// Platform_Protocol_Active // v0.1.0

The interface between
matter and math

Taynik Cryptographic Engine Visual

Engine_Pipeline

Fractal_Encryption_v2

READY

Taynik brings cryptographic truth to physical objects, artwork, and locations. One engine. Eight verticals. Mathematically unforgeable.

Why Taynik

The physical world has no cryptography. We're fixing that.

$500B

Counterfeit goods annually

OECD global trade estimate

2 sec

To clone a standard QR

Screenshot, print, done

83K

Lines of Go powering the engine

1,222 tests, zero dependencies on trust

01

Anti-copy by design

Fractal QR patterns encode data across Galois Fields. When photocopied, the mathematical structure degrades in measurable ways. The loss of entropy proves the forgery — no database lookup required.

02

Self-serve, no hardware

No NFC tags to procure, no specialized scanners, no shipping physical devices. Generate labels through an API or dashboard. Verify with any smartphone camera. Works from listing photos on eBay, StockX, or Instagram.

03

Sub-$0.10 per label

NFC tags cost $0.50–$2.00 each. Physical hologram stickers cost $0.30+. Taynik labels cost less than $0.10 — cheaper than the thread on a care label. Free tiers on every vertical.

04

One engine, infinite verticals

The same cryptographic core powers streetwear authentication, cannabis compliance, trading card verification, art provenance, and location-locked content. Each vertical adapts the engine for its market.

How It Works

Math cannot be lied to.

Taynik doesn't rely on trust, databases, or secrecy. It relies on the same mathematics that protects satellite communications.

Fractal QR

Why photocopies fail

A standard QR code is a grid of black and white squares. Copy it with any printer and you get a perfect clone. There is no information lost because there is no information density to lose.

Fractal QR is different. Each pattern is generated over the finite field GF(256) — the same algebraic structure used in Reed-Solomon error correction. Data is encoded not just in the position of marks, but in the precise geometry of nested sub-patterns. These sub-patterns exist at scales that approach the resolution limit of consumer printing.

When you photocopy a fractal QR label, the printer cannot reproduce the fine-grained structure. The entropy of the pattern measurably decreases. The verification algorithm detects this entropy loss and flags the copy — no database query needed, no network connection required.

Wormhole

Location as encryption

Most location-based systems use geofencing: the server checks if you're inside a boundary, then sends you the content. The content exists in decrypted form on the server. The boundary is enforced by software, not physics.

Wormhole inverts this model. GPS coordinates are fed through BLAKE3 to derive a key, then content is encrypted with XChaCha20 using that key. The encrypted payload can be stored anywhere — on a CDN, in a QR code, in a poster. But it cannot be decrypted until a device physically present at the coordinates derives the same key.

The content does not exist in decrypted form until someone is standing in the right place. The location isn't a gate — it's the key itself.

Wing

Invisible provenance

Traditional watermarking adds visible noise to images — a compromise between protection and aesthetics that satisfies neither. Creators hate the visual degradation. Thieves crop or clone-stamp it away.

Wing modulates provenance data into the luminance channel at frequencies invisible to the human eye but readable by cameras. The pixel data itself becomes the proof. No overlay, no border, no metadata that can be stripped. The artwork looks identical to the naked eye, but a camera phone can extract the embedded identity.

This means an artwork posted on Instagram, screenshotted, or printed still carries its creator's signature in the pixel values themselves.

GF(256)Reed-SolomonShamir SSSBLAKE3XChaCha20Argon2id