Infrastructure for
the Physical Web
Professional-grade NFC utility with cryptographic signing, asset tracking, and local-first architecture. Transform standard NFC tags into verifiable physical data points using Secure Enclave-backed digital signatures. Built for systems integrators, security auditors, and creative studios.
Download for iOS View on GitHubInfrastructure-Grade Tools
Unlike consumer-grade "novelty" apps, OKTap prioritizes cryptographic integrity, local-first reliability, and high-speed deployment.
Trust Mode
Hardware-backed cryptographic signing via Secure Enclave. P256-SHA256 integrity verification. Tamper detection without cloud dependency.
Universal NDEF
Read, write, and clone standard NFC tags. Support for URL, Text, vCard, Wi-Fi, JSON. Multi-record handling with raw data inspection.
Asset Tracking
Lightweight equipment management for creative studios. Quick check-out/check-in, maintenance logs, and usage history with CSV/JSON export.
Pro Utilities
Copy, Clone, Diagnose, Repair, and Format tools. Batch deployment with auto-incrementing fields. Built for high-throughput professional workflows.
100% Offline
Zero server dependency. All data stays on device. Works in lead-shielded server rooms. Private keys never leave Secure Enclave.
High Performance
<500ms cold launch to scan. >99.9% write reliability on standard silicon. Built for 10-year operational lifecycle.
Built for Professionals
OKTap is designed for operators who value data sovereignty, offline reliability, and cryptographic integrity over cloud-based management.
๐ฌ Creative Studios
Track cameras, lenses, lighting equipment. Quick gear check-out/check-in. Log maintenance events and battery cycles.
๐๏ธ Systems Integrators
Deploy 500+ tags for smart buildings. Asset tracking with cryptographic provenance. Batch write with auto-incrementing serial numbers.
๐ Security Auditors
Instant provenance verification. Detect tag swapping or alteration. Maintain immutable audit trails without proprietary ecosystems.
โ๏ธ Power Users
Manage personal automation triggers. Clone critical NFC configurations. Privacy-focused digital identity without cloud lock-in.
Privacy by Design
Local-First Architecture
Your data never leaves your device. Period.
No Data Collection
Zero PII. Zero analytics. Zero tracking.
Secure Enclave
Private keys secured by hardware.