Traditional Wires Move Data. We Move Proof.

Eric Beans, CEO, H33.ai, Inc.

Every day, trillions of dollars move across international wire networks. SWIFT, Fedwire, CHIPS, TARGET2 — these systems were built decades ago under a simple assumption: to validate a transaction, you need to see the transaction. Every intermediary in the chain receives the full payload. Account numbers. Beneficiary names. Addresses. National identifiers. Risk scores. Source of funds narratives. They see it all because, historically, there was no other way to perform compliance checks.

That assumption is wrong. It was always wrong. We just did not have the mathematics to prove it until now.

The Problem: Data Replication as a Compliance Model

Consider a standard international wire transfer from a bank in New York to a bank in Frankfurt. The originating institution assembles a message — a SWIFT MT103 or its ISO 20022 equivalent. That message contains roughly 47 distinct data fields. The originator's name. The originator's address. The originator's account number. The beneficiary's name. The beneficiary's account number. The beneficiary's bank identifier. Ordering customer details. Intermediary bank details. Regulatory reporting codes. Purpose of payment codes. And more.

This message passes through at least three intermediaries before reaching the beneficiary's bank. Each intermediary receives, stores, processes, and forwards the full payload. Each one runs its own compliance checks — sanctions screening, jurisdiction filtering, risk scoring — on the raw data. Each one maintains a copy in its own systems for regulatory retention periods that typically span five to seven years.

The result: a single $50,000 wire transfer generates four to six full copies of sensitive financial identity data, stored across institutions in multiple jurisdictions, subject to different data protection regimes, defended by different security architectures, and retained for different periods.

This is not compliance. This is systemic data proliferation masquerading as compliance.

The Breach Surface Is the Architecture

When security professionals assess wire transfer systems, they often focus on encryption in transit and at rest. TLS protects the data between hops. AES encrypts it in storage. These are necessary but fundamentally insufficient because they miss the core problem: the data is decrypted at every intermediary for processing.

Every compliance check at every intermediary requires the data to be in plaintext. The sanctions screening engine needs to read the beneficiary name. The jurisdiction filter needs to read the country code. The risk scoring model needs to read the transaction amount, currency, and corridor. Encryption protects the wire between processing points. It does nothing at the processing points themselves. And the processing points are where breaches occur.

Financial institutions reported over 3,200 data breach incidents in 2025. The average cost per breach exceeded $5.9 million. A significant portion of these breaches involved correspondent banking and wire transfer systems — not because the encryption was weak, but because the architecture required decryption at every step.

H33-Wire-Proof: A Different Model

H33-Wire-Proof fundamentally restructures how wire transfer compliance works. Instead of transmitting data for validation, we transmit proof of validation. The compliance checks still happen. The sanctions screening still executes. The jurisdiction filters still apply. The risk scoring still runs. But none of these operations require the intermediary to see the data.

Here is how it works.

Step 1: Encrypted Compliance at the Originator

The originating bank encrypts the wire transfer payload using fully homomorphic encryption (FHE). This encryption allows computations to be performed on the ciphertext without ever decrypting it. The encrypted payload is then processed through H33's compliance pipeline — sanctions screening, beneficiary matching, jurisdiction checks, risk scoring — all operating on the encrypted data.

Each compliance check produces two outputs: a binary pass/fail result and a cryptographic proof that the check was correctly executed. The proof is bound to the encrypted input via a SHA3-256 commitment. Three-family post-quantum signatures — spanning three independent hardness assumptions — make the proof tamper-resistant against both classical and quantum adversaries.

Step 2: Minimal Disclosure Assembly

After all compliance checks pass, H33-Wire-Proof assembles the outbound message. Instead of transmitting all 47 fields, it transmits exactly 5: the fields legally required by the receiving jurisdiction's regulations. Everything else is replaced by cryptographic proofs. The beneficiary's bank does not receive the originator's full address — it receives a proof that the originator's address was verified against the sanctions list and cleared. It does not receive the originator's national identifier — it receives a proof that the identifier was validated against the relevant watchlists.

The reduction is dramatic. From 47 fields of raw personal and financial data to 5 fields of legally mandated information plus cryptographic proofs. An 89% reduction in data exposure. Same compliance outcome. Same regulatory satisfaction. Fundamentally different risk profile.

Step 3: Proof Verification at the Receiver

The receiving bank verifies the proofs. This verification is computationally straightforward — it confirms that the proofs are valid, that they correspond to the correct compliance checks, and that they were generated by a trusted compliance pipeline. The receiving bank never sees the underlying data. It never needs to. The proof is sufficient.

Every proof is attested by H33-74, our 74-byte post-quantum attestation. This attestation is independently verifiable, timestamped, and bound to the specific wire transfer event. Regulators can verify the attestation chain at any point without requiring access to the underlying customer data.

Why 47 Fields Exist in the First Place

The 47-field structure of modern wire messages evolved incrementally over four decades. SWIFT introduced the MT message format in 1977. ISO 20022 expanded it further. Each regulatory cycle added new requirements — FATF travel rule fields, beneficial ownership indicators, purpose of payment codes, regulatory reporting flags. No one ever asked whether all of these fields needed to be transmitted to every party. The assumption was always that they did, because validation required visibility.

H33-Wire-Proof challenges that assumption at the mathematical level. Consider sanctions screening, which is the compliance check most often cited as requiring raw data access. Traditional sanctions screening compares beneficiary names against watchlists using fuzzy string matching algorithms. This requires the name to be in plaintext.

FHE-based sanctions screening performs the same comparison — including fuzzy matching with configurable similarity thresholds — on encrypted data. The encrypted beneficiary name is compared against an encrypted watchlist. The result is a binary match/no-match output, encrypted, which is then decrypted only by the originating institution's key. The intermediary that runs the screening never sees either the name or the watchlist entries that were compared. It only sees the result: clear or flagged.

The Compliance Equivalence Argument

Financial regulators care about outcomes, not mechanisms. The Bank Secrecy Act does not mandate that sanctions screening must operate on plaintext data. It mandates that sanctions screening must be performed effectively. FATF Recommendation 16 does not require that every intermediary see the originator's full details. It requires that the originator's identity be verified and that sufficient information accompany the transfer to allow the beneficiary's institution to identify suspicious transactions.

H33-Wire-Proof satisfies these requirements while eliminating unnecessary data exposure. The originator's identity is verified — cryptographically, with proof. Sufficient information accompanies the transfer — the legally required fields plus proofs that all additional compliance checks were performed and passed. The beneficiary's institution can identify suspicious transactions — because the proof includes the compliance outcomes.

This is not a weakening of compliance. It is a strengthening. Traditional wire compliance relies on trust: trust that the originating bank performed adequate checks, trust that the intermediaries did not alter the data, trust that the audit logs are accurate. Proof-based compliance replaces trust with mathematics. The proof is either valid or it is not. There is no gray area, no reliance on institutional reputation, no ambiguity about what was checked and when.

The 89% Reduction in Practice

The 89% data reduction is not a theoretical projection. It is a measured outcome from applying H33-Wire-Proof to standard SWIFT MT103 message formats and their ISO 20022 equivalents. Of the 47 fields in a typical international wire message, only 5 are legally required to be transmitted in plaintext to the beneficiary's bank under the most stringent regulatory regimes. These are: the transaction amount, the currency code, the value date, the beneficiary's account identifier (which can be tokenized), and a settlement reference.

The remaining 42 fields are replaced by cryptographic proofs. Each proof is compact — measured in bytes, not kilobytes. The total proof payload is smaller than the original plaintext payload. The wire transfer is actually more efficient, in terms of raw message size, than the traditional alternative. Less data transmitted. Less data stored. Less data at risk.

What Happens When a Check Fails

When a compliance check fails — a potential sanctions match, a jurisdiction flag, an elevated risk score — the system handles it exactly as traditional systems do, with one critical difference: the escalation does not require sharing the raw data with the intermediary.

The proof of failure is transmitted to the originating bank's compliance team. They review the flagged transaction using their own decrypted data. If the flag is a false positive, they can provide additional encrypted evidence and re-run the check. If the flag is valid, the transaction is blocked. At no point does the intermediary or any external party need to see the underlying customer data to facilitate this process.

This is particularly important for correspondent banking relationships, where the originating bank may have customer data that is subject to strict local data protection laws — EU GDPR, for example — that restrict cross-border data transfers. Traditional wire compliance often creates tension between anti-money laundering requirements and data protection requirements. H33-Wire-Proof eliminates this tension entirely. The compliance checks are performed. The data stays put.

Post-Quantum Attestation: Why It Matters for Wires

Wire transfer compliance proofs must remain verifiable for years — often seven or more, depending on the jurisdiction. A proof generated today using classical cryptographic signatures could be forged by a quantum computer within that retention window. If the proof can be forged, the audit trail is worthless.

H33-74 attestation uses three independent post-quantum signature families, each based on a different hardness assumption. An attacker would need to simultaneously break lattice-based, hash-based, and structured-lattice cryptographic problems to forge a single attestation. This is not a single point of failure hedged with redundancy. It is three mathematically independent barriers, any one of which is sufficient on its own.

Every wire proof generated by H33-Wire-Proof carries this attestation. The proof remains valid — and verifiable — regardless of advances in quantum computing. This is not future-proofing as a marketing concept. It is a concrete engineering decision driven by the regulatory reality of multi-year retention requirements for financial audit trails.

Integration with Existing Infrastructure

H33-Wire-Proof does not require banks to replace their wire transfer systems. It operates as a compliance layer that sits between the originating bank's payment engine and the outbound message gateway. The bank's existing systems generate the wire instruction as usual. H33-Wire-Proof intercepts the payload before transmission, performs encrypted compliance, assembles the minimal-disclosure message with proofs, and releases it to the existing messaging infrastructure.

On the receiving end, a proof verification module validates the incoming proofs before the message is processed by the beneficiary bank's core systems. This module can operate as a standalone service or integrate directly with the bank's existing compliance platform. The integration footprint is minimal because the inputs and outputs are standard message formats — only the content has changed from raw data to proofs.

The H33 Proof Lab provides a testing environment where institutions can evaluate wire-proof processing against their own message formats and compliance rules before any production deployment.

The Economics of Less Data

Less data means less exposure. Less exposure means less breach risk. Less breach risk means less expensive insurance, less expensive compliance operations, less expensive incident response. The economic argument for proof-based wire compliance follows directly from the data reduction.

Consider storage alone. A correspondent bank processing 500,000 international wires per month stores full payload data for each, retained for seven years. That is 42 million records of sensitive financial identity data. With H33-Wire-Proof, 89% of that data is replaced by compact proofs. The storage reduction is significant, but the risk reduction is transformative. You cannot breach data that does not exist in your systems.

Compliance staffing follows a similar trajectory. When intermediaries do not have raw data to review, they do not need teams to review it. The proof verification is automated. The compliance outcome is binary. The human review is reserved for genuine escalations at the originating bank — the institution that actually has the customer relationship and the decryption keys.

From Data Transmission to Proof Transmission

The wire transfer industry is at an inflection point. Real-time gross settlement systems are modernizing globally. ISO 20022 migration is underway. Instant payment networks are expanding across borders. Each of these modernization efforts addresses speed, interoperability, and message richness. None of them address the fundamental problem: every intermediary still sees everything.

H33-Wire-Proof addresses the fundamental problem. The wire still settles. The compliance still happens. The regulation is still satisfied. But the data stays with the institution that owns it, and the proof is what travels. This is not an incremental improvement to the existing model. It is a structural change in how financial institutions think about compliance data: not as a payload to be shared, but as a fact to be proved.

Forty-seven fields transmitted to every intermediary was the best we could do in 1977. It is not the best we can do in 2026.

See Wire-Proof in Action

Schedule a technical demonstration of H33-Wire-Proof processing against your wire message formats and compliance rules.

Schedule a Demo