About Cedalio

Cedalio is a platform that uses blockchain technology to build apps with information verifiability that is auditable by default.
With Cedalio, the data used in your application can be traced back to its origin for verification and validation. Even more, with us you can give your users real ownership and portability of their data across different applications.
With Cedalio developers can easily store data with the same scalability and DX of the traditional databases, but with the benefits of web3.

How it works

Cedalio offers a convenient GraphQL API for seamless access, creation, and management of a decentralized database. For a more in depth technical explanation on how Cedalio is architectured, read the following section.
In a nutshell, to interact with Cedalio, you will:
  1. 1.
Define your schema with GraphQL and just focus on building. No need to know Solidity, understand about blockchains or operate your infrastructure. Field-level certifications offers a means to validate the data's integrity, creating trust and assurance in the accuracy of the information.
  1. 2.
Store data with on-chain verifiability in a cost-effective way, and accelerate your path to decentralization by giving users control over their data. The access control rules are stored in a smart contract, ensuring a censorship-resistant database.
  1. 3.
Get valuable insights into how your app data is stored and used. Share tokenized data openly with your community to enhance transparency and traceability. By recording a detailed log of transactions on the blockchain, we enable auditability and the ability to reconstruct the database if needed.

What can you build

Medical records storage
The user actually owns their medical data and can port it when and where they want. Personal health data can be crowd-sourced to help researchers develop new drugs.
[Security] [Sovereign data]
Transparent supply chains
Verification system that offers transparency and integrity to sustainable supply chains. Traceable data on quality, safety, and origin of the products.
Decentralized social
Strong end-to-end encryption, data controlled only by the user’s own key and native commerce with crypto payments. Users can own their history of posts and interactions.
[Sovereign data] [Censorship resistance]
User controlled identity
Reduce the risk of data breaches by empowering users to bring their own data to a session, including credentials, preferences, files, and other private data.
[Security] [Sovereign data]
dStorage for dApps
An application is only as decentralized as its most centralized layer. So for applications that require decentralization, the entire stack needs to be decentralized.
[Privacy] [Security]
NFTs metadata
Store mutable NFT metadata easily with custom annotations and GraphQL queries. Define on chain access policies.
[Security] [Censorship resistance]