ByAU
title: "How "Permissioned Pools" are Shaping Institutional DeFi" slug: "the-role-of-permissioned-pools-in-institutional-defi" description: "Summary: Institutional DeFi is leaning towards permissioned pools because they tackle the key challenges head-on--like KYC/KYB compliance, Travel Rule messaging, sanctions screening, and maintaining bank-level operations--without giving up on composability. Here’s a closer look at the technical details." category: "Decentralized Finance" authorName: "Jay" coverImage: "https://images.pexels.com/photos/8185624/pexels-photo-8185624.jpeg?auto=compress&cs=tinysrgb&fit=crop&h=627&w=1200" publishedAt: "2026-01-10T07:53:03.480Z" createdAt: "2026-01-06T15:13:00.376Z" updatedAt: "2026-01-21T08:51:19.874Z" readingTimeMinutes: 12
The Role of Permissioned Pools in Institutional DeFi
As decentralized finance (DeFi) continues to evolve, more institutional investors are dipping their toes into this exciting space. One of the key developments making waves in this area is the concept of permissioned pools. So, let’s dive into what permissioned pools are and why they're becoming a big deal in the world of institutional DeFi.
What Are Permissioned Pools?
Permissioned pools are essentially private groups where only approved participants can engage in DeFi activities. Unlike traditional DeFi protocols that welcome anyone with an internet connection, permissioned pools bring some exclusivity to the table. This controlled access can help institutions feel safer as they navigate the often-volatile crypto waters.
Key Features of Permissioned Pools:
- Selective Participation: Only vetted institutions, like hedge funds or family offices, are allowed in.
- Enhanced Security: By limiting access, these pools can implement stricter security measures.
- Tailored Governance: Participants can shape the rules and operations of the pool to better align with their specific needs.
Why Institutions Are Interested
So, why are institutions getting excited about permissioned pools? Here are a few reasons:
- Regulatory Compliance: Many institutions are under strict regulatory guidelines, and permissioned pools can help them stay compliant while participating in DeFi.
- Risk Management: With a smaller group of known participants, it’s easier to manage risks and maintain a stable environment for investment.
- Fostering Cooperation: These pools often allow institutions to collaborate on projects, share insights, and innovate together, which can lead to more robust strategies.
Example Use Cases
Let’s take a look at some practical examples of how permissioned pools can be utilized:
- Liquidity Provisioning: Institutions can create a dedicated liquidity pool for a specific asset, ensuring that they have the necessary capital while managing risk.
- Yield Farming: By pooling funds in a permissioned environment, institutional players can engage in yield farming with a greater sense of security and control.
- Joint Investments: Groups of institutions can use these pools to collaborate on larger investments, allowing them to leverage their combined resources.
Challenges to Consider
Even though permissioned pools sound promising, they come with their own set of challenges:
- Centralization Risks: With a select group controlling access, it might lead to centralization, which goes against the decentralized ethos of crypto.
- Complex Governance: Establishing an equitable governance system can be tricky when only a few entities are involved.
- Market Perception: There might be some skepticism from the wider DeFi community regarding the legitimacy and transparency of permissioned pools.
Conclusion
Permissioned pools are carving out a space in the institutional DeFi landscape, allowing traditional investors to partake in the benefits of decentralized finance while keeping their compliance and security concerns in check. As this trend continues to grow, we may see even more innovative applications and collaborations unfold. If you’re interested in exploring this further, check out resources like DeFi Pulse and CoinGecko for more insights.
the specific technical headache you’re feeling
- Your legal and compliance team is on the hunt for solid KYC/KYB verification, OFAC screening, and Travel Rule data before any counterparties dive into a pool. Meanwhile, your DeFi squad is craving open composability and execution on those public chains.
- Identity across the board is all over the place: one team is whitelisting by pool, another by product, and there’s no real trust in how wallets, entities, and attestations are mapped across different chains.
- Operations won’t give the green light without vendors that have SOC 2 Type II certification and clear DORA incident workflows. And let’s not forget, regulators (like MiCA and TFR) have shifted gears from “guidance” to hard deadlines with actual consequences. MiCA’s stablecoin rules kicked in on June 30, 2024; CASP licensing began on December 30, 2024; and national transitional windows could extend as far out as July 1, 2026. (finance.ec.europa.eu)
- Even if you’re clearing KYC hurdles, you still need Travel Rule messaging working smoothly with your counterparties. VASPs are increasingly putting the brakes on withdrawals until they can confirm beneficiary info; a Notabene survey from 2025 showed a jump in this from 2.9% to 15.4%, reflecting an industry-wide push for compliance. (notabene.id)
- Your capital group is questioning whether holding or dealing with non-permissioned crypto might set off Group 2 exposure limits (1-2% Tier 1 cap) or trigger 1,250% risk weights based on Basel crypto standards (which will be in play from 2025-2026). This could really put a damper on the business case. (bis.org)
- And just when you think you’ve got it all figured out, the rules change: OFAC’s 2022 sanctioning of Tornado Cash was reversed in March 2025, which shows how the sanctions landscape can shift and throw those “hard-coded” compliance assumptions for a loop. (home.treasury.gov)
why this stalls revenue and invites risk
- Missed go-lives: It’s frustrating when ad-hoc allowlists for each pool create long onboarding queues. Just ask Maple, who found out the hard way that these per-pool allowlists became a serious operational bottleneck. They eventually switched to a global on-chain permissioning bitmap to solve the issue. Every delayed address means idle capital and a missed quarter. Check out their insights here.
- Regulatory slippage: The EU’s MiCA regulation is now in full swing for CASPs (as of December 30, 2024), and the Travel Rule under the Transfer of Funds Regulation doesn’t offer any grace period. Member states might allow firms to operate transitional measures only until July 1, 2026 at the latest. If companies miss their re-authorization windows, they’ll have no choice but to cut off EU users. You can read more about this here.
- Basel leakage: It's risky to have blanket exposure to non-compliant or ineligible crypto assets. This could easily lead to breaching the 1% soft/2% hard Group 2 limits and racking up a whopping 1,250% risk weight--totally wrecking your RWA or liquidity ROI. Dive into the details here.
- Sanctions whiplash: Hard-coding "never interact if X is on SDN" into a pool’s logic can backfire when SDN statuses change. For instance, OFAC’s March 21, 2025 update removed Tornado Cash addresses. If your policy engine wasn’t designed to be upgradable, you might end up with a brittle control system. More info can be found here.
- Fragmented liquidity: These days, enterprises need cross-chain USDC for treasury operations, subscriptions, and redemptions. After the Dencun upgrade, L2 fees dropped significantly thanks to EIP-4844 “blobs,” but companies still require a sanctioned cross-chain primitive (CCTP) instead of building their own bridges to get through risk committees. Learn more about this here.
- Proof points elsewhere: Aave Arc’s institutional pool, which had Fireblocks as the first whitelister, proved that permissioned mechanics work well. Clearpool Prime and Centrifuge enforce KYC/KYB for each pool or tranche. Plus, the MAS Project Guardian pilots showcased tokenized funds and FX with verified counterparties on public chains. Your peers are already benefiting from this--reporting wins in both cost and time. Check out more details here.
7Block’s Approach to Designing, Implementing, and Validating Permissioned Pools
At 7Block, we’ve crafted a pretty solid methodology when it comes to designing, implementing, and proving the legitimacy of permissioned pools. Here’s a quick rundown of our process:
Designing Permissioned Pools
- Understanding Requirements
We kick things off by digging deep into your needs and what you really want from the permissioned pool. This helps us tailor the design to fit perfectly. - Defining User Roles
Next, we outline the different roles within the pool. It’s crucial to know who has access to what, and we make sure these roles are crystal clear. - Creating the Architecture
With a solid grasp of requirements and roles, we move on to crafting an architecture that supports everything. This includes figuring out the tech stack, security measures, and integration points.
Implementing Permissioned Pools
- Development Phase
Our talented developers take the lead here, turning the design into reality. They write the code, set up the smart contracts, and ensure everything is built to spec. - Testing
Before going live, we put everything through rigorous testing. This step is crucial because we want to catch any hiccups early on. It includes unit tests, integration tests, and user acceptance tests. - Deployment
Once we’re confident that everything’s in tip-top shape, we deploy the permissioned pool. It’s always exciting to see the project come to life!
Proving Permissioned Pools
- Auditing
After deployment, it’s time for the auditors to do their thing. We believe in transparency, so we often bring in external auditors to review the code and processes. Their approval goes a long way in building trust. - Monitoring
Even after the launch, our work isn’t done. We continuously monitor the pool to ensure everything runs smoothly and securely. If any issues pop up, we’re ready to tackle them right away. - Feedback Loop
Finally, we like to keep the conversation going. Gathering feedback from users helps us improve and make adjustments as needed. After all, a permissioned pool should evolve with its community!
By following this thorough methodology, we ensure that our permissioned pools are not just functional but also secure and trustworthy. If you’re interested in learning more about our approach or want to get started on your own permissioned pool, feel free to reach out!
Compliance-First Identity Architecture (Bring Your Own KYC, Keep Composability)
- Off-chain KYC/KYB, On-chain Attestation:
- We’ve put together a standardized schema using EAS (Ethereum Attestation Service)--think of things like “Passed KYC,” “Accredited Investor,” and “Approved Jurisdiction.” Instead of traditional siloed whitelists, we use these attestations to control pool entry. EAS is up and running on mainnet and L2s, boasting millions of attestations and active issuer sets (including Coinbase Verifications on Base). Check it out at attest.org.
- If your policy needs non-transferable proof, we issue ERC-5192 or ERC-5484 credentials (soulbound, with burn-authorization rules). This beats the hassle of wallet-by-wallet allowlists, helping you dodge those annoying UX dead-ends and lightening the operational load. Learn more at eips.ethereum.org.
- Sanctions Screening In-Contract:
- We’ve integrated the Chainalysis sanctions oracle right at the protocol gateway for clear-cut, on-chain checks against OFAC/EU/UN lists. Plus, off-chain APIs (like Chainalysis and TRM) are there to support pre-trade checks in the UI and custody. This setup makes sure you stay compliant, even as SDN lists get updated. Dive into details at auth-developers.chainalysis.com.
- ZK Credentials (Privacy by Default):
- For those “prove-not-reveal” situations (think age, jurisdiction, or accreditation), we’re using Polygon ID-style ZK proofs and selective disclosure. If you’re an enterprise looking for vendors, we also integrate dataless KYC issuers like Fractal ID or Quadrata passports that let you verify on-chain without spilling any personal info. Check it out on GitHub.
- Travel Rule Ready:
- We connect your custodians and exchanges to Notabene or TRISA Envoy, which means Travel Rule messages are exchanged before transactions happen. Both solutions are gearing up for 2025 adoption and interoperability, and don’t forget--the EU TFR deadline is already in motion. Get the scoop at coindesk.com.
2) Smart‑Contract Gating Patterns That Auditors Approve
- Pool Access Controller:
- This is all about role-gated entry using AccessControl. It checks EAS attestations or SBTs and uses revocation lists for dynamic offboarding. Plus, there's a Chainalysis oracle guard in place for that last-mile sanctions screening--safety first!
- Gas-Aware Design:
- After Dencun, we’re optimizing for rollups and leveraging EIP-1153 for transient storage. This means we can use per-transaction locks and flags like reentrancy locks and temporary approvals. We’re also on EIP-712 typed data for signature flows, which helps us minimize approvals and errors. Check it out here!
- Formal Verification and Fuzzing:
- We’ve integrated Slither into our CI and use Echidna for property-based fuzzing to keep our invariants intact. If you’re up for it, we also incorporate Certora Prover for those high-value invariants--think liquidation, interest accrual, and allowlist safety. Aave has been rocking continuous formal verification in production, and your auditors totally get this approach. More info here!
- Example:
- Take Maple’s “global permissioning” as an example. It's like our roadmap: we shifted from having per-pool allowlists to a single on-chain bitmap that the Pool Permission Manager checks. We update the bits off-chain after KYC/KYB, which really cuts down on operational hassle and speeds up how lenders can move across products. Dive into the details here!
3) Cross‑chain liquidity that passes risk committees
- USDC movement with Circle CCTP:
- We're streamlining cross‑chain subscription and redemption processes using CCTP (which means burning and minting, all verified by Circle) instead of those old lock‑and‑mint bridges. Plus, we're rolling out "Fast Transfer" for when the treasury needs that second‑level finality while keeping things on a tight leash. Check it out here: (circle.com)
- Data availability and fees:
- For rollup data, we’re using EIP‑4844 blobs as our go-to option. This approach not only slashes fees for pool interactions on Layer 2 but also allows for more predictable NAV and oracle updates. If you want to dive deeper, here’s the link: (consensys.io)
4) Regulatory Alignment and Procurement Hygiene (Enterprise-Grade)
- SOC 2 / ISO Alignment and DORA:
- We only partner with vendors that have SOC 2 Type II or ISO 27001 certification for things like identity management, custody, and Travel Rule messaging. Plus, we've got our runbooks aligned with DORA's incident and continuity requirements, kicking in on January 17, 2025. You can check out more info here.
- MiCA Playbook:
- We're setting up token flows and disclosures for MiCA and TFR. Just a heads up, the EU stablecoin rules went live on June 30, 2024, and CASP licensing starts on December 30, 2024. Each member state has its own transitional windows, with some extending all the way to July 1, 2026. We're also rolling out analytics to show our compliance proof during the authorization process. More details can be found here.
- Basel Controls:
- We make sure to tag every asset exposure with a Group 1 or 2 classification. This way, we can enforce our policy at the time of allocation, ensuring that Group 2 exposures stay below 1% of Tier 1. This helps us dodge those hefty 1,250% risk weights. If you’re curious, you can read more about it here.
5) Interop with the Markets You Actually Need
Here are some cool examples of Institutional DeFi that we're either working with or looking to mimic:
- Aave Arc mechanics: This one's all about whitelister-based identity and KYC/KYB. We’re talking regulated whitelisters like Fireblocks. Check out the details here.
- Clearpool Prime: If you’re into permissioned unsecured credit, this is for you. They have borrower-specific pools and flexible rolling extensions. Find out more here.
- Centrifuge pools: These guys make onboarding a breeze! You can get through KYC/KYB in just 5-7 minutes, plus they handle the legal docs and accreditation as needed. Dive into the details here.
- MAS Project Guardian pilots: This one's a game changer for tokenizing funds and FX! They’re using verified counterparties through Swift/Chainlink orchestration, making things smooth for off-chain fiat settlement. More info can be found here.
- Tokenized fund rails: The BUIDL project (think BlackRock/Securitize) really took off, surpassing $1B in AUM by 2025! They’ve expanded across multiple chains, enabling share transfers and daily dividends on-chain in permissioned setups. Check it out here.
What “good” looks like -- the architecture we deploy
Identity and permissions
- Issuers: Fractal, Quadrata, or any enterprise KYC provider you trust.
- On-chain proofs: We’re using EAS schemas like “Passed KYC,” “Accredited,” and “Eligible Jurisdiction.” You can also opt for ERC-5192 SBTs if you want that binary gating action.
- Policy engine: Think of it as an upgradable registry plus a Chainalysis sanctions oracle that keeps everything in check.
Pool core
- AccessController.sol: This bad boy checks your attestation/SBT and sanctions, plus it emits events that you can audit later.
- ERC-4626 vaults: They’re set up per tranche, complete with NAV hooks and some pausable guards.
- Transient storage (EIP-1153): This allows for per-transaction locks and temporary approval flags, so we’re on our toes.
Off-chain services
- We’ve got an attestation issuer, a Travel Rule gateway (think TRISA/Notabene), custody policies using MPC wallets, and continuous monitoring that tracks to SOC 2 controls (SIEM, anyone?).
Cross-chain flows
- USDC is flowing through CCTP, and we’ve got hooks ready to auto-deposit into a pool as soon as it mints on the destination chain.
Security pipeline
- We run the gauntlet with tools like Slither (static analysis), Echidna (fuzzing), Foundry tests, and even optional Certora rules for those critical invariants. Plus, we make sure to have third-party audits as our final gate. Check it out on GitHub!
- Global allowlist, not per‑pool: With Maple’s on-chain bitmap permissioning, we’ve waved goodbye to the hassle of repetitive onboarding. This means lenders can easily switch between products as yields shift--just like the approach we use for our enterprise pools. (maple.finance)
- MAS‑grade workflows: The Swift-UBS AM-Chainlink pilot, part of MAS Project Guardian, demonstrated how tokenized fund subscriptions and redemptions can handle cash settlements off-chain through the existing Swift network while minting and burning happens on-chain--this way, your fund operations team can stick to their familiar tools. (swift.com)
- Public‑chain, verified counterparties: The JPMorgan/DBS/SBI pilots utilized a tweaked version of Aave Arc with verifiable credentials on Polygon to settle tokenized deposits and FX transactions. This proves that permissioned DeFi can thrive on public infrastructure when the right trust anchors are in place. (cryptoslate.com)
- Tokenized cash equivalents for treasury and collateral: BUIDL, tokenized by Securitize, hit the impressive milestone of over $1 billion in assets under management in just a year and has branched out to multiple chains, accepting exchange collateral. This is a clear sign that permissioned assets are making their way into real markets today. (prnewswire.com)
- L2 cost structure after Dencun: Thanks to blob transactions (EIP‑4844), we’re seeing reductions in data costs for rollups. This keeps NAV updates and oracle heartbeats affordable on Layer 2s--super important for permissioned pools that have to deal with frequent accounting events. (consensys.io)
Best Emerging Practices We Recommend Now
- Default to attestations over allowlists:
- Opt for EAS schemas when you’re dealing with KYC/KYB/accreditation and jurisdiction. Use SBTs only if the policy specifically needs non-transferability. This way, you can reuse across different protocols and instantly revoke access if needed. Check it out here.
- Keep sanctions logic upgradable:
- Instead of hard-coding SDN addresses, which can lead to issues when lists change (like what we saw in the 2025 delistings), it’s better to reference a Chainalysis oracle or something similar. More on that here.
- Bake in Travel Rule messaging:
- Make sure to integrate Notabene or TRISA Envoy at the wallet or custody layer so that counterparties can pre-authorize transfers. This aligns with EU TFR and global FATF timelines. Learn more here.
- Use CCTP for USDC flows:
- Go for native burn/mint instead of those lock-and-mint bridges. Consider using “Fast Transfer” for speedy treasury operations within Circle’s allowance model. Details can be found here.
- Formalize gas and safety:
- Apply EIP-1153 wherever it makes sense; enforce invariant tests (like net asset conservation, fee accrual, and role gating) with tools like Echidna, and optionally Certora for those high-value contracts. More info here.
- Basel/MiCA aware configuration:
- Make sure to tag assets with Group 1/2 classification and manage exposures accordingly. Log disclosures and keep an eye on market abuse where MiCA requires it, and be ready to escalate operations to DORA playbooks if any incidents occur. Check it out here.
GTM Metrics That Matter (What Execs Will Ask)
- Time-to-liquidity: Getting through KYC onboarding for certain RWA pools (like Centrifuge) usually takes just minutes in approved jurisdictions. We’ve designed our process around the idea of “attest once, re-use everywhere,” which really helps to cut down the onboarding hassles across various pools and products. You can read more about it here.
- Addressable counterparties: Notabene is highlighting a big industry push for Travel Rule compliance by 2025. By integrating TRISA/Notabene, we can reach more VASPs and significantly lower the chances of those annoying “blocked withdrawal” situations. Check out the details here.
- Gas/OPEX: After the Dencun upgrade, blob-based L2s have really slashed data costs, which makes it super easy to keep up with accounting and compliance checks (like NAV and attest refreshes) at minimal fees. You’ll definitely see the difference in your monthly infrastructure bill. For more info, click here.
- Capital efficiency: By aligning with Basel standards, we’re preventing Group 2 breaches and those steep risk weights. Structuring our permissioned exposures as tokenized deposits or assets that fit into Group 1 criteria helps us maintain our balance-sheet capacity. You can dive deeper here.
- Proven market adoption: The whitelisting of Aave Arc, the invite-only credit pools from Clearpool Prime, and the multi-chain growth seen with BUIDL are strong indicators of institutional interest in these permissioned rails that provide on-chain settlement. More on this can be found here.
How 7Block Labs Gets Things Done (and How We Contract)
Discovery (2-3 weeks)
First up, we dig into regulatory mapping, looking at things like MiCA, DORA, and Basel. We also create a counterparty matrix covering custody, KYC, and the Travel Rule. Not to forget, we select the right chains, especially Layer 2s that fit the blob economics model.
Build (8-12 weeks)
Next, we move on to building. Here, we whip up an access controller alongside an attestation schema, set up vaults using ERC-4626, and create CCTP flows. We also make sure to implement pipelines for sanctions and the Travel Rule, plus we ramp up security with tools like Slither and Echidna. If needed, we might throw in Certora for added assurance.
Pilot (90 days)
After that, we kick off a pilot phase. This involves limited counterparties in a permissioned pool, and we ensure everything's operationally ready with runbooks and dashboards. Plus, we bring in an external audit through our security audit services.
Scale
Finally, we scale up by adding tranches and pools, integrating them with existing products--think permissioned credit or tokenized funds--and expanding our cross-chain distribution.
Where We Fit Into Your Roadmap
- Starting from scratch? Our awesome [web3 development services] and [blockchain development services] teams have you covered with the whole package--contracts, attestations, and integrations.
- If you're looking to enhance what you already have, we can help with [blockchain integration], set up cross-chain connections through our [cross-chain solutions development], and make sure your code is secure with our [security audit services].
- Ready to dive into the DeFi scene? Our [defi development services] and [smart contract development] accelerators will get you to your first pool in no time.
Internal Links
- Check out our Web3 development services to dive into the next-gen internet.
- Explore our blockchain development services that can take your project to the next level.
- Don't forget to look into our security audit services to keep your assets safe and sound.
- Learn more about our blockchain integration solutions to seamlessly incorporate blockchain tech into your business.
- If you're interested in flexibility, check out our cross‑chain solutions development for connecting different blockchains effortlessly.
- Our DeFi development services are designed to revolutionize finance as we know it.
- Finally, don’t miss our smart contract development to automate agreements and processes like never before.
Why Permissioned Pools Are Important Right Now
- They transform compliance from a hassle into a benefit--think verified counterparties, programmable policies, and on-chain audit trails.
- They keep all the great things that make DeFi attractive for businesses: composability, around-the-clock settlement, and automated processes.
- They’re already becoming the go-to place for institutional liquidity. We’re seeing this with bank pilots like the MAS Project Guardian and large-scale tokenized funds from projects like BUIDL. Your teams are likely looking to invest here next. (swift.com)
CTA for Enterprise
Schedule Your 90-Day Pilot Strategy Call
Citations
- Aave Arc and Fireblocks are shaking things up with their whitelister and mechanics. (fireblocks.com)
- Check out Clearpool Prime and its cool permissioned credit pools. (docs.clearpool.finance)
- Maple's got an interesting take on global permissioning with their bitmap approach. (maple.finance)
- Want to know about Centrifuge? Their onboarding time and KYC/KYB processes per pool might surprise you. (docs.centrifuge.io)
- The MAS Project Guardian pilots are making waves with collaborations like Swift/UBS AM/Chainlink and JPM/DBS/SBI DeFi pilots. (swift.com)
- If you’re curious about MiCA/DORA timelines and transitional windows, you’ll want to take a look at this. (finance.ec.europa.eu)
- Basel's taking a close look at the crypto scene with their prudential treatment--think Group 1/2, some caps, and hefty risk weights. (skadden.com)
- Curious about Chainalysis? Their sanctions oracle docs dive into in-contract screening. (auth-developers.chainalysis.com)
- EAS attestations are worth checking out--everything from counts to schemas and Coinbase Verifications on Base. (attest.org)
- EIP‑1153 is all about transient storage, plus Dencun/EIP‑4844 blobs and what that means for fees post-2024. (eips.ethereum.org)
- Notabene is seeing some exciting adoption metrics for the Travel Rule! Compliance is on the rise thanks to new regulations and stablecoin payments. (coindesk.com)
- BUIDL is pushing boundaries with its scale and ambitions for multi-chain expansion. (prnewswire.com)
Money phrases to discuss with your CFO and CISO
- “Permissioned composability on public chains”
- “Attest-once, trade-everywhere”
- “Travel Rule pre-clearance at the wallet edge”
- “Basel-aware exposure gating”
- “Blob-priced accounting and reporting”
If you'd like us to customize the blueprint to fit your stack, complete with SOC2/DORA mapping and help with vendor shortlisting, we can nail down the details in one working session.
Book a 90-Day Pilot Strategy Call
Ready to kick off your journey? Let's set up a 90-Day Pilot Strategy Call! This is your chance to dive deep into your goals and craft a game plan that works for you.
How It Works
- Choose Your Time: Pick a slot that fits your schedule.
- Fill Out the Form: Let us know what you’re hoping to achieve during our call.
- Get Ready to Collaborate: We'll discuss strategies that can truly make a difference in your approach.
What to Expect
- Personalized Insights: We’ll look at your specific needs and challenges.
- Actionable Strategies: Leave with clear steps you can take right away.
- Ongoing Support: We’re here for you, even after the call.
Ready to Get Started?
Let’s make those 90 days count!
Like what you're reading? Let's build together.
Get a free 30-minute consultation with our engineering team.
Related Posts
ByAUJay
Building Supply Chain Trackers for Luxury Goods: A Step-by-Step Guide
How to Create Supply Chain Trackers for Luxury Goods
ByAUJay
Building 'Private Social Networks' with Onchain Keys
Creating Private Social Networks with Onchain Keys
ByAUJay
Tokenizing Intellectual Property for AI Models: A Simple Guide
## How to Tokenize “Intellectual Property” for AI Models ### Summary: A lot of AI teams struggle to show what their models have been trained on or what licenses they comply with. With the EU AI Act set to kick in by 2026 and new publisher standards like RSL 1.0 making things more transparent, it's becoming more crucial than ever to get this right.

