The data behind the oldest anarchy server in Minecraft

Have you ever wondered what really goes on in the infamous and chaotic world of 2b2t, Minecraft's oldest anarchy server? Ever wished you could get rare insights into the players, places, events, and rich history that have defined this boundary-pushing community over the past decade? Our new 2b2t API gives you access to data and tools to satisfy your curiosity and enhance your experience with this one-of-a-kind server.

Easy solutions to complex engineering problems

Encrypt card data and streamline PCI DSS compliance

Using evervault to encrypt credit card data reduces the burden of becoming PCI compliant, so you can demonstrate PCI compliance to partners in days, rather than months. Save $100k+ and months of engineering time.

Learn more

Secure data with four simple Primitives

Primitives are building blocks for developers. They're fundamental, interoperable products for constructing any data security or compliance workflow.

Relay

An encryption proxy which can be configured to encrypt or decrypt data within a network request. No additional configuration required.

Read the docs

Server listening on port 8080

ssn:

123-45-6789

ev:ybCk5...

email:

claude@shannon.org

ev:F/kSPiMA8a=f...

password:

shannon10e120num

ev:DjOpXSdjn4...

phone:

+123456789

ev:iO=x...

pan:

4242424242424242

ev:l$9jAtm1SW...

name:

Claude Shannon

ev:7pB2&6hq...

ssn:

123-45-6789

ev:ybCk5...

email:

claude@shannon.org

ev:F/kSPiMA8a=f...

password:

shannon10e120num

ev:DjOpXSdjn4...

phone:

+123456789

ev:iO=x...

pan:

4242424242424242

ev:l$9jAtm1SW...

name:

Claude Shannon

ev:7pB2&6hq...

https://

Functions

Secure serverless functions that allow you to run logic on encrypted data, without exposing your infrastructure to sensitive information.

Read the docs
Playground
1const isValid = await ev.run('validateEmail', { encrypted });
2console.log(isValid ? 'Valid Email' : 'Invalid Email')
1// Encrypted payloads are automatically decrypted
2exports.handler = async function({ encrypted }){
3  const regex = new RegExp('[a-z0-9]+@[a-z]+.[a-z]');
4  return regex.test(encrypted.emailAddress);
5};

UI Components

Embeddable components which minimize your compliance burden by allowing you to collect and display cardholder data without touching it in plaintext.

Read the docs
Playground

Cages

Deploy any Docker Container to a Secure Enclave with no additional configuring or provisioning required. Verify the integrity of your code using built-in attestation.

Powered by an easy-to-use, developer-friendly platform

All Primitives share a common suite of platform features that enhance security and ensure evervault fits neatly into your existing infrastructure.

SDKs and REST API

Use language-specific SDKs or our REST API to integrate evervault seamlessly.

Usage Logs

Get full visibility into how your Primitives are being used.

Alerting

Configure alerts on Primitives to notify you when specific events occur.

Data Policies

Set clear rules that dictate how and when encrypted data can be decrypted.

Allow Decryptionfor
api.stripe.com
when Request IP equals
92.158.1.38
and Region equals
US (Virginia)
Add condition
Allow Decryptionfor
api.twilio.com
when Timestamp is before
20/08/2024
and Region equals
EU (Ireland)
Add condition

Audit Logging

Keep track of all user activity within your evervault Team.

Claudecreated Inbound Relayapi-stripe-com
Nevcreated API KeyEU Resources Key
Eoindeleted Functionvalidate-credit-card
Annainvitedsteve@acme.co
Thomasupdated Outbound Relayapi.adyen.com
Thomascreated Outbound Relayapi.adyen.com
Saradeleted API KeySynthetics Test
Dylancreated Cagehello-cage

Access Control

Control which members of your team can access and modify Primitives.

Why trust us?

evervault is secure by default. We build, manage, and implement security best practices into the platform so you don't have to.

Fundamentally Configurable

evervault products work together and can be adapted to any type of solution.

Ultra-Low Latency

Encryption and decryption operations introduce a minimal latency penalty.

Write and Deploy in Seconds

Built so developers spend less time and money on data security and compliance.

Dual Security Model

We store encryption keys, you store data as you normally would — but fully encrypted.

Compliance

We’re fully compliant under PCI DSS, HIPAA, GDPR and SOC2.

Enclave-backed

Built on isolated, hardened, and highly constrained secure enclaves.

Volume

evervault processes millions of encryption operations every day.

Globally Distributed

evervault resources are deployed in multiple regions to optimize uptime.

Scalable Pricing

Affordable, scalable pricing where you only get charged for what you use.

Tog5G ZeJ/ bI 9AjmglP rh23 fBrfS9X kL4K8BrO kz pC isI9QaYA4 ZO h mvCE-ZM5I/tWN

Meet compliance requirements. Build customer trust.

Use Evervault’s flexible building blocks to keep your customers’ data secure and compliant at all times.