
The Software
The App
Phone-number-only authentication. Under 10 seconds to onboard. Three screens maximum. No accounts, no passwords, no friction. Your phone number is your identity. The app is free. The mesh is free. Safety should never have a paywall.

Zero friction
Your Phone Number Is You
No email. No password. No username. No profile photo. No social login. Just your phone number. One SMS verification code. Done. You're in the mesh.
The device-as-identity model means your Gem IS your credential. When your phone is nearby, the Gem authenticates via BLE. When your phone is gone, the Gem continues recording autonomously and syncs when reconnected. The evidence survives even if you don't have your phone.
Why phone-number-only? Because the people who need this most — domestic violence survivors, stalking victims, vulnerable populations — are the least likely to complete a 12-step account creation flow. Every screen is a dropout. We have three screens. Total.
Gem-to-Gem Protocol
The Mesh
Every Gem talks to every other Gem within BLE range. Evidence replicates automatically. Destroy one device — the footage already lives on every nearby device and in the cloud. The G2G protocol uses rotating pseudonymous identifiers and Elliptic Curve Diffie-Hellman key exchange. No centralized infrastructure required.
Auto-Discovery
BLE scanning detects nearby Gems automatically. No pairing required. No setup. Walk near someone — you're connected.
Evidence Replication
Captured footage distributes to every device in range. Each device relays to cloud via its companion phone. Distributed preservation.
Fear Cascade
One person's biometric distress triggers recording on every device within range. Strangers protect strangers. Automatically.
Pseudonymous IDs
Rotating identifiers prevent tracking. Your Gem appears as a different device to the mesh every 15 minutes. Privacy by design.
Encrypted Relay
ECDH key exchange ensures evidence is encrypted in transit. Only the evidence owner and designated recipients can decrypt.
Offline Resilient
The mesh works without internet. Evidence caches locally and syncs when connectivity returns. Works in basements, tunnels, rural areas.
Progressive trust
Four Tiers of Trust
Trust builds over time. The mesh starts with anonymity and progresses through familiarity to full guardian access. You control every tier. The system never assumes.
Stranger
Default. Anonymous proximity detection. Pseudonymous mesh relay. No personal data exchanged.
Familiar
Repeated proximity builds familiarity score. Automatic — no action required. Enhanced mesh priority.
Trusted
Mutual opt-in. Shared location during emergencies. Named in evidence vault. Bidirectional alerts.
Guardian
Full access. Real-time location sharing. Biometric feed. Automatic emergency notification. Family tier.
Knowledge Automation Operating System
KAOS
The decentralized AI mesh network that powers everything. Stationary GPU nodes perform federated learning ("safety mining") while mobile edge nodes — your wearable devices — perform real-time inference. Hardware-agnostic. Open protocol. Governed by node operator consensus.
Seven application-layer deployments: personal safety, campus security, fleet monitoring, elder care, child safety, first responder, and smart city. One platform. Every use case.
KAOS uses Byzantine fault tolerance — if one device gets hacked or destroyed, the rest of the network still agrees on what's true. No single point of failure. Safety mining rewards GPU operators with platform credits — the same economic model that powers cryptocurrency mining, redirected toward public safety.
Tamper-proof
The Evidence Vault
Every piece of evidence is cryptographically timestamped using blockchain anchoring. Content hashes are published to a distributed ledger, providing immutable chain-of-custody integrity for legal proceedings.
Multi-destination storage ensures evidence exists in at least three independent locations: local device, mesh relay, and cloud vault. Deletion from any single location does not affect the others. Evidence persists.

Always listening
Witness Notes
Every ReLIVE device has three MEMS microphones running 24/7. Witness Notes turns that ambient audio into searchable, timestamped transcripts — automatically. Speaker identification. Topic extraction. Action items. All on-device. All evidence-grade.
"What did the doctor say about my dosage?" "What exactly did the officer tell me?" "Did they actually agree to those terms?" Search your entire life's conversations in natural language.
Explore Witness NotesAmbient AI
Transcribing. Indexing. Sealing.
The app is free. The mesh is free. Safety should never have a paywall.
Learn why we built this.
About ReLIVE