Skip to content
SYMMACHY federation — K₇ constellationSeven nodes connected pairwise by twenty-one edges, no centre. Each node protects every other. The empty interior of the figure is the common ground that the federation defends.

La alianza, no el dueño.

The alliance, not the owner.

SYMMACHY is autonomous security infrastructure built as a horizontal alliance of equals bound by an oath of mutual defense. No central command. No single shield. Each node protects every other, with cryptographic provenance from sensor to court-room.

What we are

An infrastructure for the systems that cannot fail.

Critical infrastructure. AI-native enterprises. Sovereign-adjacent operators. We design, build, deploy, and operate the operating system, the autonomous fleet, and the response envelope for environments where failure cascades into people, capital, or sovereignty.

The threat surface fuses cyber and physical. The response must be measured in seconds, not hours. The evidence must hold up in front of a regulator, an auditor, and a court of inquiry.

What we are not

  • ×A staffing-based guard company.
  • ×A CCTV / camera integrator.
  • ×A generic MSP wrapping commodity tools.
  • ×A consulting firm selling deliverables.
  • ×A surveillance vendor against civilians.
  • ×An exclusive contractor to any single buyer.

The full text of these refusals is in the Charter — Article II.

The four operating planes

Bound at the ontology layer. Sovereign on the wire.

ai

AI Security

Runtime guardrails. Frontier evals. Models that cannot be turned against you.

Every model in production runs behind a signed OPA policy that defines its input domain, output schema, latency budget and refusal behaviours. Every output carries cryptographic provenance: model id, version, input hash, output hash, policy hash. Hallucinations and jailbreaks are treated as security events with full incident-response weight.

σύμβολον — the broken token, half held by each peer, that proves identity when rejoined

physical

Physical Security

Sensor fusion. Perimeter intelligence. Identity-aware physical access.

Cameras, lidar, IR, RF and radar telemetry are fused into a single asset + threat graph. Cross-modal verification means an adversary cannot spoof one sensor and pass the rest. Every physical access decision is identity-bound to a SPIFFE identity, signed and replayable.

φύλαξ — the watcher who answers to the law, not to the lord

fleet

Robotic Fleet

Autonomous patrol. Edge AI. Coordination without command.

Quadrupeds, drones, ground vehicles, edge AI gateways. Each unit carries a SPIFFE identity provisioned at the factory; firmware is Cosign-attested; every mission is policy-bounded and reversible. The fleet acts as a federation of peers, not a chain of command — when one detects, all respond.

σύνταξις — the ordering of equals into action without a general

operations

Operations + Resilience

Incident response. AI SOC. Drills, evidence, refusal.

A 24×7 SOC operated as a peer of the customer's own team, never above it. Runbooks are versioned, testable, signed. Restore drills quarterly, kill-switches tested weekly, incident commanders rotate. Every action lands in an evidence chain the customer can give to a regulator without our cooperation.

εὐταξία — the good order that survives the night watch

Evidence-grade or it didn't happen

Every action is signed. Every signature is anchored. Every anchor is public.

Sigstore Cosign keyless. Rekor public transparency log. SLSA Level 3 provenance. A customer's auditor verifies our claims against rekor.sigstore.dev without our cooperation.

The stream beside this paragraph is illustrative. The mechanism behind it is not.

Read the research notes

Evidence chain · transparency log

Rekor entry #91,408,220

    Illustrative stream. In production, every artefact deployed by SYMMACHY is Cosign-keyless-signed and anchored to the public Rekor log; auditors verify against rekor.sigstore.dev directly.

    Article II — what we will refuse

    A federation that cannot be bought is the only one worth joining.

    No deployment of autonomous force projection against civilian populations under non-conflict policing.

    No support for surveillance of migrants outside formal legal asylum or border channels.

    No technology for protest or assembly suppression.

    No mass surveillance of populations under autocratic regimes.

    No exclusivity agreement that compromises sovereignty.

    No model that we cannot turn off.

    No deployment without a customer-signed Authority of Use.

    No single customer above 35% of trailing twelve-month ARR.

    Read the full Charter

    Begin a conversation

    You petition for federation. We do not solicit.

    SYMMACHY is built deliberately to filter for buyers who already understand the doctrine. If you operate a system whose failure cascades into people, capital, or sovereignty — and you read the Charter and find no clause you'd ask us to weaken — write us.

    hello@symmachy.systems

    For sensitive security disclosures: security@symmachy.systems — PGP key required. Disclosure policy →

    For partnerships: partners@symmachy.systems

    For careers: careers@symmachy.systems