Build digital systems
that regulators trust

What We Build

Three domains.
One design philosophy.

Every engagement starts from regulated reality—governance, auditability, data residency, and operational constraints are first-class concerns, not afterthoughts.

01

Digital Assets & Tokenization

Program design for regulated tokenization — RWA workflows, asset lifecycle management, and permission models. Smart contract implementation with issuance, registry, and compliance hooks. Integration-ready for custody, reporting, audit trails, and enterprise systems.

RWA WorkflowsSmart ContractsCompliance HooksCustody Integration
02

L2 / Consortium Network Delivery

Feasibility and architecture for consortium or national-scale networks — operator models, governance frameworks, and upgrade processes. Pilot-to-production rollouts with validator onboarding, monitoring, and operational runbooks. Interoperability planning with EVM tooling and careful bridge strategy.

Consortium NetworksValidator OpsGovernanceEVM Interop
03

Privacy & ZK Infrastructure

Selective disclosure patterns for identity, credentials, and compliance-by-design. Privacy architecture reviews — what should be private, how, and why. Prototype development where zero-knowledge proofs materially reduce data exposure and regulatory risk.

Selective DisclosureZK ProofsPrivacy Arch ReviewCompliance by Design
Engagement Outputs

Formal Deliverables

Each engagement produces concrete, auditable artifacts — not slide decks with aspirational timelines.

01

Discovery & Requirements Pack

Constraints mapping, risk model, regulatory landscape, and target outcomes — documented and agreed upon before a single line of code is written.

02

Architecture & Implementation Plan

Sequencing, dependencies, cost estimates, and timeline with clear decision points. Vendor selection rationale included where applicable.

03

Pilot Build

Working prototype with defined success metrics and a production rollout plan. Not a demo — a system you can test against real scenarios.

04

Security & Readiness Artifacts

Threat model, control mapping, operational runbooks, and incident response planning. Built to satisfy auditors, not just internal checkboxes.

05

Capability Transfer

Comprehensive documentation, team training, and structured handover support. Your team owns and operates the system when we're done.

How We Work

Procurement-friendly.
Milestone-driven.

Structured phases with clear gates, deliverables, and decision points. Designed for organizations that need governance around vendor engagements.

Phase 0

Discovery

2–4 weeks

Scope definition, constraint mapping, governance requirements, and threat modeling.

Gate: Signed scope & requirements document
Phase 1

Design

2–6 weeks

Architecture decisions, vendor selection, integration design, and delivery planning.

Gate: Architecture sign-off & budget approval
Phase 2

Pilot

6–12 weeks

Build, test, and validate against measurable success criteria in controlled environments.

Gate: Pilot success criteria met & stakeholder review
Phase 3

Production

3–9 months

Hardening, security audits, operational readiness, and phased rollout with capability transfer.

Gate: Security audit passed & go-live approval
Selected Engagements

Reference
Architecture Work

Engagements described below are illustrative of work type and scope. Named references available under NDA upon request.
01
Southeast Asia · Banking · 2024

Asset Tokenisation Platform

MAS FrameworkERC-3643ISO 27001

A tier-1 commercial bank deployed a compliant tokenisation platform for real estate fund interests. The system manages investor onboarding under KYC/AML obligations, token lifecycle, and audit trail generation compatible with central bank reporting requirements.

LiveRef. on request
02
Middle East · Capital Markets · 2024

Consortium Network Architecture

DFSA GuidelinesEVM L2Governance Design

A licensed securities exchange evaluated L2 network architecture for digital securities settlement and clearing. Engagement covered governance model design, validator onboarding, and regulatory disclosure obligations under financial infrastructure guidelines.

PilotRef. on request
03
Europe · Financial Infrastructure · 2023

Privacy Architecture for Digital Currency

MiCAGDPRZK Architecture

A central bank explored ZK-based privacy architecture for a retail digital currency pilot, balancing transaction privacy requirements with AML traceability obligations. Engagement produced a formal privacy model and regulatory disclosure framework.

ResearchRef. on request
Security Posture

Security as a standard,
not a feature

We don't bolt security on at the end. It's embedded in every phase, every decision, every artifact we produce.

Security-First SDLC
Access controls, code review processes, and CI/CD pipeline hygiene are non-negotiable components of every build.
SDLC Standard
ISO 27001-Aligned Controls
Control objectives aligned with ISO 27001 where applicable. We're precise about what "aligned" means — and don't overclaim.
ISO 27001
Key Management & Monitoring
Cryptographic key management, comprehensive monitoring and logging, and incident response planning delivered as standard.
HSM / KMS
Independent Audit Support
Technical readiness documentation, third-party audit coordination, and remediation planning. Built to satisfy external examiners, not just internal checkboxes.
Audit-Ready
Regulatory Familiarity
MAS TRMSingapore
HKMA CIRMHong Kong
MiCAEuropean Union
DORAEuropean Union
NYDFS 23 NYCRR 500United States
DFSAUAE
Why Ecodark Lab

Not another strategy consultancy

Execution-oriented

We ship pilots and production systems, not strategy decks. If it can't run in a regulated environment with real users, it's not done.

Regulated reality

Governance, auditability, data residency, and operational constraints aren't afterthoughts — they're the starting point for every design decision we make.

Proven stack

EVM ecosystem, L2 frameworks, and ZK/privacy patterns — applied pragmatically. We use what's proven in production, not what's trending.

Our principals have led digital asset infrastructure programs at regulated financial institutions and government bodies across Southeast Asia, the Middle East, and Europe.

Get Started

Let's scope
your project

Tell us about your system, your constraints, and where you want to be. We'll reach out as soon as possible with an honest assessment of whether we're the right fit.

Singapore · Southeast Asia · Global