Church Machine

Safe Computing
by Design

The world's first hardware-enforced failsafe computing platform for children

Investor Presentation

1 / 15

The Problem

Every device given to a child today runs on architectures designed in the 1970s with no concept of capability-based security.
2 / 15

Why Software Filters Fail

Today's Approach

  • Allow everything by default
  • Try to block the bad stuff
  • Software layer — can be bypassed
  • VPNs, sideloading, browser tricks
  • Reactive: fix after the damage

Church Machine

  • Block everything by default
  • Selectively grant with tokens
  • Hardware layer — cannot be bypassed
  • No jailbreak, no admin override
  • Preventive: unsafe states are impossible
3 / 15

Golden Token Architecture

Every resource access requires a hardware-verified capability token. No token = no access. The processor physically cannot execute an unauthorized operation.

0
Bypass Paths
0
Privilege Escalation
0
Admin Overrides
4 / 15

"Hello Mum" — Always Reachable

A physical button on the device that triggers a direct encrypted tunnel to the parent. This connection:

  • Cannot be blocked by any app
  • Cannot be redirected or spoofed
  • Uses hardware-bound Golden Tokens
  • Works even if all other services are down

The capability IS the address. No DNS, no IP discovery, no attack surface.

FamilyRegistry Security

  • Mum: Full family access (L, S, E)
  • School: Contact + apps (L, E)
  • Friends: Message only (L)
  • Strangers: No token = invisible

Without a Golden Token, nobody can discover or contact the device. It simply doesn't exist to them.

5 / 15

Product Roadmap

$89

Phase 1: Educational Trainer

Handheld device with 3.5" display, 10 opcode keys, pipeline visualization. Teaches capability security hands-on. Pairs with free web simulator. Classroom kits available.

$149

Phase 2: Failsafe Data Phone

4G data modem, 5" touchscreen, "Hello Mum" button, capability-gated messaging, safe web browser. Every contact requires a Golden Token.

$249

Phase 3: Church Machine Pro

Full capability-secure device for older students and institutions. Developer mode, mesh networking, enterprise deployment.

6 / 15

The Handheld Trainer

┌──────────────────────────┐ │ ┌──────────────────┐ │ │ │ │ │ │ │ 3.5" COLOR LCD │ │ │ │ Registers / │ │ │ │ Pipeline / REPL │ │ │ │ │ │ │ └──────────────────┘ │ │ │ │ [LOAD][SAVE][CALL][RET] │ │ [CHNG][SWCH][TPRM][LAM]│ │ [ELOAD+CALL][XLOAD+LAM]│ │ │ │ [CR0][CR1][CR2][CR3] │ │ [CR4][CR5][CR6][CR7] │ │ │ │ [0][1][2][3][4] │ │ [5][6][7][8][9] │ │ │ │ [STEP] [RUN] [RESET] │ │ [VIEW] [MENU] [ENTER] │ │ ◄ ▲ ▼ ► │ └──────────────────────────┘

How Kids Use It

  • Build: Press opcode keys to enter instructions
  • Step: Execute one instruction at a time, watch security checks
  • Break: Try unauthorized access, see hardware FAULT
  • Race: Optimize from 63 to 10 cycles using fused instructions
  • Calculate: Built-in HP-35 mode running through capability security

Key Lesson

"Security that works by design, not by hope."

7 / 15

Safe Web Browser

Not a filter. A fundamentally different architecture.

Traditional Browser

  • Any URL accessible by default
  • JavaScript executes arbitrary code
  • Tracking scripts, ads, malware
  • Filter lists are always incomplete
  • URL bar invites exploration

Church Machine Browser

  • Only Golden Token sites load
  • No JavaScript execution
  • No tracking, no ads possible
  • Parent binds each site explicitly
  • Bookshelf UI — no URL bar

Parent binds wikipedia.org khanacademy.org scratch.mit.edu — child sees tiles on a bookshelf. No way to reach unbounded sites. The hardware doesn't have the address.

8 / 15

Technology — Built, Not Planned

729K
Synthesizable Verilog
23
Hardware Modules
10
Church Opcodes
Pure Church Machine Amaranth HDL Synthesis Fused Instructions (57% faster) Programmable Abstractions (84% faster) Web Simulator (3 architectures) FamilyRegistry Design Golden Token Architecture Pipeline Visualizer Interactive Tutorial Symbolic Math REPL

The processor architecture is working and generates synthesizable Verilog. This is not a concept — it's a functioning design ready for FPGA prototyping.

9 / 15

Patentable Innovations

Five distinct patent families covering the processor architecture, instruction set innovations, security model, and networking protocol.

10 / 15

Market Opportunity

$4.2B
Parental Control Market
$2.8B
Children's First Phone
$3.1B
STEM Education Hardware

Competitive Advantage

11 / 15

Development Timeline

Done
Web Simulator
+ HDL Synthesis
Mo 1-3
Patent Filings
Mo 3-6
FPGA Prototype
on Dev Board
Mo 6-9
First Handheld
Prototype
Mo 9-12
Pilot Schools
Testing
Mo 15-18
Trainer Ships
Mo 24-30
Data Phone
+ Hello Mum

Education market entry de-risks the hardware while building brand awareness. Data phone follows once the platform is proven in classrooms.

12 / 15

Financial Projections

Year 1Year 2Year 3
Revenue$750K$2.9M$8.1M
Gross Margin57%66%70%
Units Shipped6,00018,00052,000
EBITDA($370K)$500K$2.9M
$24
Unit Cost (10K vol.)
$89
Retail Price
73%
Gross Margin
13 / 15

Seed Round: $500K - $750K

$50-80K
Patent filings (5 families, provisional + PCT)
$150-200K
Hardware engineering (FPGA, board, 3 iterations)
$200-300K
Engineering team (12 months)
$50-80K
Manufacturing setup + certification
$50-90K
Go-to-market (crowdfunding, pilots, conferences)

What you get: Working technology, clear product roadmap, patentable IP in a $10B+ combined market, and a founding team with deep architecture expertise.

14 / 15
Church Machine

The First Phone
That's Safe by Design

Not because of a filter that might fail.
Because the hardware architecture makes it impossible.

Church Machine Ltd
Contact: [contact details]
Web Simulator: [URL]

15 / 15