01 /Protection
Early Preview · Invite Only

Grooming unfolds slowly.
Kynos spots it fast.

Kynos reads conversations between adults and minors on your platform. The moment one starts to look like grooming, you get a real alert and evidence you can actually use. Built by a 501(c)(3) nonprofit.

A project of Zenith Kids, a 501(c)(3) nonprofit.

Figure 01

A live session in the Kynos dashboard. Risk climbing. Evidence already sealed.

Active · Peak 92%
Kynos dashboard showing a session where the risk score climbs from low to 92% over 60 messages
Every message, readBehavioral patterns, trackedAlerts the moment they matterEvidence, cryptographically sealedReports fit for law enforcementSHA-256 · Ed25519 · RFC 3161Zenith Kids · 501(c)(3)Built for the work, not for profitEarly preview, access by invitation
Every message, readBehavioral patterns, trackedAlerts the moment they matterEvidence, cryptographically sealedReports fit for law enforcementSHA-256 · Ed25519 · RFC 3161Zenith Kids · 501(c)(3)Built for the work, not for profitEarly preview, access by invitation
02 /Why this exists

Most grooming starts as a conversation that looks, at the time, like nothing at all.

By the time a single message reads as clearly predatory, the damage has usually been done. Grooming unfolds over weeks. Trust is built. Targets are isolated. Boundaries that should never have been crossed are slowly, deliberately normalized.

Human moderation can't scale to every conversation. Keyword filters catch the obvious and miss the dangerous. And when something is caught, evidence is often inadmissible by the time law enforcement sees it.

Kynos was built to close all three gaps at once.

Framing

Grounded in longitudinal conversational trajectory (LCT) research on adult-to-minor exploitation. Modeled on confirmed case patterns. Honest about what pattern-detection can and cannot do.

03 /Capabilities

Three things,
done seriously.

Kynos is not a content filter bolted onto your platform. It is a purpose-built system for detecting grooming patterns, preserving court-admissible evidence, and moving cases through your team in real time.

01 /
Detection

Reads the whole conversation, not just the last message

A neural language model evaluates message-level risk. Twelve behavioral signals track how the two speakers interact over time. The result is a single composite score that updates with every message.

Kynos analytics view showing risk trend across the past 30 days
02 /
Evidence

Every finding is signed, timestamped, and tamper-evident

Messages are hashed into a SHA-256 chain. Reports are signed with Ed25519. Timestamps come from an RFC 3161 trusted authority. Evidence from Kynos is verifiable by anyone, with or without a Kynos account.

Evidence chain view showing verified hash entries
03 /
Workflow

Built for the teams that have to respond

Alerts route to your queue. Cases group related sessions. Analysts tag, note, and escalate. Every action is logged. When a case needs to move to law enforcement, the evidence is already prepared.

Alerts dashboard showing active alerts in different states
04 /Evidence

Evidence that
holds up
outside the app.

Every forensic report is cryptographically bound to the conversation that produced it. Anyone, inside or outside your company, can verify the chain of custody without a Kynos account.

SHA-256 hash chain

Every message links to the one before it. A single tampered byte breaks verification everywhere downstream.

Ed25519 signatures

Reports are signed with a private key held only by our production infrastructure. Anyone can verify against the public key.

RFC 3161 timestamps

A trusted third-party time authority stamps each report. You can prove exactly when something existed.

Figure 02

Forensic report, bound to a 60-message session

Verified
A completed Kynos forensic report showing detected behaviors, signatures, and the evidence integrity envelope
05 /Operators

Built for the
people who
do the work.

Trust and safety analysts. Moderation leads. Law enforcement liaisons. Kynos is built around the workflow they already use, with the data they already need.

Alerts arrive in your queue. Cases group the relevant sessions. Evidence is one click from an export a court will accept.

AlertsCasesAnalyst taggingAudit logSigned exportsAPI access

Figure 03

Overview view. Active sessions, open alerts, 30-day alert trend.

Full platform tour
Kynos overview dashboard. Stats cards, alert activity chart, and open alerts.
06 /Mission

Kynos is one of the things Zenith Kids is building. The mission is bigger than any one piece of software.

Zenith Kids is a 501(c)(3) nonprofit focused on youth who have been through the hardest parts of the system. Survivors of abuse and trafficking, children in foster care, and young people moving through the juvenile justice system. We run STEAM programs and support work for them out of Charlotte, NC, with Nashville next.

Kynos was built inside Zenith Kids to do two things. Help protect the next generation of kids before harm lands on them, and fund the support work for the ones it already has.

Read the mission

07 /Get in touch
Kynos

Ready for a conversation?

Kynos is in early preview with a small group of platform partners and law enforcement contacts. If your team is working on this problem, we want to hear from you.