What we do
Research. Specify. Build. Advise.
Four practices that reinforce each other, delivered by the people who invented and wrote the protocols we work on.
2060 is not a generalist consultancy. We work exclusively in the domain we have helped define: decentralized identity, verifiable credentials, trust networks, and the agentic infrastructure built on top of them.
Clients typically engage us across two or three practices at once: a research phase to frame the problem, a specification phase to formalize the model, an engineering phase to build the reference implementation, and an advisory relationship to support the rollout. We adapt the mix to your timeline.
Practice 01
Research
We investigate hard problems of decentralized trust before they become product requirements. Research outputs take the form of specification drafts, reference implementations, and deployed testnets, not only academic papers. We bring what we learn directly into the Verana ecosystem and into client engagements.
Current portfolio
- Decentralized identifiers and credential formats, contributions to the OpenWallet Foundation (notably credo-ts), Trust Over IP working groups and specifications, W3C specifications, DIDComm messages, DID methods, and related standards efforts.
- Verifiable governance, formal models of Ecosystem Governance Frameworks, Permission Trees, and on-chain trust deposits that make governance machine-readable and economically enforceable.
- Agentic trust, how W3C Verifiable Credentials, DIDComm, and MCP combine to give AI agents verifiable identities, bounded authority, and auditable behavior.
- Proof-of-Trust resolution, recursive trust-chain verification algorithms, caching strategies, and UX patterns for presenting cryptographic provenance to non-technical users.
- Privacy-preserving verification, unlinkability guarantees, BBS+ and CL signature deployments, and selective-disclosure interaction patterns.
Practice 02
Specification Delivery
Writing a good specification is a craft. It requires technical depth, ecosystem judgment, and the patience to reach consensus without losing rigor. We do it for our own stack, and we do it for clients.
As Verana's principal spec authors, we published:
- Verifiable Trust Specification, the end-to-end model for Verifiable Services, Verifiable User Agents, Proof-of-Trust, service-endpoint declaration, and credential-chain resolution.
- Verifiable Public Registry Specification, the on-chain data model for trust registries, credential schemas, permission trees, validation fees, and trust deposits.
- Ecosystem Governance Frameworks, templates and worked examples for drafting the governance documents that bind a trust registry to a real-world jurisdiction or industry.
For clients who need a protocol, for their ecosystem, their regulator, their consortium, we deliver it: problem framing, interoperability analysis, normative language, conformance test suites, and a reference implementation that proves the spec is buildable.
Discuss a Specification ProjectPractice 03
Open-Source Engineering
We ship production-grade open source. Today the 2060 portfolio includes:
- Hologram Agentic AI, an open-source stack for building, deploying, and governing AI agents for personal and corporate use: the VS Agent framework (DIDComm + credo-ts), the Generic AI Agent (modular LLM orchestration with MCP, RAG, and credential-based access control), and Helm charts for Kubernetes deployment.
- Hologram App, an open-source Verifiable User Agent for iOS, Android, and Huawei AppGallery: end-to-end encrypted DIDComm messaging, credential wallet, NFC document reading, biometric liveness detection, audio/video calls, and parental controls. Extend it, or build your own against the Verifiable Trust spec.
- MCP servers, reusable Model Context Protocol servers for real-world tools: Wise, GitHub, X (Twitter), and a growing catalog of ecosystem integrations.
- Verifiable Services, reference issuers and utilities deployed on the Verana network: the Avatar issuer, the Government Digital ID issuer (passport NFC + liveness), and a portfolio of AI agents.
- Verana infrastructure components, co-maintained with the Verana Foundation: VPR blockchain node, Frontend, Resolver, Indexer, Visualizer, testnet faucet.
All Open Source. All self-hostable. All running in production somewhere today.
Browse github.com/2060-io ↗Practice 04
Consulting & Advisory
Specifications and open source are necessary but not sufficient. Deploying them correctly takes experience most organizations do not yet have in-house. We fill that gap.
- Ecosystem design, help a government, industry consortium, or large enterprise design a trust registry: credential schemas, governance framework, permission tree, fee structure, grantor model.
- Technical due diligence, independent assessment of decentralized identity and verifiable credentials stacks for strategic buyers, auditors, or regulators.
- Architecture review and advisory, short, focused engagements for teams building on DIDs, Verifiable Credentials, DIDComm, MCP, or the Verana network. Code review, threat modeling, performance analysis, migration strategy.
- Custom development, where off-the-shelf open source does not reach, we build the missing pieces: custom MCP servers, custom Agent Packs, custom credential schemas, custom verifier flows, custom trust-resolution UIs.
- Managed operation, for clients that want a sovereign deployment without operating it themselves, we run the stack under an operational agreement. You own the DIDs and the data; we run the pods and the on-call rotation.
- Training and enablement, developer workshops on the Hologram stack, the Verifiable Trust spec, the VPR, MCP, and DIDComm. Remote or on-site.
Engagement
How We Work
| Model | Duration | Fit |
|---|---|---|
| Advisory retainer | Monthly, open-ended | Leadership teams that need strategic and technical input on verifiable trust, DIDs, and agentic AI. |
| Specification engagement | 2–6 months | Ecosystems or consortia that need a protocol written, reviewed, or standardized. |
| Proof-of-concept / pilot | 6–12 weeks | Demonstrating the Verana + Hologram stack for a specific use case, end-to-end. |
| Implementation project | 3–9 months | Custom credential schemas, MCP servers, trust-resolution flows, bespoke integrations. |
| Managed operation | Annual | Running a sovereign deployment on behalf of a client with SLAs and compliance support. |
| Ecosystem-as-a-Service | Multi-year | Standing up and operating a full trust registry on the Verana network, including grantor services. |
Every engagement starts with a short scope document, a handful of pages, covering objective, deliverables, milestones, assumptions, and commercial terms. No multi-month sales cycle.
Start a Scope Conversation