Home/ Investors/ Infrastructure Valuation Memo

JIL Sovereign - Infrastructure Valuation Memorandum

Five-layer sum-of-the-parts valuation framework for JIL Sovereign Technologies, Inc. Replacement cost floor, product-line comparables, addressable market, and defensibility analysis for institutional investor conversations.

NDA Confidential Version 2026-04-18

JIL Sovereign Technologies, Inc.

Infrastructure Valuation Memorandum

Five-Layer Sum-of-the-Parts Framework for Institutional Investors

Delaware C-corporation. Texas headquarters. Compliance hubs in Switzerland, UAE, and Singapore.


Origin and Architectural Thesis

JIL Sovereign Technologies was founded on a specific architectural observation: in digital asset movement, custody was solved, execution was solved, but the authorization and transport between them was an unprotected attack surface. Fireblocks, Anchorage Digital, BitGo, and BNY Mellon held assets safely. Exchanges and over-the-counter venues executed trades reliably. But when an institutional holder needed to move assets from custody to execution, or between counterparties that did not share a direct integration, the asset was in flight with no independent pre-clearance, no distributed quorum verifying destination validity, and no cryptographic proof of integrity in transit.

The industry loss record in this category is public and substantial.

Event Loss Date Attack Vector
Ronin Bridge $625M March 2022 Sovereign Compliance Network (SCN) Validator key compromise. 5 of 9 keys seized.
BNB Bridge $570M October 2022 Forged proof during bridge transit.
Wormhole $325M February 2022 Signature verification bypass in transit.
Nomad Bridge $190M August 2022 Initialization flaw exploited during transfer.
Harmony Horizon $100M June 2022 Multi-sig compromise during cross-chain movement.

Annual industry losses from in-transit and pre-clearance failures have consistently run between $2 billion and $3 billion. Every exploit above targeted the same category of vulnerability: the asset was secure at origin, would have been secure at destination, but was compromised during the transfer because no independent authorization layer stood between custody and execution.

JIL built the first pre-clearance and secure transport pipeline for institutional digital asset movement. The architecture is deployed in production today. It functions as a plugin authorization layer that custodians such as Fireblocks, Anchorage Digital, BitGo, Coinbase Custody, and institutional bank custody platforms can invoke when their clients need to move assets. JIL pre-clears the transaction through pre-settlement, sanctions screening, and destination validation; secures Byzantine Fault Tolerant quorum across a geographically distributed SCN validator mesh; executes the transfer on the custodian's behalf; and delivers cryptographic attestation of integrity to all parties. Several of the 48 issued patents cover this architecture.


The Right Analogy - Visa Authorization, Applied to Digital Assets

The Frame. When a consumer swipes a card, the merchant does not move money directly to itself. The card network stands between the card and the merchant, performs real-time authorization (sanctions, risk, limits, identity), and only then permits the transaction. The authorization layer is the reason the card system works at global scale. It is also the most valuable part of the rail. Visa at IPO was priced on the authorization position, not the switch.

JIL's pre-clearance and secure transport layer is architecturally analogous, applied to institutional digital asset movement. The custodian (Fireblocks, Anchorage, BitGo) holds the asset. The destination (exchange, wallet, counterparty) receives it. JIL stands between them, performs pre-clearance, secures quorum, executes the transfer, and attests integrity. The institutional digital asset market has no existing authorization layer. JIL is building it.


How the Pre-Clearance and Secure Transport Pipeline Works

The pipeline runs in five sequential steps, each with cryptographic attestation and SCN validator quorum verification:

  1. Custodian initiation. A custodian such as Fireblocks, Anchorage Digital, or BitGo needs to move client assets to a destination (exchange, wallet, or counterparty) where direct custodian integration does not exist. The custodian invokes JIL as a plugin authorization layer before releasing the funds.
  2. Pre-clearance and attestation. JIL runs the transaction through the pre-settlement engine: destination address validation, counterparty verification, sanctions screening (OFAC and all relevant jurisdictions), wallet intelligence scoring, and regulatory alignment checks. A verdict is produced: Yes, No, or Review. No asset moves until this step completes.
  3. Byzantine Fault Tolerant quorum. The verdict is submitted to JIL's distributed SCN validator mesh. A 70 percent quorum is required across 10 geographically distributed jurisdictions today, with a roadmap to 20 to 10 SCN validators across expanded jurisdictions. No single SCN validator, single operator, or single government can issue or override a clearance decision. The quorum signs the verdict cryptographically.
  4. Execution on custodian's behalf. Only after quorum sign-off does the asset actually move. JIL executes the transfer on the custodian's behalf, wrapped in a cryptographic transport envelope that maintains integrity proofs throughout the transit.
  5. Delivery with attestation. The asset is delivered to the verified destination. The custodian, the client, and where relevant the regulator receive a cryptographic attestation of the complete pipeline: destination verified, quorum signed, asset delivered unmodified. The attestation is court-admissible and serves as a compliance artifact for the custodian.

Why the Byzantine Fault Tolerant Quorum Matters

The specific architectural feature that distinguishes JIL from every bridge or transport attempt that failed in the table above is the geographically distributed Byzantine Fault Tolerant SCN validator quorum. Two properties matter.

First, the Ronin contrast. The Ronin Bridge exploit in March 2022 succeeded because only five SCN validator keys were required to sign a transfer, and the attacker obtained five. Bridges and transport layers that failed in this category generally relied on small, centralized, or co-located SCN validator sets. JIL requires 70 percent quorum across 10 geographically distributed SCN validators today, expanding to 20 to 40. The attack surface is not five keys held by a loose coalition. It is seven or more keys held by independent operators across independent jurisdictions with independent legal systems and independent infrastructure. The dollar cost of a successful attack against this architecture is orders of magnitude higher than the cost of attacks that succeeded against prior-generation bridges.

Second, sovereign and jurisdictional integrity. Geographic distribution of SCN validator authority is not only a security property; it is a sovereignty property. No single government, no single regulator, and no single legal subpoena can compel or block a clearance decision unilaterally. This matters directly to sovereign wealth funds evaluating investment, to foreign custodians evaluating integration, and to regulators in jurisdictions that have historically been cautious about US-only infrastructure for systemically important financial functions. The distributed quorum is the architectural answer to the question "who controls the rail?" The answer is - no one jurisdiction.


Executive Summary

JIL Sovereign Technologies, Inc. is a five-layer integrity infrastructure for digital and regulated payments. It operates on a single Layer 1 blockchain, protected by a single patent portfolio, serving a single compliance posture. Each of its five product lines maps to an independently valuable infrastructure category with established market comparables. This memorandum frames the company's valuation using the methodology appropriate to payment and settlement infrastructure rather than software-as-a-service, and presents a sum-of-the-parts range supported by replacement cost analysis, comparable transactions, and total addressable market economics.

Conclusion. Defensible range: $4.5B to $8.0B pre-money today. Expanding to $13.0 billion and above with one signed strategic anchor in hand. The company is priced on what it is, not what it has sold.


Why Revenue Multiples Are the Wrong Frame

Software-as-a-service companies are priced on annual recurring revenue because that is what they sell: seats, subscriptions, and feature tiers. Infrastructure is priced differently, because infrastructure is not sold by the seat. It is built once, positioned in a rail, and monetized as a function of the flows it enables.

SWIFT is not valued on revenue. It is valued on its position as the messaging layer of global correspondent banking. DTCC, which clears roughly two quadrillion dollars annually, is valued on position, not profit. Visa at IPO in 2008 was priced at approximately $60 billion on the basis of its rail position, not its earnings multiple relative to enterprise software. Ripple, at its 2022 Series C buyback, carried an implied valuation of $15 billion on a rail-and-position thesis with limited revenue relative to that number. Stripe was priced at $95 billion in 2021 on payment rail and ecosystem position.

JIL is in this category. The framework below reflects that.


What JIL Actually Is

JIL Sovereign Technologies operates a production Layer 1 blockchain and a portfolio of infrastructure products that together constitute the integrity layer for regulated and digital payments. The company does not compete with exchanges, custodians, or card networks. It provides the authorization, transport, attestation, verification, and intelligence rails that those institutions, and their regulators, rely on to operate safely.

Metric Value
Microservices in production 230
Lines of production code Approximately 1,000,000
Issued and pending patents 48 issued, 11 in flight. Target portfolio: 59
SCN Validator quorum 70% across 13 jurisdictions today. Roadmap: 20 to 10 SCN validators.
Consensus architecture Byzantine Fault Tolerant with geographic distribution
Cryptographic foundation Post-quantum (Dilithium, Kyber) plus classical hybrid
Current status JIL L1 and pre-clearance pipeline live in production

The Five Infrastructure Product Lines

Each of the five product lines below maps to an independently valuable infrastructure category. Each has established market comparables. Each could, in principle, be operated as a standalone company. The sum-of-the-parts valuation reflects this reality.

01 - Pre-Clearance and Secure Transport (Foundational Layer)

JIL's foundational product, described in detail above. The authorization layer for institutional digital asset movement, architecturally analogous to the card network authorization layer for retail payments. Deployed in production. Addresses the specific category of loss responsible for Ronin ($625M), BNB Bridge ($570M), Wormhole ($325M), Nomad ($190M), Harmony ($100M), and industry annual losses of $2 to $3 billion.

Why this matters for valuation. The buyer universe for this product is not regulators or enterprises. It is the custodians themselves: Fireblocks (valued at $8 billion in 2022), Anchorage Digital, BitGo (valued at $1.8 billion in 2023), Coinbase Custody, BNY Mellon Digital Asset Custody, and State Street Digital. These institutions have direct economic exposure to in-transit loss events, direct regulatory pressure to demonstrate pre-clearance controls, and direct commercial incentive to integrate JIL as the authorization layer beneath their custody products. No other infrastructure provider occupies this category. The architectural analogy to the card network authorization layer is not decorative. It is the valuation frame.

02 - Pre-Settlement Attestation for Fiat Payment Rails

A natural extension of the pre-clearance layer's cryptographic proof architecture applied to fiat payment rails. JIL issues cryptographically sealed Yes, No, or Review verdicts before fiat funds clear. This is architecturally distinct from analytics (which is post-hoc) and from custody (which is storage). It is a real-time authorization layer for regulated fiat payments, operating on the same architectural pattern as product 1 but addressing federal, state, and commercial fiat flows rather than digital assets.

Why this matters for valuation. Pre-settlement interdiction prevents loss rather than investigates it after the fact. For a federal or state Medicaid program losing tens of billions of dollars per year to improper payments, pre-settlement attestation is the only architecturally viable prevention layer. The comp set is the authorization layer of the card networks, not any existing blockchain product. Valued as infrastructure, this is among the largest of the five product lines.

03 - Retroactive Settlement Verification (Fraud, Waste, Abuse, Error)

JIL's Investigation Engine runs 111 checks (69 FWEA plus 42 Wallet Intelligence Engine signals) over historical payment records, producing court-admissible verdicts on fraud, waste, abuse, and error. For federal agencies, state Medicaid programs, and managed care organizations, this is the forensic reconciliation layer that existing payment integrity vendors do not provide with cryptographic evidence.

Why this matters for valuation. The Centers for Medicare and Medicaid Services lose an estimated $60 billion to $100 billion annually to improper payments. State Medicaid programs lose another $50 billion to $80 billion. Private insurance and banking fraud push the annual loss universe past $300 billion. Cotiviti, a payment integrity company without blockchain, without attestation, and without a patent moat, was valued at approximately $11 billion in 2023. JIL's FWAE product line operates in the same market with superior technology and a patent moat Cotiviti does not have.

04 - Wallet Intelligence Engine

42 signals across six signal groups: wallet age and genesis, counterparty contamination, velocity and pattern, DeFi trust scoring, hidden asset detection, and regulatory alignment. WIE is JIL's answer to the wallet risk scoring category occupied by Chainalysis, TRM Labs, and Elliptic, with broader signal coverage than any of them publicly discloses.

Why this matters for valuation. Chainalysis peaked at $8.6 billion in May 2022 on the wallet and transaction intelligence category. TRM Labs has been valued in the low billions on the same category. Elliptic has been priced in the high hundreds of millions. As a standalone product line, WIE maps cleanly to this comp set.

05 - Asset Intelligence Engine

Four sub-products, together constituting the forensic asset investigation layer: JIL Agent (natural-language autonomous investigator), JIL Fabric (on-chain plus off-chain fusion), JIL Reconcile (disclosure versus discovered asset discrepancy engine), and JIL Guard (pre-settlement interdiction network, competing with TRM Beacon). Priced at $10,000 standard and $20,000 enhanced per investigation.

Why this matters for valuation. Asset Intelligence, particularly JIL Guard as pre-settlement interdiction, is a category-defining product. The comp set spans forensic accounting tools, asset recovery firms, and the emerging pre-settlement interdiction category. As a standalone, this product line supports $1 billion to $3 billion of valuation on its own.


Replacement Cost Floor

Before any position premium or strategic argument, the replacement cost analysis establishes the valuation floor. This is the question a sovereign, a consortium, or a strategic acquirer asks first: what would it cost to build this from scratch?

Code base. Approximately one million lines of production code across 230 microservices with a complexity profile that includes post-quantum cryptography, Byzantine Fault Tolerant consensus, geographically distributed SCN validator orchestration, cryptographic transport wrapping, real-time pre-clearance and attestation, and forensic graph analytics. Market rates for production blockchain infrastructure of this complexity run $400 to $800 per line of code when fully loaded. Range: $400M to $800M.

Patent portfolio. 59 patents (48 issued, 11 in flight) covering pre-clearance pipeline architecture, in-transit transport wrap, Byzantine Fault Tolerant quorum signing, pre-settlement verdict architecture, and forensic verification. Foundational infrastructure IP in payments and crypto routinely transacts at $2 million to $5 million per patent, with strategically blocking patents commanding more. Range: $120M to $300M.

SCN Validator mesh and jurisdictional posture. 13 jurisdictions operationalized today with a roadmap to 20 to 40. The compliance and regulatory mapping across jurisdictions itself represents multiple years and millions of dollars of work. Plus the deployed on-chain infrastructure, administrative tooling, and operational runbook. Range: $100M to $200M.

Replacement Cost Floor: $620 million to $1.3 billion. The minimum a strategic acquirer would pay to replicate what has been built, without any premium for position, first-mover advantage, or patent moat. Replication would take five to seven years and still not clear the patent barrier.


Sum-of-the-Parts Valuation

The five product lines, valued against their independent comparables, produce the following sum-of-the-parts range. The table below is conservative: it uses low and mid comparables, not peaks, and excludes the premium for operating all five on a single shared chain with a single shared patent moat.

Product Line Comparable Comp Valuation JIL Line Value
1. Pre-Clearance and Secure Transport Visa authorization layer; prevents Ronin-class loss Card-network rail $2.0B to $4.0B
2. Pre-Settlement Attestation (fiat) Card network authorization layer Embedded in Visa/MC $3.0B to $5.0B
3. FWAE / Retroactive Verification Cotiviti (2023) $11B on payment integrity $2.0B to $4.0B
4. Wallet Intelligence Engine Chainalysis, TRM, Elliptic $0.6B to $8.6B range $1.5B to $3.0B
5. Asset Intelligence Engine Palantir financial crime, TRM Beacon Category-forming $1.0B to $2.0B

Sum-of-the-Parts Range: $9.5 billion to $18.0 billion. Conservative midpoint: approximately $13.75 billion. Product 1 is priced as a card-network-authorization-layer analog for institutional digital asset movement, live in production, addressing a documented $2 to $3 billion annual loss category, and serving as the architectural foundation for the other four product lines.


Valuation Tiers for Investor Discussions

Different investors price differently. The table below maps the defensible range by audience and what each tier requires.

Tier Range (Pre-Money) What It Requires
Replacement cost floor $620M to $1.3B Today. Nothing required beyond what is built.
Single-product infrastructure $1.5B to $3.0B Today. Pitch one product line as anchor narrative.
Multi-product SOTP $4.5B to $8.0B Today. Pitch as five-layer integrity platform with shared moat.
Strategic rail-priced $8.0B to $13.0B One signed strategic anchor: custodian integration, federal pilot, top MCO, top-10 bank, or sovereign fund lead.
Category-defining $13.0B and above Multiple anchors, sovereign round, or strategic auction with card network, core banking platform, or major custodian.

Addressable Market Economics

Infrastructure valuation is anchored in the flows it enables, not the seats it sells.

Flow Scale
Federal payment universe $10.6 trillion over four years (CMS, Treasury, entitlement, defense)
State Medicaid improper payments $50B to $80B annually
CMS improper payments $60B to $100B annually
Commercial banking wire/ACH fraud $40B to $60B annually
Institutional digital asset transfer volume Multi-trillion annually, scaling
Annual in-transit digital asset losses $2B to $3B. Direct Product 1 TAM.
Tokenized asset settlement Emerging, projected multi-trillion by 2030

Even modest capture rates (1 to 5 basis points) across these flows produce multi-billion-dollar annual revenue without heroic assumptions. The valuation is a function of rail economics at scale, not present revenue.


Defensibility and Moat

Patent moat. 59 patents covering pre-clearance pipeline architecture, in-transit transport wrap, Byzantine Fault Tolerant quorum signing, pre-settlement verdict architecture, and forensic verification. A competitor cannot legally replicate the architecture.

Architectural moat. The 70 percent quorum across 10 (scaling to 20 to 40) geographically distributed SCN validators is not a marketing claim. It is the specific architectural feature that makes the Ronin failure mode, the BNB Bridge failure mode, and the Harmony Horizon failure mode each materially harder to execute against JIL. The dollar cost of a successful attack is orders of magnitude higher than against prior-generation bridges.

Regulatory moat. Court-admissible verdicts with a 111-check stack. Once a regulator accepts JIL verdicts in evidence, replacing JIL becomes a regulatory event, not a vendor swap.

Compliance moat. SOC 2 Type II, ISO 27001, HITRUST CSF, FedRAMP path, HIPAA BAA. Each is a multi-quarter process a new entrant has to repeat.

Sovereign moat. No single government, regulator, or subpoena can compel or block a clearance decision unilaterally. This is the answer to "who controls the rail?" for sovereign wealth funds and foreign custodians evaluating integration.

Multi-product moat. Five product lines on one chain with one patent base. A competitor does not compete with one of JIL's products; they compete with five simultaneously, each requiring separate IP, separate compliance, separate distribution, and separate architecture.


What Closes the $13B+ Conversation

The sum-of-the-parts case is defensible today in the right room with the right buyer. The tier that closes $13 billion and above requires one signed strategic anchor. The shortest credible paths:

Path What unlocks the tier
Custodian A signed integration agreement with Fireblocks, Anchorage Digital, BitGo, BNY Mellon, or State Street
Federal A signed pilot with HHS OIG, CMS, Treasury OIG, or the Department of Justice
Healthcare A signed contract with a top-five managed care organization
Banking A signed partnership with a top-10 US bank or a core banking platform
Sovereign A lead investment from a sovereign wealth fund (GIC, Mubadala, ADIA, Temasek, PIF)
Strategic A partnership or investment from a card network (Visa, Mastercard) or global settlement infrastructure (DTCC, Euroclear)

Each of these is in scope given the current go-to-market execution. Any one of them in hand repositions the conversation from "we are building the rail" to "we are the rail they chose."


Summary

JIL Sovereign Technologies is a five-layer integrity infrastructure for digital and regulated payments, not a single-product software company. The foundational product is a pre-clearance and secure transport pipeline that stands between custody and destination, architecturally analogous to the card network authorization layer applied to institutional digital asset movement. It is deployed in production, protected by a geographically distributed Byzantine Fault Tolerant quorum, and addresses a documented $2 to $3 billion annual loss category. Priced on the framework appropriate to infrastructure (replacement cost, position, regulatory moat, and rail TAM), the defensible valuation range today is $4.5 billion to $8.0 billion pre-money with no revenue precondition, expanding to $13 billion and above with one signed strategic anchor. The company is priced on what it is, not on what it has sold.

Note. This memorandum reflects management's internal valuation framework and is intended for use in institutional investor conversations. Valuation assertions are illustrative and subject to market clearing prices, which are set by the specific buyers in the room. Final transaction valuations will be determined by competitive processes, investor diligence, and subsequent negotiation.


JIL Sovereign Technologies, Inc. | Delaware C-Corporation | Confidential