Can you trust that
research paper?
In a world of deepfakes, AI-generated content, and rampant misinformation, how do you know what you are reading is real? Diogenes gives you the tools to trace any document back to its source and evaluate trust based on your own network -- not a faceless authority.
You Can No Longer Trust
What You Read Online
Every day, documents are forged, images are manipulated, and AI generates content indistinguishable from human writing. The infrastructure of the internet was built for connectivity -- not for trust. When a PDF arrives in your inbox, a research paper appears in your feed, or an AI assistant cites a source, there is no built-in way to answer the fundamental question: is this real, and who stands behind it?
-
Documents can be silently altered after signing -- no one would know. -
Authorship claims are trivial to forge without cryptographic proof. -
Centralized trust authorities create single points of failure and control. -
AI-generated content lacks any provenance trail back to verifiable sources.
Understand the Source. Evaluate Trust in Context.
Diogenes does not tell you what to trust. Instead, it gives you the cryptographic tools to trace content back to its origin and evaluate trustworthiness based on your own relationships and standards.
Trace the Source
Every signed document carries a full provenance chain -- from the original author through every reviewer, editor, and publisher who touched it. You can see exactly who stands behind the content.
Trust Your Network
Trust is subjective. Diogenes lets you define who you trust and how much. Evaluate a signer's credibility through your own endorsement network -- not a certificate authority you have never heard of.
Prove When It Existed
Every attestation is timestamped via Bitcoin, providing irrefutable proof of when a document was signed. No single server controls the clock.
Built for Real-World Trust Problems
Diogenes is not a theoretical exercise. It solves concrete trust problems across industries where the integrity and provenance of documents are mission-critical.
Scholarly Publishing
Establish verifiable provenance chains for academic manuscripts -- from author through peer review to publication. Every scholar's contribution is cryptographically recorded.
Learn MoreMedical & Regulatory Compliance
Meet 21 CFR Part 11 chain-of-custody requirements for clinical trial documents, research datasets, and regulatory submissions with tamper-evident audit trails.
Learn MoreVerified AI Retrieval
Bring cryptographic provenance to RAG pipelines. Every chunk retrieved by an AI system traces back to a signed manifest, enabling citations with proof of source integrity.
Learn MoreSupply Chain Security
Cryptographic attestation chains for software releases, security reviews, and third-party audits. Verify every link from maintainer to your infrastructure.
Learn MoreTrust Is Personal.
Your Rules, Your Network.
Diogenes does not impose a single definition of trust. You choose your trust anchors -- the people and institutions you personally vouch for. Trust flows through endorsement chains, decaying with distance, so you always know exactly how connected you are to a signer.
Endorsement Chains
Trace trust from the signer through institutional endorsements back to people you know.
Configurable Trust Policies
Set your own depth limits, decay rates, and required endorsement categories.
Full Transparency
Every key registration, endorsement, and attestation is publicly auditable on the transparency log.
Self-Hosted. Open Source. Zero Per-Signature Fees.
Deploy diogenes on your own infrastructure. Your documents never leave your network -- only cryptographic hashes are used for verification. No vendor lock-in, no transaction costs, complete data sovereignty.
Self-Hosted
Run your own transparency log and key registry. Full control, full sovereignty.
Proof Archive
Long-term storage for cryptographic proofs that remain valid for decades.
Federated Trust
Connect your trust network with other institutions through federation protocols.
Developer SDK
Integrate verification directly into your existing applications and workflows.
Take back control of trust.
Stop relying on blind faith. Start verifying the source, the signer, and the chain of custody behind every document.