Leaders in
blockchain-based data certification

We leverage blockchain technology to ensure the existence, integrity and attribution of communications, processes and data important for your organization.


Ultimate Security

No more need for trust in insiders or third parties. We replace trust with mathematical proof.

Total Accountability

For the first time in human history, an immutable layer of transparency removes friction from your auditing process.

Strong Attribution

Track any action to its source, securely and transparently, in a way which can be seamlessly and independently audited.

Better Digital Evidence

Blockchain-based hashing and time stamping make for exceedingly strong evidence of the authenticity of a document.

Forensic Auditability

All evidence and audit trails generated by lirax.org are 100% counterfeit-proof and verifiable by independent third parties.

Infinite scalability

Thanks to our technology, we can stamp up to exabytes of data and embed it on our blockchain. We also have a public API.

Welcome to a new world of opportunities

Our API provides all you need to build tons of applications and businesses in a way that was never possible before.

  • Document management
  • Systems security
  • Internet of things
  • Critical infrastructure
  • Provenance

Demonable document management

Integrate the document management solution with the Lirax.org API and take advantage of the unique power of blockchain technology.

  • Create tamper-proof records of the existence and integrity of your organization’s documents, files and business processes.
  • Protect the paternity and ownership of your creations and IP.
  • Verify the authenticity of signed documents and communications.
  • Generate immutable control tracks that keep track of all the changes that occur in a document.

Data integrity: a change of paradigm

Data integrity monitoring tools such as Lirax.org API are defining a completely new approach to system security. Instead of sitting out of monitored systems and trying to block attacks, these tools reside within them and are able to monitor, report and respond to every change that happens to critical files and registries. This is a huge paradigm shift: now you can prevent, detect and act on any kind of attack on your systems, coming from the outside or from within your organization.

Build the Internet of reliable things

In a world where the number of connected devices is growing so fast, maintaining their security and protecting us from attack is a big challenge. Public blockchains provide an immutable and decentralized ledger where data sets from such devices can be anchored to authenticate their legitimacy. With the Lirax.org APIs, the same IoT devices can even certify their own firmware and then prove their integrity to their peers, thus avoiding node hijacking or representation within mesh networks.

Critical infrastructure is now the land of blockchain

The unparalleled level of security and security offered by public blockchains is perfect for critical infrastructures and other scenarios where there is a lot at stake. In the last decades, with the obsolete transformation of the old Scada systems, Information Technology systems and protocols have gained ground for operational technology, introducing huge challenges in their security. With this in mind, the Lirax industrial certification API has been designed with the same availability, integrity, and confidentiality priorities common to all critical infrastructure systems.

The history of a product, registered forever

Materials, raw materials and products have a history behind them, and those stories are sometimes of fundamental importance for their market value. Eco-friendly soy beans, diamonds, pieces of art. You will now be able to demonstrate their origin and integrity at every stage of the supply chain without any possibility of tampering. The API of Lirax.org allows you to adopt the exceptional characteristics of traceability, transparency and certainty that characterize the public blockchain and to apply them to demonstrate the provenance and ensure quality like never before.

A new security paradigm

Certify and authenticate any kind of data without relying on trusted third parties

  • Proof of Ownership

    Attribution and audit trails that can be independently verified

  • Proof of Existence

    Certify that a file, dataset or communication existed at a certain point in time

  • Proof of Integrity

    Monitor your data in real time to ensure it has not been tampered with

  • Proof of Receipt

    Certify that a specific recipient read your email at a certain point in time

Generate immutable and independently verifiable records of everything
that is important to your business

Lirax.org API

Connect your application to the Lirax blockchain using our unique underlying technology.

Crypto Sign

The smartest platform for seamless data certification is now in your hands. No limits, for free.


Be in control of your data. Reach in real-time to potentially unwanted manipulation of your files and logs.

Build immutable audit trails

Generate an immutable and independently record of all the activity in your document management system or in your whole organization

  • Accountability

    No more need of trust in insiders or third parties. We replace trust with mathematical proof

  • Auditability

    For the first time in human history, an immutable layer of transparency removes friction from your auditing needs

  • Attribution

    Secure your data and mitigate risks with mathematical attribution that cannot be tampered with

Enterprise Security

Current security solutions are based on archaic fences. Companies advertise their complicated perimetral security systems as if they were impenetrable. On the other hand consider that everyday we hear about cyber security breaches at even the largest corporations. More so, you are not at all protected for internal breaches and insider threats.

Using our proprietary technology, we can embed unlimited data on the blockchain, having the certainty that such information will not be tampered with in the future. In this way it is possible to establish irrefutable real-time proof of integrity of your entire filesystems.

Lirax Blockchain Features

  • Infinitely scalable

    Bundling transactions makes it possible for us to overcome the limits of public blockchain technology. Furthermore, thanks to the cryptographic structures we use, all the stamped data can be individually and indepentendly verified.

  • Privacy respectful

    We never publish raw data or plain text to a public blockchain: We use unique cryptographic identifiers (hashes) in order not to reveal the original data. Since hashes are one-way cryptographic algorithms, you can still prove that a determinate hash relates to your data, but nobody will ever be able to obtain your data by only having its hash.

  • Independently verifiable

    Since we use public blockchains accessible by anyone in the world at zero cost, everything is transparent and extremely easy to verify while maintaining absolute privacy. The cryptographic proofs that we generate are everything you or anyone needs to prove or verify that a given dataset existed at a certain point in time.

  • Machine friendly

    Trust is a human creation. Machines don’t know about trust. With Lirax Blockchian, the verification of the cryptographic proofs can be done in an automatic way, enabling secure machine to machine (M2M) transactions in a world in which Internet of Things is already a thing.

Legal Validity

Digital signatures and authentication are legally equivalent to handwritten signatures and face-to-face identification in Estonia and between partners upon agreement anywhere around the world.

Recent changes in EU law mean that within the next few years Estonian e-residents will be able to easily identify themselves, access online services, and conduct business across Europe. The e-Resident ID card and services are built on state-of-the-art technological solutions, including 2048-bit public key encryption.

The smart ID card contains a microchip with two security certificates: one for authentication, called PIN1, and another for digital signing, called PIN2. PIN1 is a minimum 4-digit number used for authorization, and PIN2 is a minimum 5-digit number for digital signing. 

Insider Threat Mitigation

As we further use services to collaborate – as individuals – or integrate external networks that do not allow enterprises to fully control data endpoints, the risk of insider threats increases. We are more susceptible to insiders using their accesses to tamper with information. At Lirax.org we aim to mitigate this risk with our proprietary technology.

The database we use is secured by a network of thousands of computers distributed around the world. Each computer commits its computational power to make the database immutable and secure. We use cryptographic algorithms to register the unique identifier of each piece of information. If this information has been tampered with, a set of instructions can follow and policies previously configured can be triggered, such as alerting a human of the suspected behaviour, or to automatically revert to the previous clean status.

Critical Infrastructure Protection

Critical infrastructure protection is becoming absolutely necessary as even more digital threats endanger companies everyday.
There is no single software stack that is safe from data tampering. 

We are able to track the state of entire filesystems, servers or networks, so you always know if an attacker gets in, and you can take the necessary preventive measures to minimize damage or to safeguard the penetrated systems. You can check Lirax API 

Tommaso Bianchi

Partner @ Consorzio Fibonacci A.

I believe that blockchain technology can be a powerful evidentiary tool

Blockchain technology like lirax.org can change the way that companies think about their middle-and back office. Today, they can be centers for liability and risk. Errant employees, misapplied retention policies, and even just the simple passage of time can corrupt business records. The Blockchain can ensure that changes in state are tracked, recorded and sometimes even prevented. From the perspectives of investigation and e-discovery, this can be a powerful evidentiary tool.