We Build the Internet's Invisible Layer.
Our mission is to eliminate the attack surface entirely — a requirement in a world where GenAI can scan and exploit infrastructure faster than humans can respond.
If attackers can see you, they can breach you.
LayerV is the commercial implementation of the Cloud Security Alliance's OpenNHP protocol — an emerging internet standard for network invisibility, co-authored by our team and backed by global institutions.
Who We Are
Justin Posey
Co-Founder & CEO25 years building security and infrastructure at CrowdStrike, Cisco, AppDynamics, Microsoft, and Disney. Co-author of the CSA OpenNHP specification and IETF Internet-Draft. Addressed the United Nations General Assembly on digital identity for humans and AI agents. Architect of the LayerV platform.
LinkedInBen Chen
Co-Founder & CTOArchitect of OpenNHP and lead author of the reference implementation — 13.8K GitHub stars and 200+ contributors. Co-author of the IETF Internet-Draft. Built the cryptographic protocol layer that makes network infrastructure invisible. Drives OpenNHP adoption across the global open-source and enterprise security community.
LinkedInJoe Ollis
Co-Founder & COOCo-founded SMARTCAP, scaling a commercial real estate firm to $350M+ in completed transactions and $150M in equity raised. Previously Group Manager at Microsoft, where he launched Bing Search for iOS across 26 markets (PC Magazine Editor's Choice). Runs LayerV's go-to-market, partnerships, and capital strategy.
LinkedInCloud Security Alliance
Standards PartnerLayerV co-authors the OpenNHP specification through the CSA working group, ensuring the protocol meets global enterprise security requirements.
Backed by Global Institutions
United Nations General Assembly
September 2025Invited to address global leaders on digital identity standards for humans and AI agents — focusing on interoperability, privacy protection, and inclusive design.
Watch the AddressCloud Security Alliance
OpenNHP Co-AuthorsLead co-authors of the Network Infrastructure Hiding Protocol (NHP) specification — the emerging CSA standard for network invisibility.
About CSAIETF Internet-Draft
Published January 2026The OpenNHP protocol specification has been officially published by the Internet Engineering Task Force.
Read the SpecificationOpen Source Community
13.8K+ GitHub StarsThe OpenNHP reference implementation is community-audited with 200+ contributors worldwide. No black boxes, no vendor lock-in.
View on GitHubHow We Think About Security
Dark by Default
In a dark forest, survival means staying hidden. We make your infrastructure invisible — not just protected.
Open Standards, Not Lock-in
Built on the Cloud Security Alliance's OpenNHP protocol. Auditable code, public spec, no vendor dependency.
Preemptive, Not Reactive
Detection assumes breach. We eliminate the attack surface before scanners can find it.
How We Work
Ship Security, Not Theater
We build things that work, not things that look impressive in slides. Every feature must reduce real attack surface.
Prove It
Demo over deck. We show, don't tell. If we can't demonstrate it working, we don't claim it.
Builders First
Security that developers hate doesn't get deployed. We obsess over DX because adoption is the only metric that matters.
Rebuild the Internet for the AI Age
We co-authored the OpenNHP spec with CSA and presented it at the UN. Now we're rebuilding the internet's security layer for the AI age. Small team, hard problems, foundational infrastructure.
Cryptography
Design the cryptographic primitives for post-quantum network hiding. Your work ships as internet infrastructure, not a paper.
Protocol Engineering
You've implemented RFC specs, not just read them. Help us turn OpenNHP into the security layer the internet never had.
Backend Engineering
You've built systems that handle millions of connections. Make our control plane the fastest path to invisible.
Bay Area or remote. Early team, meaningful equity. No recruiters, no leetcode — just show us what you've built.
info@layerv.aiReady to deploy invisibility?
See how LayerV makes infrastructure invisible to attackers.