Interchain software for user sovereignty.

Pompei provides consumer-facing, blockchain-integrated software applications across expanding domains: currently point-of-sale, gaming, identity, and social media. Every application utilizes interchain infrastructure, cryptographic verifiability, multi-platform native delivery, and user data sovereignty.

§ 01 — Portfolio

Expansive product domains, one standard.

№ 01

Commerce

ColdStream

Cross-blockchain point-of-sale software.

ColdStream is intuitive, user-friendly, cross-blockchain point-of-sale software built for local operational control.

Explore ColdStream
№ 02

Community

Sovereign Social

Portable identity. Durable community.

Identity, graph, publishing, and social presence designed around portability, durable ownership, and reduced platform lock-in.

Explore Sovereign Social
№ 03

Entertainment

Pompei Gaming Suite

Competitive play with transparent results.

Real-time games with cryptographically-verifiable outcomes.

Explore Gaming Suite

§ 02 — Principles

Autonomous systems are inevitable. It was always a choice.

Software can make trust verifiable, exchange interchain, and data exposure minimal by design. Pompei builds from the premise that accountability, sovereignty, and transparent outcomes should be ordinary features of consumer software.

01

Minimize data. Minimize harm.

Identity fraud and scams cost Americans $47 billion in 2024. Data-minimizing software treats collection and retention as liabilities, reducing exposure by design.

02

Users are people, not products.

U.S. digital advertising generated nearly $300 billion in 2025 by turning user behavior into targeting infrastructure. User-first software protects identity, behavior, and access from becoming commercial inventory.

03

Don't trust. Verify.

Marketplaces should subject critical state to verification: outcomes, receipts, balances, and settlement records.

04

Many chains. One market.

Interchain software permits users to transact across a common marketplace spanning networks, custody models, and account systems.

§ 03 — Standard

Different domains. One standard.

I

Auditability

Critical state transitions should be independently verifiable: order, payment, settlement, and audit history.

II

Native delivery

Real software belongs on the platforms users actually touch, with native applications designed for everyday use.

III

Security by design

Products use architecture that reduces exposure and keeps sensitive services under sovereign control.

§ 04 — Architecture

The interface is simple because the architecture is deliberate: interchain routing, boundary enforcement, authority delineation, and live-state verification are design priorities.

Pompei operating memo · MMXXVI

Application layer
Interchain
Data posture
Sovereign
Verification
Cryptographic
Delivery
Native

Interchain

A common marketplace across Float-supported networks