Stop Building Bigger Walls.
Shrink the Botnets.
The first financial marketplace that pays to neutralize IoT botnets at the source — before they attack.
Currently accepting cyber insurance underwriters, ISPs, and router OEMs
The $50 Billion Externality
A $30 camera gets hacked. It joins a botnet. That botnet generates a 31.4 Tbps attack that costs a bank $10 million in downtime. The camera owner pays nothing. The bank pays everything.
This is a textbook economic externality — the same kind that polluted rivers and filled skies with smog. Every major pollution problem got solved the same way: someone created a financial mechanism that made the cost visible.
That mechanism doesn't exist yet for IoT security. We're building it.
Carbon Credits for Cybersecurity
A four-step financial mechanism that aligns incentives to reduce global botnet capacity.
FUND
Cyber insurers purchase Security Credits to reduce their claims exposure
REMEDIATE
ISPs and router OEMs neutralize botnet capacity at scale — sinkholing C2 servers, pushing firmware updates
VERIFY
Dual-source verification: cryptographic firmware attestation + ISP traffic analysis. No self-reporting.
RETIRE
Attack capacity permanently removed. Measured in Mbps. Credits expire after 12 months.
▸ One ISP sinkhole can neutralize 50,000 bots in minutes. That's the unit economics that make this work.
The Numbers
Built for the Supply Chain
For Cyber Insurers
PRIMARYEvery DDoS claim you pay out is money lost to a preventable problem. Security Credits let you fund the reduction of the risk pool — the same way fire insurers funded building codes.
- ▸ Reduce claims exposure
- ▸ Quantifiable risk reduction (Mbps retired)
- ▸ Consortium model — collective action, collective benefit
For ISPs
You already know which devices on your network are compromised. You have the telemetry. Now someone's paying you to act on it.
- ▸ Monetize your abuse desk
- ▸ Revenue from C2 sinkholing and device quarantine
- ▸ Turn a cost center into a profit center
For Router OEMs
8 million routers in the field with known CVEs. You could push patches to 5.5 million of them — if someone paid for the bandwidth and support calls.
- ▸ Revenue for firmware updates
- ▸ EU Cyber Resilience Act compliance
- ▸ Reduce your liability exposure
The Timing Is Now
Regulators and markets are converging on the same conclusion: the cost of IoT insecurity must be internalized.
Join the Founding Consortium
We're assembling the first group of cyber insurers, ISPs, and OEMs to prove this model. Phase 0 starts now.
You're on the list.
We'll reach out within 48 hours to discuss the founding consortium.
We'll reach out within 48 hours to discuss the founding consortium.