API-first PII tokenization with zero-knowledge proof audit trail. Every operation verified on-chain — tamper-proof, auditor-ready, no blockchain knowledge required.
# Tokenize PII — 1 API call response = datum.tokenize( field_type="email", value="john@acme.com", subject_id="user_4821" ) # token: pvt_email_a1b2c3d4e5f6 # ZK proof queued automatically # On-chain verification (async) proof_status: "confirmed" tx_hash: "0x3b06...ea8e" block: "16,931,482" chain: "TAC"
Traditional data protection creates trust problems it cannot solve.
Standard database logs can be modified or deleted by operators. During regulatory audits, there is no mathematical proof the log is authentic. It's a trust problem with no technical solution — until now.
To prove compliance ("all expired records deleted"), auditors need access to vault internals. Proving you protect data requires showing the data — a paradox that undermines the entire model.
KYC checks, age verification, creditworthiness — every cross-org verification transfers actual PII. Each transfer expands the attack surface and compliance scope exponentially.
Every tokenize, detokenize, and access operation generates a Groth16 ZK proof, batched and submitted on-chain automatically. Your clients never touch blockchain.
Standard REST API. Tokenize, detokenize, mask — sub-100ms response. Your code doesn't change.
Groth16 proof created via rapidsnark in the background. Proves the operation happened without revealing any data.
Proofs batched and submitted to blockchain. Immutable, tamper-proof audit trail. Verifiable by anyone, forever.
"Your auditor verifies a 256-byte proof. Not your entire database."
Production-ready infrastructure built for regulated industries.
Per-record encryption with HKDF-derived keys. Master keys never leave HashiCorp Vault Transit. Hardware-backed key management.
Replace Column(String) with Tokenized("email") in your ORM. SQLAlchemy and Django SDKs. Zero code rewrite for existing apps.
Delete the Transit key = destroy all tenant data instantly. GDPR Article 17 compliance in one API call. Mathematically irreversible.
Sub-100ms latency with Redis-cached detokenize. 8 uvicorn workers, PgBouncer connection pooling, Vault Transit parallelism.
Row-level security in PostgreSQL. Per-tenant Vault Transit keys. Partitioned tables. Complete cryptographic isolation between clients.
GDPR Article 17, HIPAA, PCI DSS, SOC 2, Russian 152-FZ. Built-in audit logging, retention policies, and access control.
Train models on tokenized data. Share with partners via selective disclosure. Prove compliance without exposing a single record.
Learn MoreFeed ML models with tokenized PII. Real data patterns, zero exposure risk. Detokenize only for authorized inference.
Verify identity across organizations with ZK proofs. "KYC passed" — yes or no, no passport numbers shared.
"Is this user over 18?" "Is credit score above 700?" Zero-knowledge answer without revealing the actual data.
From first API call to on-chain verified audit trail in under 15 minutes.
Register, create a tenant, generate an API key. Self-service dashboard or API-driven setup.
Send PII via REST API or ORM integration. We encrypt with AES-256-GCM, store in Vault-backed PostgreSQL, return a token.
Every operation automatically generates a Groth16 proof. Batched and submitted on-chain. Zero config required.
Query your audit trail via API. Each entry has a blockchain transaction hash. Auditors verify independently.
# pip install datum-sdk from datum import DatumClient client = DatumClient(api_key="dtm_live_...") # Tokenize token = client.tokenize( "email", "jane@corp.com" ) # "pvt_email_f56352c4" # Detokenize value = client.detokenize(token) # "jane@corp.com" # Mask masked = client.mask(token) # "j***@corp.com" # Audit trail (on-chain verified) trail = client.audit_trail("vault_123") # 251 verified TXs on TAC blockchain
Start free. Scale as you grow. ZK audit trail included from Business tier.
For startups and small teams getting started with data protection.
For growing companies that need verifiable compliance.
For regulated industries requiring maximum control and compliance.
Independently audited. Continuously tested. Cryptographically verified.
One API key. Four lines of code. Cryptographic proof of every operation.