Also available as PDF: Download Business Plan (PDF)

guardianmesh

Business Plan

Communication that works when nothing else does.

GuardianMesh Architecture Diagram

guardianmesh Inc. • Corporation No. 1775511-2

Federally Incorporated under CBCA • Victoria, BC

March 2026 • Version 1.1

CONFIDENTIAL

Important Notices

Forward-Looking Statements. This business plan contains forward-looking statements and projections based on assumptions and estimates made by guardianmesh Inc. management. These statements involve known and unknown risks, uncertainties, and other factors that may cause actual results, performance, or achievements to be materially different from those expressed or implied. Forward-looking statements include, but are not limited to, statements about projected revenues, market opportunities, product development timelines, and funding objectives. Readers are cautioned not to place undue reliance on these statements. guardianmesh Inc. undertakes no obligation to update or revise any forward-looking statements to reflect new information, future events, or changed circumstances.

Securities Notice (NI 45-106). guardianmesh Inc. is a corporation incorporated under the Canada Business Corporations Act (CBCA), Corporation No. 1775511-2. Any offering of securities by guardianmesh Inc. will comply with applicable Canadian securities legislation, including National Instrument 45-106 – Prospectus Exemptions and any applicable provincial securities laws in British Columbia and other relevant jurisdictions. This document does not constitute a prospectus or offering memorandum. Nothing herein shall be construed as a public offering of securities. Prospective investors should seek independent legal and financial advice.

Confidentiality. This document is strictly confidential and has been prepared solely for the use of the intended recipient. By receiving this document, the recipient agrees to treat all information contained herein as confidential and proprietary to guardianmesh Inc. The recipient shall not reproduce, distribute, or disclose any portion of this document to any third party without the prior written consent of guardianmesh Inc. Upon request, this document and all copies must be returned or securely destroyed.

This document does not constitute an offer to sell or a solicitation of an offer to buy any securities in any jurisdiction. No representation or warranty, express or implied, is made as to the accuracy, completeness, or fairness of the information and opinions contained in this document. guardianmesh Inc. and its directors, officers, employees, and advisors accept no liability whatsoever for any loss arising from any use of this document or its contents. All financial projections are illustrative only and are subject to change without notice.

guardianmesh Inc. • Corporation No. 1775511-2 • CBCA

ES Executive Summary

guardianmesh Inc. (Corporation No. 1775511-2, CBCA) is a federally incorporated Canadian company headquartered in Victoria, British Columbia, building a decentralized emergency communication platform designed to operate when traditional infrastructure fails. Founded by Bruce deGrosbois—a developer with 25 years of experience who launched his first platform in 2002—the company has completed two years of intensive, full-time development at a pace of 10 hours per day, six days per week. This sustained commitment has produced over 182,000 lines of production-ready code, 9,000+ passing automated tests, and 34 novel intellectual property innovations spanning cryptography, distributed networking, and secure communication protocols. guardianmesh Inc. is pre-revenue and production-ready. There are currently no signed contracts or active LOIs; government pipeline engagement begins at funding close. The seed round funds the transition from technical completion to first paid contract.

7Transport Types
182K+Lines of Code
9,000+Passing Tests
34IP Innovations
$19,500Cash Invested

The Opportunity

3.7 billion people worldwide lack access to reliable connectivity, leaving entire communities cut off during emergencies when they need communication most. Critical infrastructure—power grids, cellular towers, internet exchange points—remains a single point of failure during natural disasters, conflict, and state-directed shutdowns. Press freedom is in measurable decline in over 70% of countries globally, creating urgent demand for censorship-resistant communication tools. Simultaneously, the enterprise end-to-end encryption market is expanding rapidly as organizations recognize the legal, reputational, and operational risks of unprotected communications. guardianmesh addresses all four of these converging forces with a single, unified technical platform.

The Solution

guardianmesh delivers a three-product platform: the Guardian Mesh SDK (a standalone, open-source developer toolkit), the GuardianMesh infrastructure backbone (decentralized relay network), and the Ratchet App (a consumer and enterprise emergency communication application). The platform supports seven independent transport types—WebRTC, WebSocket, Bluetooth Low Energy, Wi-Fi LAN, Tor, satellite, and sneakernet—enabling communication across any available medium, including no internet at all. Security is implemented in six layers, incorporating the Signal Protocol (X3DH + Double Ratchet), MLS RFC 9420 group messaging, Noise XX federation, Ed25519 identity, AES-256-GCM encryption, and onion routing. Every cryptographic primitive is auditable, with zero reliance on closed-source dependencies.

The Ask

guardianmesh Inc. is raising a $1,500,000 CAD seed round to fund 24 months of runway covering core engineering hires, intellectual property protection (patent filing and trademark registration), and initial go-to-market execution including enterprise pilot partnerships, NGO integrations, and developer ecosystem growth. The company's founder has already invested $19,500 CAD in direct cash expenses and committed $624,000 in sweat equity — demonstrating technical execution and founder conviction. Pre-money valuation is determined through investor discussions based on forward revenue potential, not cost-basis. The company currently has zero paying customers; the seed round's primary success metric is first paid contract — validating the platform commercially.

Revenue Projections: Year 1: $25,000 (partial-year government pilot + SDK/enterprise) • Year 2: $450,000 (provincial contracts + enterprise) • Year 3: $1,200,000 (federal + provincial + enterprise scale). Government revenue reflects realistic 12–18 month procurement cycles; Year 1 assumes pipeline conversations begin at funding close.

PART I: The Opportunity

The world's communication infrastructure is fragile — built for ideal conditions, not for the crises and communities that need it most. GuardianMesh addresses a fundamental gap: the absence of a resilient, privacy-preserving, incentivized mesh communication layer that works when everything else fails.

1 Problem Statement

Modern communication is critically dependent on centralized infrastructure that fails precisely when people need it most. When disasters destroy cell towers, entire regions lose the ability to coordinate emergency response. When remote communities lack coverage, they remain invisible to the digital economy and emergency services alike. When authoritarian regimes or corporate intermediaries block conventional apps, journalists, activists, and ordinary citizens lose their voice. The underlying assumption — that a functioning internet or cellular network is always available — is demonstrably false for billions of people worldwide.

Five Core Structural Problems

Why Existing Solutions Fall Short

Solution Offline Multi-Transport No Phone # Incentives Open Source Decentralized
Signal
Briar ✓¹
Bridgefy ✓²
goTenna
Meshtastic ✗³
Helium
GuardianMesh

¹ BLE and WiFi Direct only — no LoRa, satellite, or internet transport.

² BLE only — highly range-limited, no multi-hop relay.

³ LoRa only — requires dedicated hardware dongle.

GuardianMesh scores highest on architectural breadth and government/enterprise feature depth. Competitors have meaningful strengths this table does not fully capture: Signal has 40M+ active users and deep institutional trust; Meshtastic has an established hardware community and real-world deployments; Briar is trusted by activist and journalist communities. GuardianMesh’s differentiation is the unified platform approach — brand recognition and adoption must be earned through market execution.

2 Market Opportunity

The global demand for resilient, privacy-preserving communication is accelerating across multiple high-value sectors. GuardianMesh addresses a large and underserved market at the intersection of emergency preparedness, enterprise security, and decentralized infrastructure.

Total Addressable Market

$32BTAM — Global Enterprise Encrypted Comms
$4.2BSAM — Offline-Capable Secure Messaging
$50MSOM — Year 3 Serviceable Market

SOM represents the total government emergency management and targeted enterprise segment GuardianMesh is positioned to service by Year 3. Year 3 projected revenue of $1.95M represents ~3.9% initial capture of the SOM — consistent with early-stage market penetration.

Key Market Segments

Segment Context Growth Drivers
Emergency Response Fire, flood, earthquake, and hurricane response teams lose cellular infrastructure exactly when coordination is most critical. FEMA, Red Cross, and municipal agencies require offline-capable, interoperable comms. Climate disasters up 3x since 1980s; FEMA budget for comms resilience growing 18% YoY; Maui 2023 and Hurricane Ian exposed catastrophic gaps.
Remote Communities 3.7 billion people lack reliable internet access. Indigenous communities, rural areas, island nations, and developing regions need communication infrastructure that doesn't depend on telco investment. UN Sustainable Development Goals; rising demand for digital inclusion; satellite costs declining but last-mile gap persists; community mesh deployments growing in Latin America and Southeast Asia.
Humanitarian & NGO MSF, ICRC, and 50,000+ NGOs operating in conflict zones and disaster areas require communications that function under adversarial network conditions and cannot be intercepted by hostile state actors. Conflict zones in Ukraine, Sudan, and Myanmar demonstrated the need; donor mandates for secure comms increasing; Signal blocked in multiple jurisdictions.
Enterprise Security Fortune 500 companies, financial institutions, and critical infrastructure operators require zero-trust communications that cannot be surveilled by cloud providers or intercepted during network outages. Zero-trust adoption growing 17% CAGR; SEC cyber disclosure rules; supply chain attack awareness post-SolarWinds; enterprise demand for self-hosted secure comms.
Journalism & Activism 130+ journalists imprisoned annually; press freedom declining in 70% of countries. Investigative journalists, whistleblowers, and civil society organizations require metadata-resistant, censorship-proof communication. CPJ and RSF reporting record journalist arrests; Pegasus spyware revelations; Freedom of the Press Foundation partnerships; Signal blocked in Iran, Russia, China.
Defence & Intelligence Military units, intelligence agencies, and national security contractors require OPSEC-grade communications that function in denied, degraded, and intermittent environments (DDIL) without reliance on adversary-controlled infrastructure. NATO DDIL communication requirements; US DoD Modernization priorities; DARPA mesh networking programs; lessons from Ukraine battlefield communications.
IoT & Industrial Industrial IoT deployments in mining, offshore energy, agriculture, and logistics require secure device-to-device messaging without continuous cloud connectivity. 15.1 billion connected devices by 2030. Industry 4.0 automation; edge computing adoption; OT/IT convergence security; LoRa and BLE 5.0 hardware maturation enabling low-power mesh networking at scale.

Why Now: Five macro-forces are converging to create an ideal market entry window. (1) Climate disasters have increased 3x since the 1980s, exposing critical gaps in emergency communication infrastructure. (2) Declining press freedom in 70% of countries creates urgent demand for censorship-resistant tools. (3) BLE 5.0 hardware maturation has made low-power mesh networking viable on commodity smartphones without custom hardware. (4) Post-Snowden privacy awareness has fundamentally shifted enterprise and government procurement toward zero-trust, metadata-resistant solutions. (5) Enterprise zero-trust adoption growing at 17% CAGR is expanding the buyer universe beyond traditional security-conscious niches into mainstream enterprise.

3 Competitive Landscape

GuardianMesh occupies a unique position in the secure communications landscape — the only solution combining multi-transport offline resilience, self-sovereign identity, cryptographic relay incentives, and open-source auditability in a single platform.

Feature Comparison: GuardianMesh vs. Alternatives

Solution Transport Types Offline Capable Relay Incentives Identity Model Hardware Required E2E Encryption
GuardianMesh 7 (BLE, WiFi Direct, LoRa, Satellite, Tor, Internet, Radio) Yes Credit economy (relay receipts) Self-sovereign (Ed25519) No Signal Protocol + MLS RFC 9420
Signal 1 (internet) No None Phone number No Signal Protocol
Briar 2 (BLE + WiFi Direct) Partial None Username (Bramble ID) No Bramble Protocol
Bridgefy 1 (BLE) Yes None Device ID No Proprietary (E2E added later)
goTenna 1 (radio ASKOS band) Yes None Device ID Yes ($179+) Proprietary (AES-256)
Meshtastic 1 (LoRa) Yes None Device ID Yes ($30+) AES-256

Defensibility: Moat Analysis

GuardianMesh's competitive position is reinforced by four compounding moats that become stronger as adoption grows:

PART II: The Solution

GuardianMesh is a vertically integrated communications platform built from first principles. Where Part I outlined the surveillance crisis and market opportunity, Part II details the technical solution: a production-ready SDK, infrastructure backbone, and consumer application that together form a production-ready, privacy-preserving mesh communications stack with breadth of transport and security depth not currently matched by any single competing platform.

The platform spans 182,000+ lines of code, 9,000+ tests across 525 files, and 34 formally identified IP innovations — all developed by a single founder with 25 years of engineering experience, proving that focused expertise can out-execute large teams on deeply technical problems.

4 Product Suite

GuardianMesh is a three-product platform totalling 182,000+ lines of production code. Each product is independently valuable and revenue-generating, while the combination creates a durable competitive moat through cross-product network effects.

Product 1: guardian-mesh-sdk

A standalone npm package that will be published for third-party developers. The SDK provides the cryptographic and networking primitives needed to build any privacy-preserving mesh application — without requiring developers to understand the underlying protocols.

Product 2: Guardian Infrastructure

A field-test ready infrastructure backbone consisting of a TypeScript signaling server and a Python Flask backend with eight specialized services. Operators deploy this stack to run Guardian nodes and earn credit payouts for relaying traffic. Includes optional persistent guardian registration with encrypted key backup, self-service balance portal, and emergency deregistration for operators in hostile environments.

Component Stack Port Function
Signaling Server TypeScript / WebSocket Guardian relay, Noise XX federation
Admin Dashboard Python Flask + MongoDB 3001 Operations, accounting, HR, Groq AI automation
Guardian API Python Flask + SQLite 3002 Node directory, credits, revenue settlement
Guardian Map Python Flask 3004 Network visualization SPA
Guardian Web Python Flask 3005 Marketing site server
Employee Portal Python Flask + MongoDB 3006 Staff self-service portal
Corporate Portal Python Flask + MongoDB 3007 Shareholder portal
Investor Portal Python Flask + MongoDB 3010 Subscriptions, Stripe payments, KYC, classification
Email Service Python Flask + Celery 13009 Templates, event bus, webhooks, analytics

Groq AI Integration: 46 AI endpoints across 7 domains: accounting (8), HR (7), corporate (6), revenue (3), fundraising (8), approval queue (4), and employee self-service (3). Fundraising AI includes grant discovery, sponsor matching, pitch optimization, and application drafting. All features disabled by default and require explicit opt-in. A 47-field PII firewall ensures personally identifiable information is never transmitted to external AI services — only sanitized, SHA-256-hashed identifiers appear in AI audit logs.

Product 3: Ratchet Mobile App

Ratchet is the consumer-facing application: an end-to-end encrypted messaging and emergency communications platform built on React Native with Expo SDK 55. It is the proof-of-concept that demonstrates the SDK's full capabilities in a production mobile environment.

SDK Network Effect: Every third-party app built on guardian-mesh-sdk strengthens the Guardian node network. More apps → more relayed traffic → more guardian payouts → more nodes deployed → better coverage for all users. This creates a virtuous cycle where the SDK’s open-source adoption directly monetizes the infrastructure business — a dynamic unavailable to single-product competitors.

5 Technical Architecture

GuardianMesh is architected as a layered defense system. No single failure — technical, legal, or infrastructural — can compromise user privacy or disrupt communications. Each layer is independently designed and verified.

7 Transport Types

The SDK implements seven distinct transport mechanisms, enabling communication across any physical environment. The adaptive transport scorer selects the optimal path based on latency, reliability, and censorship risk.

Transport Medium Range Infrastructure Use Case
BLE Mesh Bluetooth LE ~100 m/hop None (peer-to-peer) Offline proximity; no infrastructure required
WebRTC Internet Global STUN/TURN servers Browser-to-browser real-time communication
LAN / mDNS Ethernet/Wi-Fi Local network None Same building or campus; no infrastructure
Guardian Relay Internet Global Guardian nodes Always-on backbone; persistent relay network
Tor Internet Global Tor network Anonymity and censorship bypass
Satellite Satellite RF Global Iridium/Starlink Remote and maritime areas; no ground infrastructure
Sneakernet Physical (QR/USB) Physical None Air-gapped transfer; extreme network denial

6-Layer Defense-in-Depth

Privacy is not a feature — it is the architecture. Six independent defensive layers ensure that even a complete compromise of any single layer cannot expose user data or disrupt service.

Layer Name Mechanism Threat Defeated
1 Hybrid Mesh 7 transports with adaptive scoring; epidemic routing with hop-based TTL Network takedown, ISP blocking, infrastructure seizure
2 Self-Sovereign Identity SHA-256(Ed25519 pubkey); no phone/email registration Identity correlation, subpoena for subscriber records
3 Distributed Storage Reed-Solomon erasure coding (WASM); secure deletion; no central message store Server seizure, data retention orders
4 Metadata Resistance 3-hop onion routing with cover traffic; mixing Traffic analysis, timing correlation attacks
5 App Independence P2P APK distribution via mesh; no app store dependency Platform bans, app store removal, vendor lock-in
6 Escape Routes Satellite, radio, diaspora gateways; sneakernet transport Total internet shutdown, extreme censorship scenarios

Cryptographic Foundation

All cryptographic primitives are implemented via the @noble/* library family — pure JavaScript, zero external dependencies, independently audited. This eliminates supply-chain risk from native crypto bindings and ensures the same security guarantees across all platforms.

Delay-Tolerant Networking (DTN)

GuardianMesh implements epidemic routing with two proprietary innovations that constitute separate IP filings. Messages are wrapped in DTN bundles and propagated through the network even in the absence of end-to-end connectivity.

6 IP Portfolio

A formal IP audit identified 34 innovations across 7 categories. These innovations represent independent, defensible intellectual property — not incremental improvements to existing art. The portfolio has been structured to support both patent filings and trade secret protection depending on disclosure risk.

34 innovations · 7 categories · AccelerateIP-eligible · SR&ED-eligible R&D

Complete IP Innovation Register

ID Innovation Name Category IP Type Priority
IP-001Hop-Based TTL for DTNAlgorithmPatentableCritical
IP-002Tiered Bloom Filters with Emergency BypassAlgorithmPatentableCritical
IP-003Two-Stage Dead-Man AlertAlgorithmPatentableCritical
IP-004Network Witness ProtocolAlgorithmPatentableCritical
IP-005Adaptive Battery-Aware Cover TrafficAlgorithmPatentableHigh
IP-006Multi-Method Cascading DiscoveryAlgorithmPatentableHigh
IP-007Earned-Only Credit SystemEconomicTrade SecretHigh
IP-00850/50 Equal + Proportional SettlementEconomicPatentableCritical
IP-009Credit Account Persistence via HKDFEconomicPatentableHigh
IP-010Relay Diversity WeightEconomicTrade SecretMedium
IP-011Priority-Weighted Credits with Federation MultiplierEconomicTrade SecretMedium
IP-012Duress PIN with Decoy AccountSecurityPatentableHigh
IP-013Ed25519-Only AuthenticationSecurityTrade SecretMedium
IP-0145-Level Web-of-TrustSecurityPatentableHigh
IP-015Noise XX Handshake with DPI-Resistant Key ExchangeSecurityPatentableHigh
IP-016Warrant Canary SystemSecurityCopyrightMedium
IP-017APK Transparency LogSecurityPatentableMedium
IP-018Guardian Mesh Federation ProtocolArchitectureTrade SecretHigh
IP-019Online Logistic Regression Peer ScorerArchitecturePatentableHigh
IP-020Composite Guardian Health ScoreArchitectureTrade SecretMedium
IP-021Context-Aware Transport SelectionArchitecturePatentableMedium
IP-022Onion Routing for Mobile DTNArchitectureCopyrightMedium
IP-023Reed-Solomon Erasure Coding (WASM)ArchitectureCopyrightMedium
IP-024Secure Deletion via Partition Key RotationArchitectureTrade SecretMedium
IP-025Sneakernet Transport (QR + File)InfrastructurePatentableMedium
IP-026Satellite/Radio GatewayInfrastructureCopyrightMedium
IP-027Diaspora BridgeInfrastructurePatentableMedium
IP-028P2P APK Distribution via MeshInfrastructurePatentableMedium
IP-029BLE Peripheral Mode with GATT ServerInfrastructureTrade SecretMedium
IP-030Traffic Obfuscation LayerInfrastructureCopyrightMedium
IP-031Academic-Quality WhitepaperDocumentationCopyrightHigh
IP-032Comprehensive Threat ModelDocumentationTrade SecretMedium
IP-033Reproducible Builds SystemProcessCopyrightMedium
IP-0347-Day Soak Test AutomationProcessTrade SecretLow

Top 6 High-Priority Innovations

The following six innovations have been identified as highest commercial value based on market breadth, licensing potential, and barriers to independent reinvention.

IP-001: Hop-Based TTL — Clock-Skew Resistant DTN Measures message lifetime in relay hops rather than wall-clock time, eliminating the primary failure mode of delay-tolerant networks in environments with no NTP synchronization. Commercial value: military communications, satellite mesh, deep-space relay, industrial IoT. No prior art identified for this specific approach.

IP-002: Tiered Bloom Filters — Zero False Positives for Emergency Messages A multi-tier probabilistic deduplication architecture with a mathematical guarantee that emergency-priority messages are never suppressed by a false positive. Standard Bloom filters cannot provide this guarantee. Commercial value: emergency services, disaster response networks, medical alert systems.

IP-003: Two-Stage Dead-Man Check-In — Reduced False Positive Alerts A staged alert protocol that issues a private warning before escalating to a public emergency alert, dramatically reducing alert fatigue in personal safety applications. Commercial value: lone worker safety, human rights defender tools, domestic violence protection applications.

IP-004: Network Witness — Distributed Evidence Attestation Multiple independent nodes sign the SHA-256 hash of captured evidence (NOT the content) using Ed25519, proving existence and integrity offline without exposing the evidence to witnesses. Creates a tamper-proof chain of custody without a trusted central authority. Commercial value: human rights documentation, legal proceedings, law enforcement body camera alternatives, insurance claims.

IP-008: 50/50 Settlement Algorithm — Fair Decentralized Revenue Split A relay revenue settlement formula that splits 50% equally among all participating operators and 50% proportionally to traffic relayed, balancing incentives for small and large operators. Commercial value: any decentralized network requiring operator revenue sharing — ISP mesh, community broadband, satellite ground station networks.

IP-006: Multi-Method Discovery — 7-Level Fallback Chain A guardian node discovery mechanism that cascades through seven independent methods in decentralization order — starting from zero-infrastructure methods (LAN/mDNS, BLE, peer cache) through decentralized infrastructure (DHT, DoH, session gossip) to hardcoded seeds as the last resort — before declaring discovery failure. Makes the network censorship-resistant by eliminating any single discoverable entry point. Commercial value: censorship-circumvention tools, enterprise zero-trust networks, crisis communications infrastructure.

Patent & Protection Strategy

7 Security & Privacy

Security is not a layer applied to GuardianMesh — it is the substrate from which the platform is built. Every protocol choice, data model, and API design decision is evaluated against the threat model of a state-level adversary with full network visibility.

Cryptographic Algorithm Suite

Algorithm Standard Purpose Key Size / Output
X3DH Signal Protocol Asynchronous key agreement (pairwise messaging) X25519 ephemeral + identity keys
Double Ratchet Signal Protocol Forward secrecy + break-in recovery 32-byte chain keys, AES-256-GCM messages
MLS RFC 9420 (IETF) Scalable group key agreement TreeKEM; O(log n) key operations
AES-256-GCM NIST FIPS 197 Authenticated encryption (storage + enclave) 256-bit key, 96-bit nonce, 128-bit tag
Ed25519 RFC 8032 Digital signatures (identity, canary, evidence) 255-bit curve, 64-byte signature
X25519 RFC 7748 Elliptic curve DH key agreement 255-bit curve, 32-byte shared secret
HKDF-SHA256 RFC 5869 Key derivation (ratchet, sessions, bundles) Variable output; 256-bit PRK

Privacy Protection Architecture

Regulatory Compliance

GuardianMesh's privacy-by-design architecture exceeds the requirements of Canada's Personal Information Protection and Electronic Documents Act (PIPEDA) and is positioned for compliance with the forthcoming Consumer Privacy Protection Act (CPPA, Bill C-27). Key considerations:

8 Production Readiness

GuardianMesh is not a prototype. Every component listed below is in production-quality state: deployed, tested, and documented. The platform is ready for enterprise pilots and operator onboarding without requiring additional development work.

Component Readiness Scores

Component Stack Port Readiness Status
guardian-mesh-sdkTypeScript / npm10 / 10Field-Test Ready
Guardian APIPython Flask + SQLite300210 / 10Field-Test Ready
Signaling ServerTypeScript / WebSocket808010 / 10Field-Test Ready
Ratchet MobileReact Native / Expo 5510 / 10Field-Test Ready
Admin DashboardPython Flask + MongoDB300110 / 10Production
Employee PortalPython Flask + MongoDB300610 / 10Production
Corporate PortalPython Flask + MongoDB300710 / 10Production
Investor PortalPython Flask + MongoDB301010 / 10Production
Email ServicePython Flask + Celery1300910 / 10Production
Guardian WebPython Flask300510 / 10Production
Guardian MapReact SPA / Flask300410 / 10Production

Automated Test Coverage

All coverage thresholds are enforced in CI. The platform has 9,000+ tests across 525 files, covering unit, integration, static analysis, and end-to-end scenarios.

Project Statements Branches Functions Lines Suites / Tests
Ratchet (JS/TS)83.6%79.8%85.3%84.2%75 suites / 1,683 tests
Guardian Mesh (JS/TS)80.3%65.3%61.5%82.8%25 suites / 262 tests
Python Backend (static)14 test files
Python Backend (unit)21 test files
Python Backend (integration)68 test files
Python Backend (e2e)10 test files

Python backend: 113 test files total across four categories. Static analysis tests require no database and run in CI without infrastructure dependencies. Integration tests use MongoDB and verify end-to-end flows including AI approval queues, settlement calculations, and multi-server workflows.

Infrastructure & Deployment

PART III: Business Model & Financials

Part III presents the revenue architecture, pricing framework, go-to-market strategy, and three-year financial projections for guardianmesh Inc. Together these sections demonstrate a clear path from government pilot contracts to multi-year provincial and federal procurement, supplemented by enterprise licensing and SDK commercial adoption.

9 Revenue Model

guardianmesh generates revenue by providing resilient emergency communication infrastructure to governments and enterprises. Guardians — people who host relay nodes — are paid by the company for providing network capacity; they are a cost center, not a revenue source. Revenue comes from organizations that need the network to work when nothing else does.

1. Government Emergency Infrastructure Contracts (Primary)

When internet and cellular infrastructure fail — during wildfires, ice storms, earthquakes, or grid outages — guardianmesh stays operational. This makes the platform a natural fit for government emergency management procurement. Federal, provincial, and municipal agencies contract guardianmesh Inc. to deploy and maintain emergency communication infrastructure within their jurisdictions.

Level Example Agencies Contract Type Typical Value
Municipal BC municipal emergency mgmt Pilot deployment $50K–$100K / yr
Provincial Emergency Management BC, Ontario EMO Multi-year infrastructure $100K–$250K / yr
Federal Public Safety Canada, DND, Indigenous Services Large-scale deployment $250K–$1M+ / yr
International UNHCR, Red Cross (future) Humanitarian deployments $100K–$500K

Note on SDK & Open-Source Strategy. The guardian-mesh-sdk is dual-licensed under AGPL-3.0 and a commercial license. The SDK will be published publicly after intellectual property protections are in place (patent filings from the seed round Legal/IP budget). Once published, the source code will be fully auditable — building trust with security-conscious government and enterprise buyers. SDK adoption and enterprise licensing are pursued as network-growth and IP-validation mechanisms, not as direct revenue streams at this stage. Non-dilutive grants (SR&ED, IRAP, PacifiCan RDII) supplement cash flow and are tracked separately from operating revenue.

The Guardian Credit Economy. guardianmesh operates an internal credit economy to incentivize relay node operators (Guardians). Revenue from all sources — government contracts, corporate sponsorships, licensing — is injected into monthly accounting periods. The company determines the credit price and the total monthly payout pool based on revenues available. Guardians are paid via a 50/50 equal-plus-proportional settlement: half split equally among all active Guardians, half proportional to relay credits earned. Credits are weighted by message priority (Emergency=100, High=25, Normal=5, Low=2, Bulk=1). Guardians may request payout via cryptocurrency or bank transfer ($5 minimum). This creates a self-sustaining loop: more revenue funds more guardian payouts, attracting more node operators, increasing network density and reliability — making the platform more valuable to the next customer.

10 Pricing Strategy

Primary revenue is from government contracts, supplemented by corporate sponsorships and licensing. The SDK is dual-licensed (AGPL-3.0 + commercial) and will be published after IP protections are filed — not a direct revenue stream at this stage. Government contracts are structured as multi-year agreements with an initial deployment fee plus annual support and maintenance, following Treasury Board guidelines for Canadian federal procurement.

Government Contract Framework

Component Structure Typical Range
Initial Deployment Fixed fee $50K–$250K
Annual Support & Maintenance 18–22% of deployment fee $9K–$55K / yr

Government contracts are priced for multi-year engagement with predictable budget allocation. The Ratchet consumer app builds guardian relay network density and provides real-world deployment proof — both of which support government contract sales. Non-dilutive grants (SR&ED, IRAP, PacifiCan RDII) supplement operating cash flow and are applied for independently of contract revenue.

11 Go-to-Market Strategy

guardianmesh employs a two-phase go-to-market approach: launch the Ratchet consumer application to seed the guardian relay network and build demonstrated deployment density, then win government emergency management contracts through direct procurement engagement, grant programs, and agency partnerships.

Phase 1 — Consumer Launch (Q2–Q3 2026)

Phase 2 — Government Sales & Procurement (2027)

Key Acquisition Channels

Channel Audience Primary Goal
Government Procurement Defence, public safety agencies Contract revenue, long-term relationships
App Stores End consumers User growth, relay network density, real-world proof
NGO Partnerships Humanitarian orgs Field validation, press coverage, grant eligibility
GitHub Developers / Security researchers Technical trust signals, open-source credibility
Conference Presence PSPC, emergency mgmt agencies Procurement pipeline, sector visibility

12 Financial Projections

Three-year projections reflect a conservative ramp from first government pilot to multi-contract scale. All revenue is from government contracts. Year 1 focuses on securing the first municipal pilot; Year 2 on provincial expansion; Year 3 on federal contracts and full provincial scale. Non-dilutive grants (SR&ED, IRAP, PacifiCan) supplement cash flow and are not included in these figures.

Revenue Projections

Revenue Stream Year 1 Year 2 Year 3
Government Contracts $25,000 $450,000 $1,200,000
TOTAL REVENUE $25,000 $450,000 $1,200,000

Note on Year 2 projection: The jump from $25K (Y1) to $450K (Y2) is an 18x increase that requires multiple provincial contracts to activate within the same 12–18 month procurement cycle this document acknowledges. For Y2 revenue to be achieved, Standing Offer registration with PSPC must begin in Q1 Y1 and at least two provincial contracts must reach award by Q1–Q2 Y2. This is an optimistic but achievable scenario — not a guaranteed outcome. Investors should model a conservative case where Y2 government revenue is $150K–$250K, with $450K reached in Year 3.

Expense Projections

Expense Category Year 1 Year 2 Year 3
Salaries & Benefits$435,000$505,000$680,000
Guardian Payouts (80% pool)$8,000$60,000$180,000
Cloud Infrastructure$24,000$36,000$72,000
Legal & IP$40,000$35,000$35,000
Marketing & PR$20,000$40,000$80,000
Contractors$50,000$55,000$60,000
Insurance$5,000$8,000$15,000
Office & Miscellaneous$38,000$15,000$30,000
TOTAL EXPENSES$620,000$754,000$1,152,000

Profit & Loss Summary

Year 1 Year 2 Year 3
Total Revenue$25,000$450,000$1,200,000
Total Expenses$620,000$754,000$1,152,000
Net Income-$595,000-$304,000$48,000
Net Margin-2380.0%-67.6%4.0%

Year 1 net of -$595,000 reflects the ramp period as the first government pilot contract is secured and the guardian network is seeded. Year 2 net is -$304,000 (-67.6% margin) as provincial contracts begin coming online — the company is approaching breakeven as the government contract pipeline builds. Year 3 reaches 4.0% net margin with federal and provincial contracts at scale.

Government Procurement Timeline: Canadian government procurement cycles typically run 12–18 months for new vendors. Year 1 government revenue ($25K) assumes a pipeline conversation begins at funding close with a contract finalized in Q3–Q4 Y1 via Small Value Procurement or equivalent mechanism. Year 2 provincial contracts assume Standing Offer registration with PSPC initiated in Q1 Y1. Net margin note: Y3 margins of 4.0% assume government contract compliance overhead is managed within the 5-person core team scaling to 7+ as revenue grows. Contracts with significant reporting or third-party audit requirements may reduce margins by 3–7 percentage points.

13 Unit Economics

Unit economics are based on government contract values. All figures are modeled assumptions — not yet validated by paying customers. These will be updated following first paid contract.

Government Contract Economics

Metric Value Notes
Average Contract Value (ACV)$150,000 / yrWeighted average: municipal $75K, provincial $150K, federal $500K
Average Contract Duration3 yearsMulti-year agreements standard in emergency management procurement
Lifetime Contract Value (LCV)$450,000= $150K/yr × 3 years (excludes renewals)
Customer Acquisition Cost (CAC)$30,000Business development time, conferences, proposal writing, legal
LCV : CAC Ratio15 : 1Government contracts are large and sticky once deployed
Payback Period~2–4 monthsCAC recovered within first partial-year contract payment

Note: All unit economics are modeled assumptions based on typical government emergency management contract sizes. These will be validated against actual data following first paid contract.

Guardian Network Cost Economics

Guardians are the operational backbone of the mesh network. Unlike traditional infrastructure where the company owns servers, guardianmesh distributes infrastructure costs across a community of node operators. Each guardian runs a relay node on their own hardware (Raspberry Pi, home server, cloud VPS). The company pays them from the guardian pool — 80% of corporate-injected revenue flows to guardians, while 20% is retained for platform operations.

Metric Value Notes
Active Guardians (Y2 target)200Community-hosted relay nodes
Avg Guardian Payout~$25 / moFrom 80% pool (50% equal + 50% proportional)
Total Annual Guardian Cost$60,000Network operating cost — COGS for infrastructure
Messages Relayed / Guardian / Day~500Average across all priority levels
Cost per 1,000 Relays~$0.28Guardian payout per relay unit
Network Coverage per $1 Spent~3,500 relaysHighly efficient distributed infrastructure

Breakeven Analysis

Year 1 total projected expenses are $620,000. The seed round provides 24 months of runway; government contracts supplement that runway as they land. Breakeven depends on government contracts only — the sole revenue stream.

Scenario Revenue Source Annual Revenue Covers Y1 Expenses?
Partial-year municipal pilot (Y1)Government$25,000Partial (4%) — seed covers gap
Full municipal contractGovernment$75,000 / yrPartial (12%)
1 provincial contractGovernment$150,000 / yrYes — 24%
2 provincial contractsGovernment$300,000 / yrYes — covers Y2 operations

The breakeven threshold requires a single provincial emergency management contract (~$150K/yr). Given that BC alone spends over $500M annually on wildfire response and emergency management, capturing even a fraction of one percent of that budget covers guardianmesh’s entire Year 1 operating expenses.

PART IV: Funding Strategy

This section details guardianmesh Inc.'s capital formation strategy — the investment already made, the non-dilutive grant programs available, the angel and venture capital landscape, and the precise allocation of the seed round being sought. The company enters fundraising with a fully built product, proven technology, and a defensible IP portfolio.

14 Investment to Date

Founder Sweat Equity

Bruce deGrosbois has invested 2 years of intensive, full-time development at 10 hours per day, 6 days per week. At a market rate of $100/hour for senior full-stack/cryptographic engineering, this represents:

Component Value
Years of development2 years
Weeks per year52 weeks
Days per week6 days
Hours per day10 hours
Market rate (senior full-stack / cryptographic)$100/hour
Total Sweat Equity$624,000

2 years × 52 weeks × 6 days × 10 hours × $100/hour = $624,000

Cash Investment

Source Amount
Founder (Bruce deGrosbois)$15,000
Wendy Wilkins$2,000
Michelle Corbett$2,500
Total Cash$19,500

What the Investment Produced

Deliverable Metric
Production codebase182,000+ lines of code
Automated test suite9,000+ tests across 525 files
Novel IP innovations34 identified, 17 patentable
Production servers12 services deployed
SDK12 subpath exports, npm-ready, gateway + routing + obfuscation
Mobile appiOS + Android via Expo
Enterprise backend8 Flask servers, 46 AI endpoints, Stripe, email service
Security audit6-layer defense-in-depth, formal threat model
WhitepaperAcademic-quality, targeting top-tier venues
Federal incorporationCBCA Corp #1775511-2

$643,500 in founder commitment and direct cash — proof of technical execution prior to external capital ($624,000 sweat equity + $19,500 cash). Company valuation is forward-looking and based on revenue potential, not cost-basis.

15 Government Grants & Contracts Strategy

guardianmesh Inc.’s government strategy operates on two parallel tracks: (1) government contracts — the company’s primary revenue stream, where agencies procure emergency communication infrastructure as an ongoing operational service; and (2) non-dilutive grants — R&D funding programs that subsidize technology development without generating recurring revenue. The distinction is critical: contracts fund operations and pay guardians; grants fund research and extend runway.

Government Contract Pipeline

Agency Type Use Case Contract Structure Target Value
Municipal Emergency MgmtWildfire/flood comms backupAnnual service contract$50K–$100K / yr
Provincial Emergency MgmtProvince-wide emergency meshMulti-year deployment$100K–$250K / yr
Indigenous Services CanadaRemote community connectivityFederal program contract$150K–$500K / yr
DND / Canadian ForcesDDIL tactical communicationsIDEaS procurement → contract$250K–$1M+ / yr
Public Safety CanadaCritical infrastructure resilienceCSSP → operational contract$200K–$500K / yr

Canada offers one of the most generous non-dilutive funding ecosystems in the world for deep-tech startups. guardianmesh Inc. is uniquely positioned to access multiple federal and provincial programs given its focus on cryptographic infrastructure, privacy technology, and national security applications. Non-dilutive funding extends runway, de-risks development milestones, and preserves equity for strategic investors.

Federal Programs

Program Amount Type Timeline
SR&ED + BC Credit~$36K–$250K+/yrTax credit (45% combined)Annual filing
NRC IRAPUp to $500KNon-repayable grantRolling intake
PacifiCan RDIIVaries ($67.5M fund)GrantApr 15, 2026 deadline
CSIN / NCC$25K–$2.5MGrant2027 call expected
IDEaS (DND)Up to $1.2MContractCall-based
CSSP (Public Safety)Up to $2MGrantCall-based
Mitacs Accelerate$15K/internGrantOngoing
CanExport InnovationUp to $37.5KGrantRolling
NSERC Alliance$20K–$1M/yrGrantUniversity partner needed

SR&ED Eligibility: guardianmesh Inc.'s R&D activities — including novel cryptographic protocol implementation, DTN algorithm development, and mesh networking optimization — qualify as systematic investigation under SR&ED. At 35% federal + 10% BC credit on eligible expenditures, early-year claims could yield $36K–$50K+ in refundable credits.

BC Provincial Programs

Program Amount Type
Innovate BCUp to $500KEarly-stage demonstration
New Ventures BC$250K+ prizesCompetition
BC VCTC30% investor tax creditEBC registration needed
AccelerateIPFree IP strategy + patentEnds Mar 31, 2026
CDL-VancouverNetwork / mentorsAccelerator
SFU VentureLabsDeeptech acceleratorNo affiliation required

Key Program Deep Dives

NRC IRAP — Industrial Research Assistance Program

IRAP is Canada's premier innovation assistance program, offering up to $500K in non-repayable contributions for SMEs conducting R&D. An Industrial Technology Advisor (ITA) is assigned to each applicant. guardianmesh Inc. qualifies based on: (1) Canadian incorporation (CBCA), (2) fewer than 500 employees, (3) proprietary technology under active development. The mesh cryptography stack, DTN routing, and AI automation platform each constitute eligible R&D activities. IRAP funds can cover salaries for technical staff working on approved projects.

PacifiCan RDII — Regional Defence Investment Initiative

Pacific Economic Development Canada's $67.5M Regional Defence Investment Initiative targets BC-based businesses developing technologies with defence and dual-use applications, including artificial intelligence, quantum technologies, and cyber security. The April 15, 2026 deadline represents an immediate priority. guardianmesh Inc.'s censorship-resistant mesh network, cryptographic infrastructure, and emergency communication capabilities directly align with RDII's mandate to build BC's defence industrial capacity and supply chain readiness.

IDEaS (DND) and CSSP (Public Safety Canada)

The Department of National Defence's Innovation for Defence Excellence and Security (IDEaS) program and the Canadian Safety and Security Program (CSSP), managed by DND/DRDC, both fund technologies with national security applications. guardianmesh's censorship-resistant mesh network, post-quantum cryptography roadmap, and emergency communication capabilities directly address federal priorities around critical infrastructure protection and resilient communications. IDEaS contracts run up to $1.2M; CSSP grants up to $2M.

Grant Pursuit Roadmap

Phase Timeline Programs Target Funding
Near-TermQ2 2026SR&ED filing, IRAP application, PacifiCan RDII submission$36K–$536K+
Mid-TermQ3–Q4 2026CSIN preparation, Mitacs internships, Innovate BC, New Ventures BC$100K–$600K
Long-Term2027IDEaS call, CSSP call, NSERC Alliance (university partner)$500K–$3.2M

Non-dilutive funding extends runway and de-risks development, but the company’s long-term revenue model depends on converting government relationships from one-time grants into recurring operational contracts. Every grant application is also a relationship-building exercise with the contracting agency. The company's deep-tech profile, Canadian domicile, and national security relevance create an unusually strong pipeline that most seed-stage startups cannot access.

16 Angel & VC Strategy

guardianmesh Inc. will pursue a staged capital formation strategy, beginning with angel investors who can provide patient capital and operational guidance, followed by institutional venture capital as revenue traction and product milestones are demonstrated. British Columbia's investor tax credit program significantly enhances the economics for early-stage investors.

BC Angel Networks

Network Focus Notes
VANTEC Angel NetworkTechnology, deep tech, B2B SaaSVancouver's largest angel group; monthly pitch events; strong tech sector network
Keiretsu Forum VancouverBroad technology, healthcare, consumerGlobal network chapter; rigorous due diligence process; post-investment support
Angel Forum SocietyEarly-stage BC companiesBC-focused; connects founders with accredited investors; pitch competition format

BC Venture Capital Tax Credit Advantage: The BC Venture Capital Tax Credit (VCTC) provides angels with a 30% provincial tax credit on investments in eligible BC companies. guardianmesh Inc. intends to register as an Eligible Business Corporation (EBC) to offer this benefit to investors — effectively reducing the net cost of a $100K investment to $70K while retaining full upside participation.

Target Venture Capital Firms

The following Canadian venture firms have investment theses aligned with cybersecurity, privacy infrastructure, and developer tooling — the three primary value propositions of guardianmesh Inc.:

Firm Focus Stage Location
Vanedge CapitalDeep tech, cybersecurity, enterpriseSeed–Series AVancouver, BC
Version One VenturesB2B SaaS, developer tools, infrastructureSeed–Series AVancouver, BC
Panache VenturesEmerging tech, pre-seed/seedPre-seed–SeedPan-Canadian
Inovia CapitalTech infrastructure, security, scale-upsSeries A–BMontreal/Vancouver

Alternative & Non-Dilutive Debt Financing

Instrument Provider Amount / Terms Suitability
Revenue-Based FinancingTIMIA Capital$500K–$10M; repaid as % of revenuePost-revenue; preserves full equity
Equity CrowdfundingFrontFundrUp to $1.5M under offering memorandumCommunity investors; brand building

The equity crowdfunding route via FrontFundr is particularly attractive as a brand-building exercise: engaging the developer and privacy communities as micro-investors creates a base of vocal advocates while raising capital under the offering memorandum exemption without requiring a full prospectus.

17 Use of Funds

Upon closing a $1,500,000 seed round, guardianmesh Inc. will deploy capital across eight categories designed to achieve product-market fit, complete the Victoria SAR field trial, and establish IP defensibility within 24 months. The allocation prioritizes engineering execution and government contract validation while maintaining a prudent operational reserve.

$1.5M Seed Round Allocation

Category Amount % Purpose
Engineering$480,00032%Senior engineer + junior developer (24 months)
Executive$264,00018%CEO + Founder/Technical Evangelist (partial — revenue supplements)
Marketing & DevRel$155,00010%Head of Marketing + conference/travel budget
Victoria SAR Trial$75,0005%Equipment, travel Van→Vic, training, field ops
Office & Operations$90,0006%Vancouver office, insurance, admin, tools
Legal/IP$75,0005%2–3 patent filings, trademark, counsel
Cloud Infrastructure$48,0003%AWS/GCP hosting for 24 months
Guardian Bootstrap$30,0002%Early operator payouts to seed relay network
Reserve$283,00019%3-month runway buffer + contingency
TOTAL$1,500,000100%

24-Month Runway Plan

The $1.5M seed round, combined with projected grant income (SR&ED, IRAP) and early revenue from government contracts, provides a 24-month operational runway. The reserve allocation ($283,000) ensures the company can weather delays in grant disbursements or procurement timelines. The Victoria SAR field trial ($75,000) is a dedicated line item — this pilot is the revenue unlock that validates the platform for provincial and federal procurement. Key milestones: (1) Victoria SAR field trial completed, (2) first government pilot contract signed, (3) SDK v1.0 public release on npm, (4) 200+ active guardian node operators, (5) Series A readiness with demonstrated revenue growth. Engineering hiring is sequenced to begin in Month 1 with a senior backend engineer, followed by a junior developer in Q2.

18-Month Milestone Targets

Timeline Milestone Budget Driver
Month 1–2Engineering hires onboarded; IP counsel retainedEngineering + Legal/IP
Month 3–6SDK v1.0 public launch; 500 guardian nodes liveDevRel + Cloud Infra
Month 6–9First enterprise pilot; SR&ED + IRAP disbursedMarketing + Engineering
Month 9–121,000 guardian nodes; Series A materials preparedOperations + Reserve
Month 12–18Series A raise; patent filings completeLegal/IP + Reserve

PART V: Team & Execution

Behind every line of code and every architectural decision is a founder with 25 years of software development experience and a clear vision: communication that works when nothing else does. This section covers the team, the hiring plan, the product roadmap, and the risks that have been identified and mitigated along the way.

18 Team & Hiring

Founder Profile

Bruce deGrosbois — Founder & Technical Evangelist. 25 years of software development experience. Built first successful platform in 2002. Sole architect and developer of the entire guardianmesh platform: 182,000+ lines of production code, 9,000+ automated tests (525 files), 34 novel IP innovations. Implemented Signal Protocol (X3DH + Double Ratchet), MLS RFC 9420, and Noise XX handshake from specification. Transitioning from sole developer to Technical Evangelist role: representing guardianmesh at conferences and tech events, coordinating field trials with SAR and emergency services, developer outreach, and partnership development.

Planned Leadership Team (5 people, funded by seed round):

CEO — Business operations, investor relations, government procurement

Head of Marketing — All non-technical operations: content, campaigns, events, community, fundraising coordination

Senior Engineer — Backend/infrastructure: Python, TypeScript, API scaling

Junior Engineer — Mobile + frontend: React Native, BLE, testing

Bruce deGrosbois (Founder & Technical Evangelist) — Conference representation, SAR partnerships, developer advocacy, field trial coordination

Team Build-Out (Seed-Funded)

Timeline Role Focus
Month 1CEOBusiness operations, investor relations, government procurement pipeline
Month 1Head of MarketingNon-technical operations: content, campaigns, events, community building
Month 1Founder & Technical EvangelistConference representation, SAR partnerships, developer advocacy, field trials
Month 2Senior EngineerPython/TypeScript backend, API scaling, infrastructure hardening
Month 3–4Junior EngineerReact Native mobile, BLE integration, testing, frontend
Q1 2027Security EngineerThird-party audit, penetration testing, compliance certifications
Q2 2027Sales EngineerEnterprise deals, government procurement, technical sales support
Q3 2027Product ManagerRoadmap prioritization, user research, enterprise requirements
Q4 2027Infrastructure EngineerScaling, monitoring, SRE practices, Guardian node reliability

Advisory Board Targets

Mitacs Internships: guardianmesh Inc. plans to leverage Mitacs Accelerate and Globalink programs to access subsidized research talent from Canadian universities. This provides additional development capacity via a $15K/intern grant, supports academic paper submission goals, and creates a pipeline for full-time hiring.

19 Roadmap & Milestones

The 36-month roadmap is structured around four key value-creation events: SDK publication and developer community growth, first enterprise contract, government grant funding, and profitability at ~$2M ARR. Each milestone has a measurable KPI to track progress objectively.

Quarter Milestone KPI
Q2 2026SDK published to npm100+ downloads/week within 60 days of launch
Q2 2026SR&ED filing, IRAP applicationGrant submissions complete, confirmation numbers received
Q3 2026Ratchet app store launch (iOS + Android)1,000+ installs within 90 days of launch
Q3 2026PSPC Standing Offer registration initiatedRFQ filed — government procurement vehicle active
Q4 2026First government pilot contract signedEmergency comm deployment for BC municipality — first paid contract
Q1 2027CSIN/NCC application submittedGrant pipeline — cybersecurity grant applications filed
Q1 2027Academic paper submittedConference acceptance — USENIX, IEEE S&P, or ACM CCS
Q2 2027500+ SDK AGPL installsNetwork density metric — open-source adoption validates deployment readiness
Q3 2027DND IDEaS pursuitDefence contract pipeline — IDEaS Phase 1 application filed
Q4 2027$1.2M government contract run-rateProfitability — positive operating cash flow on government contracts alone

Network Effect Strategy: The SDK-first go-to-market strategy is designed to bootstrap network effects before launching direct consumer products. Each third-party developer who integrates the guardianmesh SDK adds their users as potential relay nodes. This means that SDK revenue and relay network growth are directly correlated — as SDK adoption grows, relay density increases, which improves coverage for all users (including Ratchet app users), which makes the platform more valuable to the next SDK customer. This self-reinforcing flywheel is the core strategic asset: competitors cannot replicate it by simply copying the codebase — they would need to replicate the entire relay network as well.

20 Risk Analysis

Every technology venture carries inherent risks. The risks below have been identified, categorized, and mitigated to the greatest extent possible given the current stage of the company. Investors should review this analysis alongside the financial projections and sensitivity analysis in Appendix D.

Risk Category Probability Impact Mitigation
Key person dependency Operational High Critical 5-person team from close (CEO, Marketing, 2 engineers, Founder), comprehensive documentation, 9,000+ tests as living executable spec, clean modular architecture
Slow SDK adoption Market Medium High Free AGPL tier, developer community, content marketing, Mitacs interns
Competitor with more funding Market Medium Medium Technical moat (34 IPs), first-mover advantage, network effects defensibility
Regulatory changes (encryption) Regulatory Low High Canadian CBCA jurisdiction, legal counsel on retainer, AGPL open-source auditability
Security vulnerability Technical Medium Critical Audited @noble/* crypto libraries, 9,000+ tests, responsible disclosure policy
Grant applications rejected Financial Medium Medium Multiple simultaneous applications, diversified funding (IRAP, SR&ED, CSIN, IDEaS)
Enterprise sales cycle too long Market Medium Medium Self-serve SDK tier for fast adoption, parallel government and enterprise pipeline
App store rejection Technical Low Medium P2P APK distribution via mesh (IP-028), progressive web app fallback available
Network bootstrap (chicken-and-egg) Technical Medium High Government pilot contracts seed the network, SDK adoption supplements relay density, company-operated seed nodes bootstrap coverage
Team hiring difficulty Operational Medium Medium Remote-first culture, competitive equity compensation, Mitacs internship pipeline

Key Person Risk — Substantially Mitigated: The seed round funds a 5-person team from Month 1, eliminating single-person dependency. The founder transitions from sole developer to Technical Evangelist, with a dedicated CEO handling operations and two engineers maintaining the codebase. Additional mitigations: (1) Comprehensive documentation — every protocol, architecture decision, and operational procedure is documented. (2) 9,000+ automated tests as living documentation — executable specification that any competent engineer can use to understand the system. (3) Clean modular architecture — clearly bounded modules with explicit interfaces. (4) 5-person team from close — CEO, Head of Marketing, Senior Engineer, Junior Engineer, and Founder all onboard within the first 90 days of funding. No single point of failure.

Appendices

A Appendix A: Codebase Metrics

The guardianmesh platform is an unusually complete pre-revenue technology platform: 182,000+ lines of production code, 9,000+ automated tests across 525 files, and 34 distinct IP innovations — all built by a single founder over approximately two years. Most seed-stage companies present an MVP; guardianmesh presents a production-ready, security-audited system.

Lines of Code Breakdown

Component Approx LoC Language Tests
guardian-mesh-sdk~28,000TypeScript262 tests, 25 suites
guardianmesh (servers)~35,000TypeScriptIncluded in SDK tests
guardianmesh-py (backend)~45,000Python113 test files
ratchet (app + packages)~74,000TypeScript/React Native1,683 tests, 75 suites
Total~182,000+9,000+ tests, 525 files

Test Coverage Summary

Project Statements Branches Functions Lines Threshold Met
guardian-mesh-sdk + guardianmesh80.32%65.28%61.53%82.75%
ratchet (packages + mobile)83.6%79.83%85.3%84.16%
Thresholds (ratchet)≥82%≥78%≥72%≥84%All Met

Dependency Audit — Security-Critical Libraries

B Appendix B: IP Innovation Catalog

guardianmesh Inc. has identified 34 distinct intellectual property innovations across the platform. These innovations span algorithmic, economic, security, architectural, infrastructure, documentation, and process categories. Each is classified by IP type and business priority for patent, trade secret, and copyright protection strategy.

ID Name Category IP Type Priority
IP-001Hop-Based TTL for DTNAlgorithmPatentableCritical
IP-002Tiered Bloom Filters with Emergency BypassAlgorithmPatentableCritical
IP-003Two-Stage Dead-Man AlertAlgorithmPatentableCritical
IP-004Network Witness ProtocolAlgorithmPatentableCritical
IP-005Adaptive Battery-Aware Cover TrafficAlgorithmPatentableHigh
IP-006Multi-Method Cascading DiscoveryAlgorithmPatentableHigh
IP-007Earned-Only Credit SystemEconomicTrade SecretHigh
IP-00850/50 Equal + Proportional SettlementEconomicPatentableCritical
IP-009Credit Account Persistence via HKDFEconomicPatentableHigh
IP-010Relay Diversity WeightEconomicTrade SecretMedium
IP-011Priority-Weighted Credits with Federation MultiplierEconomicTrade SecretMedium
IP-012Duress PIN with Decoy AccountSecurityPatentableHigh
IP-013Ed25519-Only AuthenticationSecurityTrade SecretMedium
IP-0145-Level Web-of-TrustSecurityPatentableHigh
IP-015Noise XX Handshake with DPI-Resistant Key ExchangeSecurityPatentableHigh
IP-016Warrant Canary SystemSecurityCopyrightMedium
IP-017APK Transparency LogSecurityPatentableMedium
IP-018Guardian Mesh Federation ProtocolArchitectureTrade SecretHigh
IP-019Online Logistic Regression Peer ScorerArchitecturePatentableHigh
IP-020Composite Guardian Health ScoreArchitectureTrade SecretMedium
IP-021Context-Aware Transport SelectionArchitecturePatentableMedium
IP-022Onion Routing for Mobile DTNArchitectureCopyrightMedium
IP-023Reed-Solomon Erasure Coding (WASM)ArchitectureCopyrightMedium
IP-024Secure Deletion via Partition Key RotationArchitectureTrade SecretMedium
IP-025Sneakernet Transport (QR + File)InfrastructurePatentableMedium
IP-026Satellite/Radio GatewayInfrastructureCopyrightMedium
IP-027Diaspora BridgeInfrastructurePatentableMedium
IP-028P2P APK Distribution via MeshInfrastructurePatentableMedium
IP-029BLE Peripheral Mode with GATT ServerInfrastructureTrade SecretMedium
IP-030Traffic Obfuscation LayerInfrastructureCopyrightMedium
IP-031Academic-Quality WhitepaperDocumentationCopyrightHigh
IP-032Comprehensive Threat ModelDocumentationTrade SecretMedium
IP-033Reproducible Builds SystemProcessCopyrightMedium
IP-0347-Day Soak Test AutomationProcessTrade SecretLow

Summary by Category and IP Type

Category Count IP Type Count Priority Count
Architecture7Patentable17Critical5
Algorithm6Trade Secret10High12
Infrastructure6Copyright7Medium16
Security6Low1
Economic5
Documentation2
Process2

C Appendix C: Grant Program Details

guardianmesh Inc. is eligible for multiple Canadian government grant and incentive programs. The following details the top five programs by priority, including eligibility requirements, calculation methods, and filing requirements.

1. SR&ED — Scientific Research and Experimental Development

Canada Revenue Agency (CRA) — Up to 35% refundable tax credit (CCPC) on eligible R&D expenditures

2. NRC IRAP — Industrial Research Assistance Program

National Research Council Canada — $50,000–$500,000+ in non-repayable contributions for R&D projects

3. PacifiCan RDII — Regional Development Innovation Initiative

Pacific Economic Development Canada (PacifiCan) — Up to $1M+ for BC-based technology innovation projects

4. CSIN — Canadian Safety and Security Program / National Cybersecurity Consortium

Public Safety Canada / NCC — Variable — project-based cybersecurity research funding

5. IDEaS — Innovation for Defence Excellence and Security

Department of National Defence (DND) Canada — Up to $1.2M per project (Challenge problem pursuits)

D Appendix D: Financial Assumptions

The financial projections in Sections 12 and 13 are based on the following conservative assumptions. All figures are in Canadian dollars (CAD). A sensitivity analysis is provided at the end of this appendix.

Revenue Assumptions

Government Contracts (sole revenue stream):

Y1: 1 partial-year municipal pilot contract at $25,000 — pipeline begins at funding close; contract signed Q3–Q4 Y1 via Small Value Procurement. Y2: 2 provincial contracts at $150,000 each + expanded municipal ($100,000) + Y1 pilot deferred balance ($50,000) = $450,000. Y3: 1 federal contract ($500,000 DND/Public Safety) + 3 provincial ($150,000 each) + municipal ($150,000) = $1,200,000. Government sales cycles are 12–18 months for new vendors; Y2+ assumes Standing Offer registration with PSPC initiated in Q1 Y1.

Non-Dilutive Grants (supplemental, not in revenue figures):

SR&ED tax credits, IRAP, and PacifiCan RDII are pursued in parallel and supplement operating cash flow but are not included in revenue projections. Estimated grant income: Y1 $50K–$100K (SR&ED + IRAP application), Y2–Y3 ongoing as R&D spending scales.

SDK & Enterprise (adoption — not direct revenue at this stage):

The SDK is dual-licensed (AGPL-3.0 + commercial) and will be published after IP protections are filed. Enterprise deployments contribute to network density and IP validation. Commercial SDK licensing is a future revenue opportunity. Commercial SDK licensing and enterprise network licensing are deferred revenue opportunities for a future funding round.

Expense Assumptions

Salaries:

Y1: $435,000 (CEO $120K + Head of Marketing $95K + Founder $100K + Sr Engineer $110K partial year + Jr Engineer $80K partial year). Y2: $505,000 (full 5-person team: CEO, Marketing, Founder, Sr Eng, Jr Eng). Y3: $680,000 (5 core team + additional hires funded from revenue).

Guardian Payouts:

Y1: $8,000 (small network, ~50 guardians, funded from corporate injection). Y2: $60,000 (~200 guardians, $25/guardian/month average). Y3: $180,000 (~500 guardians, $30/guardian/month average). The company determines credit pricing and total monthly payout pool from available revenue. Guardians are paid via 50% equal + 50% proportional settlement.

Cloud Infrastructure:

Y1: $24,000 (Guardian relay servers, CI/CD, monitoring). Y2: $36,000 (scaling to support enterprise customers and growing relay network). Y3: $72,000 (multi-region deployment, enterprise SLAs, redundancy).

Legal / IP:

Y1: $40,000 (patent application filing for 2–3 critical IPs, trademark, counsel). Y2: $35,000 (additional patent filings, enterprise contract legal review). Y3: $35,000 (ongoing IP protection, licensing agreements, compliance).

Marketing:

Y1: $20,000 (developer community, content, conference presence, gov events). Y2: $40,000 (conference sponsorship, enterprise marketing, government relations). Y3: $80,000 (demand generation, PR, expanded government relations).

Contractors / Field Trials:

Y1: $50,000 (Victoria SAR field trial — equipment, travel Van→Vic, training). Y2: $55,000 (expanded field trials $25K + Vancouver office $30K). Y3: $60,000 (scale-up project contractors, additional trial sites).

Sensitivity Analysis

The following tables present outcomes under three scenarios: base case (the projections used throughout this plan), a best case (+30% revenue), and a worst case (-30% revenue). Expenses are held constant in the revenue table; the second table stress-tests expense scenarios independently. All figures are in CAD thousands.

Scenario Y1 Revenue Y2 Revenue Y3 Revenue
Best (+30%)$33K$585K$1,560K
Base$25K$450K$1,200K
Worst (-30%)$18K$315K$840K

Base case Year 3 net: $48,000 (4.0%). Worst case (-30% revenue) Year 3 net: -$312,000 — a deficit of $312,000 against $1,152,000 in expenses. This would require bridging via government grants (SR&ED, IRAP) or extending runway into Year 4. The seed round is sized for 24 months of runway; a worst-case Year 3 does not threaten solvency if grants are secured in parallel.

Expense Sensitivity — Year 3

Scenario Y3 Expenses Y3 Net (base rev) Implication
Base case$1,152,000$48,000Target scenario
Hiring delay (−25% salary)$982,000$218,000Slower team growth; founder remains primary resource longer
Cost overrun (+20% all expenses)$1,382,400-$182,400Higher compliance overhead, IP legal costs, or cloud scaling

guardianmesh Inc.

Resilient. Decentralized. Private.

guardianmesh Inc. has built the only platform that combines multi-transport offline resilience, self-sovereign identity, cryptographic relay incentives, and open-source auditability in a single production-ready SDK. With 182,000+ lines of code, 9,000+ automated tests, and 34 novel IP innovations, the technical foundation is complete. The seed round funds the team and go-to-market execution to turn this technical achievement into a category-defining company.

7Transport Types
6-LayerSecurity
9,000+Tests
34IP Innovations
182K+Lines of Code
~$644KInvested

guardianmesh Inc. • Corporation No. 1775511-2 • CBCA • Victoria, BC

CONFIDENTIAL — This document contains proprietary and confidential information. It is intended solely for the authorized recipient and may not be reproduced, distributed, or disclosed without the express written consent of guardianmesh Inc. This is not an offer to sell or a solicitation of an offer to buy securities.