Admission Protocol

Selection & criteria

We seek partnerships built on quality, integrity, and discipline. Privacy-first and security-by-design are prerequisites for us—ensuring value not only grows, but endures.

Fundamental pillars

1) Technological resilience

We select enterprises with proprietary intellectual property and a defensible technological moat that is not easily replicated. Security and privacy are built-in, not "bolted on".

2) Operational integrity

Integrity is non-negotiable. We conduct due diligence on both the financial and ethical foundations of an organization—from governance and compliance to incentives and culture.

3) Long-term alignment

Partnership requires shared standards. We work with entrepreneurs who view privacy-first principles and security-led governance as foundations, and are willing to demonstrably safeguard them.

What we seek

  • ·Clearly defined mission and ethical framework
  • ·Scalable business model with positive unit economics
  • ·Management with skin-in-the-game mentality
  • ·Willingness to work with tight governance and measurable security baselines

Exclusion criteria

  • ×Models based on data exploitation or surveillance
  • ×Short-sighted speculation without fundamental value
  • ×Opaque governance structures
  • ×Unmanaged security risk or structural dependence on "quick fixes"

Real estate criteria (balance sheet)

We selectively acquire real estate for long-term ownership. No fund management.

  • ·Location with sustainable value potential
  • ·Acceptable yield/risk profile
  • ·Suitable for long-term holding (10+ years)
  • ·No speculative or complex structures

Admission Criteria

Does your enterprise comply with our protocol? We invite you for a confidential intake.

Start confidential intake →