ArchiveCryptoseal
acquiredBatch — Summer 2011

Cryptoseal

CryptoSeal was a San Francisco-based security startup founded in May 2011 by Ryan Lackey, Tom Sparks, and Erik Berls. Accepted into Y Combinator's Summer 2011 batch, the company built two distinct products: CryptoSeal Privacy, a consumer…

Cryptoseal


Overview

CryptoSeal was a San Francisco-based security startup founded in May 2011 by Ryan Lackey, Tom Sparks, and Erik Berls. Accepted into Y Combinator's Summer 2011 batch, the company built two distinct products: CryptoSeal Privacy, a consumer VPN launched in mid-2013, and CryptoSeal Connect, a compliance-oriented business VPN priced at $99/month for five users. Beneath both products sat a more ambitious technical vision — applying Trusted Computing technology to cloud infrastructure for key management and secure overlay networks.

The consumer product died not from competition or poor execution, but from a preemptive regulatory retreat. In October 2013, Lackey shut down CryptoSeal Privacy after the Lavabit case established that a US government pen register order could compel a provider to surrender SSL keys protecting all user communications. CryptoSeal had not received such an order — it simply concluded, correctly, that it could no longer make honest privacy promises to users.

Cloudflare acquired the company in June 2014 for an undisclosed sum. The product was retired within two weeks. The founders scattered — Lackey to Cloudflare as a product manager, Sparks to Y Combinator's software team — in an outcome that reads more as acqui-hire than acquisition. The Trusted Computing vision that motivated the company's founding never found a commercial home; the market for developer secret management that CryptoSeal tried to address in 2011 would not mature until years later.

Founding Story

Ryan Lackey arrived at CryptoSeal with a biography that few security founders could match. In 2000, he co-founded HavenCo, the world's first data haven, operating from Sealand — a former World War II sea fort in the North Sea claimed as a sovereign principality — to provide offshore hosting beyond the reach of any government.[1] After HavenCo wound down, Lackey pivoted to BlueIraq, a VSAT communications and IT company that served the US Department of Defense in Iraq and Afghanistan, building communications infrastructure in active conflict zones.[1] When BlueIraq became economically unfeasible, he returned to San Francisco and applied to Y Combinator — a founder who had literally built secure infrastructure in the world's most hostile environments, now looking for a commercial vehicle for his next idea.

That idea was not, at its core, a VPN company. "My main interest in starting CryptoSeal was to get Trusted Computing technology into commercial use," Lackey said after the acquisition. "At CryptoSeal, we were working on using that technology for a general cloud computing solution, key management, and overlay networks."[2] Trusted Computing — a hardware-rooted approach to verifying the integrity of a computing environment — was a technology with deep roots in defense and enterprise security but almost no commercial cloud adoption in 2011. Lackey believed the moment had arrived to change that.

Tom Sparks brought a complementary perspective. His framing of the founding problem was more developer-centric: "That was the thing that we tried to address with CryptoSeal — we had all felt the pain of managing secrets and stuff like that."[3] The third co-founder, Erik Berls, rounded out the team, though his specific technical background and role within the company were not publicly documented.

Lackey began working on what would become CryptoSeal in October 2010, with the company formally incorporated in May 2011.[4] Y Combinator accepted the team into its Summer 2011 batch — a validation that gave the company early credibility and a network that would ultimately prove more durable than any product it shipped.[5]

The founding thesis was a technology-push story: Lackey and Sparks believed Trusted Computing could solve real problems in cloud security and developer secret management, and they needed a commercial product to fund the research and build the team. The VPN was that commercial product — a means to an end, not the end itself. This framing would shape every subsequent decision the company made, including the final one.

Timeline

  • October 2010 — Ryan Lackey begins working on what will become CryptoSeal[4]
  • May 2011 — CryptoSeal formally founded by Ryan Lackey, Tom Sparks, and Erik Berls[6]
  • June 2011 — CryptoSeal accepted into Y Combinator Summer 2011 batch; raises seed round (undisclosed amount) including YC investment and Yuri Milner SAFE[5][7]
  • January 14, 2013 — CryptoSeal Connect (business VPN, $99/month for 5 users) publicly covered by TechCrunch[8]
  • May/June 2013 — CryptoSeal Privacy (consumer VPN) launched[9]
  • October 21, 2013 — CryptoSeal shuts down CryptoSeal Privacy preemptively in response to Lavabit legal precedent; zerofills all cryptographic keys and deletes all user records; offers affected customers refunds and one-year non-US VPN subscriptions[10][11]
  • June 18, 2014 — Cloudflare acquires CryptoSeal for an undisclosed amount[12]
  • June 19, 2014 — Ryan Lackey joins Cloudflare as product manager; Tom Sparks joins Y Combinator's software team; Cloudflare begins retiring CryptoSeal's service with full shutdown by June 30[13]
  • August 2014 — Ryan Lackey presents at DEF CON 22, still listed as "Founder, CryptoSeal, Inc." on topics including ephemeral communications and evading monitoring[14]
  • 2017 — Ryan Lackey becomes CSO of the Tezos Foundation after leaving Cloudflare[15]
  • November 2020 — Ryan Lackey leaves Tezos Foundation CSO position[15]

What They Built

CryptoSeal shipped two commercial products and developed a third, more technically ambitious offering that never reached full commercialization.

CryptoSeal Connect was the enterprise product, launched in early 2013 and covered by TechCrunch in January of that year.[8] Priced at $99/month for up to five users, it provided a cloud-based VPN for businesses that needed to secure remote access without deploying on-premise hardware.[9] The product was explicitly designed for regulated industries — it fully complied with warrants and subpoenas, and corporate monitoring was expected and disclosed.[16] Compatible with a range of desktop and mobile clients, Connect positioned itself as a managed VPN-as-a-service for companies that wanted enterprise-grade security without the infrastructure overhead.

CryptoSeal Privacy was the consumer product, launched in May or June 2013.[9] It operated on the opposite philosophical premise from Connect: users who wanted to hide their internet activity from governments, ISPs, and other observers. The service was cloud-based, required no hardware, and worked across desktop and mobile platforms.[17] It was profitable at the time of its shutdown — fewer than 1,000 customers, but enough to cover operating costs and generate some margin.[18]

The philosophical tension between these two products was structural, not incidental. Connect promised compliance with state authority; Privacy promised protection from it. Running both simultaneously under one brand created an identity problem: the company was simultaneously a trusted partner of regulated enterprises and a privacy shield for individuals wary of those same institutions.

The Trusted Computing layer was the most technically differentiated offering and the least commercially developed. CryptoSeal applied Trusted Computing technology — hardware-rooted cryptographic attestation — to commodity servers, protecting them from compromise by both external attackers and insider subversion, and guaranteeing the integrity of server-side applications to remote end users.[19] This was the technology Lackey had come to commercialize; the VPNs were the revenue vehicle that would fund its development. Whether this layer ever had paying customers or remained pre-revenue is not documented in any public source.

One additional detail is telling: CryptoSeal had already been leveraging Cloudflare's infrastructure prior to the acquisition.[20] The company was building on top of a platform that would eventually absorb it — a dependency relationship that, in retrospect, foreshadowed the acquisition's terms.

Market Position

Target Customers

CryptoSeal served two distinct and philosophically incompatible customer segments simultaneously.

The enterprise segment — CryptoSeal Connect's target — was small-to-medium businesses in regulated industries (finance, healthcare, legal) that needed secure remote access for distributed teams but lacked the IT resources to deploy and manage traditional VPN hardware. The $99/month-for-five-users price point positioned it as an accessible managed service, not an enterprise contract. The explicit compliance posture (warrants honored, corporate monitoring disclosed) made it suitable for companies with legal obligations but unsuitable for anyone seeking genuine privacy.

The consumer segment — CryptoSeal Privacy's target — was privacy-conscious individuals: journalists, activists, travelers in high-surveillance environments, and technically sophisticated users who understood what a VPN could and could not protect. This was a small but growing market in 2013, energized by the Snowden revelations that began in June of that year — revelations that arrived just months after CryptoSeal Privacy launched, and which briefly made the product's value proposition viscerally legible to a mass audience.

Market Size

The global VPN market in 2013 was fragmented and growing, driven by both enterprise remote access needs and consumer privacy concerns. The consumer privacy VPN segment was still nascent — dominated by services like HideMyAss, Private Internet Access, and a handful of offshore providers. The enterprise VPN market was more established but increasingly contested by cloud-based alternatives to traditional hardware appliances from Cisco and Juniper. CryptoSeal's sub-1,000 consumer customer count at shutdown suggests it captured a negligible fraction of even the early-adopter privacy VPN market. No revenue figures for CryptoSeal Connect were ever disclosed.

Competition

CryptoSeal competed on two axes simultaneously, and was disadvantaged on both.

In the consumer privacy VPN market, the company's fatal competitive disadvantage was jurisdictional, not technical. Non-US providers — operating under legal frameworks that did not permit the kind of compelled SSL key disclosure that the Lavabit case established — could make stronger privacy guarantees than any US-based service. Lackey acknowledged this directly: "non-US providers run by non-US people are an objectively better option" for privacy.[21] This was not a product gap CryptoSeal could close through engineering. It was a structural disadvantage baked into the company's US incorporation.

In the enterprise VPN market, CryptoSeal competed against established players (Cisco AnyConnect, Juniper, Citrix) with deep distribution relationships and against emerging cloud-native alternatives. The $99/month price point and managed-service model were differentiated, but the compliance-first positioning limited the addressable market to companies that had already accepted the premise of state cooperation — a narrower segment than the broader enterprise security market.

The most important competitive dynamic, however, was platform dependency. CryptoSeal was already running on Cloudflare's infrastructure before the acquisition.[20] Cloudflare CEO Matthew Prince described CryptoSeal as "CloudFlare in reverse" — a forward proxy to Cloudflare's reverse proxy.[22] This framing reveals the competitive reality: CryptoSeal was building a product that a platform provider could absorb, and that platform provider had already identified the complementarity. The acquisition was not a rescue — it was a logical conclusion of a dependency relationship that had existed for some time.

The Trusted Computing layer, had it been commercialized, might have offered genuine differentiation. In 2011-2014, no major cloud provider offered hardware-rooted attestation as a managed service. AWS Nitro Enclaves, Google Confidential Computing, and Azure Confidential Computing — the products that would eventually address this market — did not exist. CryptoSeal was early to a real problem. The market simply was not ready to pay for the solution.

Business Model

CryptoSeal pursued a subscription revenue model across both products. CryptoSeal Connect was priced at $99/month for up to five users — approximately $19.80 per user per month at full utilization, a price point consistent with premium SMB SaaS in 2013.[8] CryptoSeal Privacy's pricing was not disclosed in any public source, though the consumer VPN market in 2013 typically ranged from $5 to $15/month.

The company never disclosed revenue figures for either product. The absence of revenue data is itself a signal: companies that achieve meaningful scale typically have revenue mentioned in press coverage, even if the exact figure is not disclosed. CryptoSeal's coverage focused almost entirely on its shutdown and acquisition, with no revenue milestones reported at any point.

What is known: the consumer product was profitable at shutdown, with fewer than 1,000 customers covering operating costs and generating some margin.[18] This implies a lean cost structure — likely a small team running cloud infrastructure with minimal overhead. Lackey explicitly stated that the financial risk was not operating costs but potential legal liability from a government action.[23]

As an inference: if CryptoSeal Connect had, say, 50-100 enterprise customers at $99/month, annual recurring revenue would have been approximately $60,000-$120,000 — meaningful for a seed-stage company but insufficient to justify a Series A raise. The company operated for approximately three years on seed-stage capital without raising a follow-on round, suggesting either that revenue was sufficient to extend runway, or that the product never demonstrated the growth trajectory required to attract institutional capital. No Series A was ever announced or reported.

Traction

CryptoSeal Privacy had fewer than 1,000 paying customers at the time of its October 2013 shutdown, but was profitable — covering operating costs and generating some margin.[18] This figure represents approximately five months of operation (May-October 2013), suggesting the product was growing slowly rather than rapidly. The Snowden revelations in June 2013 — which arrived just weeks after CryptoSeal Privacy launched — created a brief surge of public interest in privacy tools, but CryptoSeal's sub-1,000 customer count at shutdown suggests it did not capture a significant portion of that demand spike.

No customer count, ARR, or growth metrics for CryptoSeal Connect were ever disclosed publicly. The enterprise product launched in January 2013 and operated for at least 18 months before the acquisition, but its commercial performance remains entirely opaque.

The company's most significant "traction" metric may be the acquisition itself — Cloudflare's decision to acquire CryptoSeal validated the team's technical credibility, even if the product scale did not justify a traditional acquisition premium. The fact that Cloudflare retired the product within two weeks of closing the deal confirms that the deal value resided in people and IP, not in a customer base worth preserving.

Post-Mortem

Primary Cause: Structural Untenability of a US Consumer Privacy VPN

The proximate cause of CryptoSeal Privacy's shutdown was the Lavabit case, decided in the summer of 2013. The US government had compelled Lavabit — an encrypted email provider — to surrender its SSL private keys, effectively enabling surveillance of all Lavabit users in order to monitor one (believed to be Edward Snowden).[24] Lavabit's founder, Ladar Levison, chose to shut down rather than comply, and the legal proceedings established that a pen register order could be interpreted to compel complete SSL key disclosure.

CryptoSeal had not received any government order. The shutdown was entirely preemptive. Lackey's reasoning was precise: "The post-Lavabit interpretation of a pen register order being enough to compel complete turnover of the service, if that's the most effective way for USG to get pen register data, is terrifying."[25]

The company's official statement was equally direct: "Essentially, the service was created and operated under a certain understanding of current US law, and that understanding may not currently be valid. As we are a US company and comply fully with US law, but wish to protect the privacy of our users, it is impossible for us to continue offering the CryptoSeal Privacy consumer VPN product."[11]

The attempted remedy — shutting down and zerofilling all cryptographic keys — was not a remedy for the business but a final act of user protection. Upon shutdown, CryptoSeal deleted all operational records and destroyed all keys, eliminating any evidentiary value the company might have had.[11] Affected customers received refunds, one-year subscriptions to a non-US VPN service, and a promise of free future service if CryptoSeal ever relaunched.[26]

The deeper structural issue was that Lackey himself concluded there was no engineering solution to the jurisdictional problem. "If we were the legally best VPN option, I would have probably pushed to keep it going anyway," he wrote on Hacker News, "but as it is, non-US providers run by non-US people are an objectively better option, so in good conscience there's no reason to continue running a US privacy VPN service without technical controls to prevent being compelled to screw over a user."[21]

The financial risk calculus reinforced the decision. The consumer product was profitable at its scale, but Lackey was explicit that the concern was not operating costs — it was the potentially catastrophic legal liability of a government action.[23] With fewer than 1,000 customers, the revenue at stake was modest. The legal exposure was not.

Secondary Cause: A Founding Vision That Outran Market Readiness

CryptoSeal's true ambition — commercializing Trusted Computing for cloud security and developer secret management — was real and prescient, but the market was not ready to pay for it in 2011-2014.

Tom Sparks acknowledged this directly in a 2018 YC podcast, noting that a company called EnvKey was doing in 2018 what CryptoSeal had tried to do in 2011 with secret management for app developers, and had more adoption.[27] The seven-year gap between CryptoSeal's founding and EnvKey's traction reflects how long it took for developer tooling around secrets management to become a recognized category. HashiCorp Vault — the product that would eventually define the space — launched in 2015, four years after CryptoSeal's founding. The hardware-rooted attestation market (AWS Nitro Enclaves, Google Confidential Computing) did not emerge until 2019-2020.

The attempted remedy was to use the VPN products as a commercial vehicle to fund the deeper research. This was a reasonable strategy, but it required the VPN business to generate enough revenue and stability to sustain the team while the harder problem matured. The consumer product's shutdown eliminated that revenue stream before it could scale, and the enterprise product never disclosed meaningful traction.

Tertiary Cause: Two Products, One Incoherent Brand

Running CryptoSeal Privacy and CryptoSeal Connect simultaneously created a brand contradiction that likely confused both customer segments. Connect explicitly complied with government warrants and disclosed corporate monitoring — it was a compliance tool. Privacy explicitly protected users from government surveillance — it was an anti-compliance tool. The same company name appeared on both products.

This was not merely a marketing problem. It was a focus problem. The team was building and maintaining two products with fundamentally different threat models, different customer acquisition strategies, and different legal postures. For a seed-stage company with a small team, this division of attention during the critical 2013 growth window — when Snowden revelations were driving unprecedented consumer interest in privacy tools — may have prevented CryptoSeal Privacy from capturing the demand spike that briefly made the category legible to mainstream users.

No public statement from the founders addresses whether the two-product strategy was reconsidered at any point. The enterprise product (Connect) survived the consumer shutdown and continued operating until the Cloudflare acquisition, suggesting the team viewed it as the more viable business — but its commercial performance was never disclosed.

Structural Factor: The Acqui-hire as Outcome

The Cloudflare acquisition, announced June 18, 2014, was structured as a talent acquisition, not a product acquisition.[12] Cloudflare began retiring CryptoSeal's service immediately, with full shutdown by June 30 — twelve days after closing.[13] A security industry source characterized the deal as "as much about acquiring the security chops of Ryan Lackey as it is about getting into the VPN business."[28]

Lackey's own post-acquisition statement revealed relief as much as excitement: "Getting to focus on the parts of the company I really care about which are product and technology, and not having to constantly worry about administration, finance, etc. It's more efficient, less stressful, and produces better results."[29] This is the candid admission of a technical founder who found company-building burdensome — a signal that the organizational infrastructure required to scale CryptoSeal was never fully in place.

The acquisition price was never disclosed. Whether YC, Ron Conway, SV Angel, Yuri Milner, and the other investors made money — or how much — is unknown. The outcome for founders was employment at well-regarded organizations (Cloudflare, Y Combinator), which is a reasonable personal outcome but not the venture-scale return the investor roster might have expected.

Both Lackey and Cloudflare CEO Matthew Prince stated at the time of acquisition that they intended to relaunch a Cloudflare VPN service in 2015.[30] That product — Cloudflare WARP — did not launch until April 2019, five years later. Whether WARP incorporated CryptoSeal's technology or was built independently is not confirmed in any public source.

Key Lessons

  • A US-based consumer privacy VPN is structurally untenable without technical controls preventing compelled disclosure. CryptoSeal Privacy shut down in October 2013 not because it received a government order, but because the Lavabit precedent established that such an order could compel SSL key surrender. Lackey's own conclusion — that non-US providers are "objectively better" for privacy — was not a temporary judgment but a permanent structural reality for any US-incorporated privacy service. The lesson is not "avoid legal risk" but specifically: a US consumer privacy VPN cannot make honest promises to users unless it is architected so that no SSL keys exist to surrender, a technical bar that CryptoSeal had not met.

  • The developer secret management market needed seven more years to mature after CryptoSeal's founding. Tom Sparks noted in 2018 that EnvKey was achieving in that year what CryptoSeal had attempted in 2011, with more adoption.[27] HashiCorp Vault launched in 2015; AWS Secrets Manager in 2018. CryptoSeal's founding thesis was correct but four to seven years early — a gap that seed-stage capital cannot bridge. The VPN revenue vehicle was too small and too legally fragile to sustain the team through the wait.

  • Running two philosophically incompatible products under one brand dilutes focus during critical growth windows. CryptoSeal Privacy (protect users from the state) and CryptoSeal Connect (comply with the state) shared a name and a team but served opposite threat models. The Snowden revelations in June 2013 created a brief, intense window of consumer demand for privacy tools — a window CryptoSeal Privacy was positioned to capture. The divided attention of a small team maintaining two products with different legal postures, customer acquisition strategies, and value propositions likely prevented the company from capitalizing on that moment.

  • Platform dependency is an acquisition thesis, not a competitive moat. CryptoSeal was already running on Cloudflare's infrastructure before the acquisition.[20] Cloudflare CEO Matthew Prince described CryptoSeal as "CloudFlare in reverse" — a product that was complementary to, and dependent on, Cloudflare's platform.[22] The acquisition formalized a dependency that already existed. Startups building on top of a single platform provider are not building a moat — they are building an acquisition case.

  • The YC network outlasted the product. Lackey reflected that YC "rapidly accelerated our progress, and got us to an initial product and eventual sale of the business to Cloudflare a few years later."[31] Lackey joined Cloudflare — itself a YC company — and Sparks joined YC's software team. The investor relationships (Ron Conway, SV Angel, Yuri Milner) and the peer network from the S11 batch proved more durable than any product CryptoSeal shipped. For technical founders whose ambitions outrun their market timing, the network value of YC may be the most reliable return on the equity cost.

Sources

  1. Ryan Lackey — Wikipedia
  2. Q&A with Ryan Lackey — Cloudflare Blog
  3. Leah Culver of Breaker and Tom Sparks of YC Answer Your Questions — YC Blog
  4. U.S. VPN Provider Shuts Consumer Service in Response to Lavabit Case — PCWorld
  5. CryptoSeal — Tracxn
  6. CryptoSeal Offers VPN-as-a-Service — TechCrunch
  7. Cloudflare Acquires CryptoSeal — Cloudflare Blog
  8. Cloudflare Acquires Enterprise VPN Provider CryptoSeal — Computerworld
  9. CryptoSeal: Yet Another U.S. Privacy Service Shuts Down — Slate
  10. CryptoSeal Shuts Down Consumer VPN Service to Avoid Fighting NSA — Slashdot
  11. CryptoSeal VPN Close — RT
  12. Cloudflare Acquires CryptoSeal — Crunchbase
  13. CryptoSeal Shuts Down — Ron Paul Forums
  14. Cloudflare Acquires CryptoSeal — SecurityCurrent
  15. DEF CON 22 Sessions — EverySession
  16. Ryan Lackey — WordDisk
  17. Is Y Combinator Worth It in 2023? — Octal Substack