever one's politics, the epistemic lesson held: distributed systems are better than centralized ones at solving problems no single mind can hold in full.

The question now before us is whether the same logic applies to justice, to intelligence, and to the public's adjudication of what is so. The centralized institutions on which we have relied for those functions, state archives, the official press, intelligence services answering to one capital, have not produced a record durable enough to support the judgments a free people must make. We are building the wager that the same answer works again: that a community's ability to find the truth, matched to the state's through open-source technologies any reader can audit and any peer can run, produces a better civilization than any single authority's monopoly on it.

The freedom and proprietorship that distinguished the economic argument apply with equal force to the epistemic one. The single authoritative archive failed because it was single.

"The world does not lack records. It lacks people willing to act on them. Why is more memory the answer?"

The objection is true and unanswerable as stated. What we are building is not a substitute for action; it is a substrate beneath it. In the five years from 2020 to 2025, more journalists have been killed than in the two-decade span CPJ documented for the Iraq and Afghanistan wars combined. The Gaza war alone, since October 2023, has killed more journalists than any other conflict in CPJ's history — over 260, the majority Palestinian. Some left behind testimony their employers later muted, archives the platforms later pruned. Their work was not failed by their unwillingness to act. It was failed by the disappearance of what they had already produced.

The record is not the labor of the witness; it is the condition under which the witness's labor remains useful after the witness is gone. To say "we lack the will to act" and "we lack the records to act on" are answers to different questions. Both are true. We are responding to the second because we are equipped to.

"A permanent record can be used against the people it was meant to serve. Who is protected from your own ledger?"

Every register has been used both ways, and ours will be no exception. The Dutch civil registry, which had recorded the religion of its citizens for centuries with no malign purpose, became the instrument by which the occupying force in 1940 located the country's Jews. The genealogical records of Rwanda became kill lists in 1994. We have read these histories.

Our answer is not to refuse memory, which would foreclose the instrument's use for good, but to design the chain so that allies can verify the signature of the originating party, and verify the truth only if they also hold the copy. Adversaries can see the hash chain on Bitcoin, but without the original copy it is impossible to decode it into meaningful information. We are building a chain of verification and a network for operational security.

"You've named yourselves veterans of intelligence work. What makes that a qualification rather than a disqualification?"

Most of what the public remembers about the work of intelligence is what was done in its name to civilians abroad, and a substantial part of that memory is fair. The American services in particular have, by their own internal accounts, presided over more civilian killing than any other set of institutions in the last century. We did not invent that record and we do not justify it.

What we know from inside that world is what it looks like when a record is created the public will never see; what it looks like when a record is destroyed because its contents would change the public's mind about an action taken in their name; what the operational conditions are under which a small group convinces itself the world is better off if certain things are not written down. That knowledge is what the work of Symphoria refuses.

Whether it makes us trustworthy or untrustworthy is the reader's to decide; whether the work itself is necessary does not depend on us.

"Why do you think this won't become what it was built against?"

Because the design refuses what the design refuses. Memorial was a small group with an archive, and the archive could be closed because it sat on premises a court could enter. WikiLeaks was a small group with files, and the files could be hounded because they passed through servers whose providers could be pressured. The ledger we are keeping has neither of those weaknesses by construction, not by promise.

The hash of every record is published into a network operated by no one and verified by everyone; the keys that signed each entry are public; the chain head, once anchored, is as durable as the network that carries it. If our team is shut down tomorrow, if our domains are seized, our servers locked, our directors prosecuted, the entries on Bitcoin remain readable to anyone who has a copy of the bundle, and the work can be resumed by anyone with the will to resume it.

The answer is not "trust us." The answer is "we have made ourselves removable in advance, and the record will outlive our removal."

Roadmap

From profitable product to essential protocol. Building revenue first, then opening the infrastructure.

Now
Phase 1

Product

Build revenue through Black Swan Data services. PE/VC due diligence, hedge fund intelligence feeds, investigative journalism support.

  • Per-deal and subscription pricing
  • Intelligence Advisors as core team
  • Cloud + on-premise deployment
  • Rapid customer feedback loops
2026-2027
Phase 2

Protocol

Open the evidence layer. Allow third parties to contribute preservation nodes, run their own Intelligence Advisors, access shared provenance.

  • Federated preservation network
  • Open provenance graph API
  • Third-party Intelligence Advisors
  • Cross-institutional verification
2028+
Phase 3

Constitutional

Achieve institutional legitimacy as epistemic infrastructure. The Fifth Estate becomes as essential as courts or journalism.

  • Legal evidentiary standards
  • Multi-stakeholder governance
  • Cross-jurisdictional immunity
  • Democratic memory infrastructure

"We're not building a company that might become infrastructure. We're building infrastructure that starts as a company, because that's the path that can achieve escape velocity."

Beyond corporate use

We start where the pain is acute and the value measurable. But the infrastructure we're building serves any institution that depends on truth.

Journalism

Source verification. Evidence recovery. Stories that can't be silenced.

Legal

Evidentiary standards for a digital age. Chains of custody that hold.

Democratic Memory

Records that outlive those who would erase them.

Start Investigating. For Free.

$5 on sign up. Full platform access. No credit card required. Join the civic intelligence movement.

Enter Symphoria

Enterprise or institutional inquiry?

Under Construction