ABOUT
Traders and developers who built what they wished they had found.
— The team
Founder
Founder & systematic trader
Systematic trader since 2017, I spent years building execution infrastructure and trading systems. One problem remained unsolved: proving your results without exposing your data or your alpha.
The industry still relies on costly manual audits and reputation. I wanted an alternative where proof is mathematical, not social.
I built what I wish I had found: a tool that proves my results without anyone being able to see my trades or alter the data.
As a developer, I've always been drawn to problems where technology can replace trust. When I discovered AuditZK, the idea of verifying financial data through cryptography rather than a third party convinced me immediately. It was a real problem, with a real technical solution.
Today I design the frontend architecture and user experience of the platform. The goal is for technical complexity to disappear on the user's side.
Lead Developer
Full Stack & automation
— Why AuditZK
The problem isn't what the user can do — it's what the platform can do. Regular deposits can simulate consistent PnL. Data flows through servers controlled by a single entity. There is no way to independently verify that results haven't been altered.
AuditZK eliminates this trusted third party. Your data is end-to-end encrypted, processed in an isolated hardware enclave, and only aggregated metrics come out. No one — not even us — can see or modify your data.
— Our approach
Your exchange credentials are AES-256-GCM encrypted client-side. They are only decrypted in memory, inside the hardware enclave. No one has access — not even our team.
Performance calculations run in an AMD SEV-SNP attested environment. The running code is publicly verifiable. Individual positions never leave the enclave.
Only aggregated metrics — return, volatility, Sharpe, drawdown — leave the enclave. Standardized methodology, Time-Weighted Return calculations, daily snapshots at fixed time.
— Trustless Architecture
Encryption
AES-256-GCM
End-to-end, decrypted only in enclave
Environment
AMD SEV-SNP
Hardware enclave with verifiable attestation
Methodology
Standardized reporting
TWR, daily snapshots at fixed time
Raw data
Never exposed, only aggregated metrics leave the enclave
Code
Auditable, every component can be independently verified
Attestation
Cryptographic proof that running code matches published code
Create your verifiable track record in minutes.