Prove the chain is trusted.
    Without exposing it.

    Every carrier and every sub of every carrier verified directly from authoritative registries, to any depth. Your shipper gets a single signed answer: this chain is trusted and authorised. Margins and intermediaries stay private. If something goes wrong, an automated deep audit unseals the full chain for the investigator.

    Tier N

    Any depth, recursive authorisation

    Yes / no

    Chain proof to the shipper

    Sealed

    Full chain only on incident audit

    No new dispatch processNo required TMS swapMargins stay privateWorks at any chain depth

    Shipper sees

    Chain trusted.

    Under the seal

    1. A

      Lead forwarder

      You

    2. B

      Pair A β†’ B

      sealed

    3. C

      Pair B β†’ C

      sealed

    4. N

      Tier N

      any depth

    Audit on incident only

    Tier N Β· any depth

    Why this matters

    The market pressure already on the table.

    Phantom carriers and double brokering account for the fastest growing fraud loss class in European road freight.

    TT Club . BSI cargo theft report

    KRAVAG put the 2024 phantom carrier loss in DACH at about 859 million euros across the insured book.

    KRAVAG market briefing 2024

    The EU Mobility Package shifts compliance from annual paper filings toward continuous, machine readable evidence.

    European Commission, Mobility Package

    What you actually get

    Four moves. No margin exposed.

    Each pillar maps to one thing your dispatch desk can do without changing TMS, without exposing pricing, and without rebuilding the carrier file.

    1. 01

      Pairwise authorisation, any depth

      Each link only authorises the next link. The chain extends as far as it needs to. Every link stays private to its pair. The shipper never sees who subcontracted to whom. They get one answer: the chain is trusted and authorised, or it is not.

    2. 02

      Phantom carriers blocked at dispatch

      Look alike VAT numbers, recycled licences, and four day old domains never reach your tender list. Verified only dispatch removes the most common attack surface.

    3. 03

      Continuous monitor, daily delta

      Licence lapses, sanctions hits, and beneficial owner changes surface across your portfolio the same day, not at the next annual review.

    4. 04

      Automated deep audit on incident

      Day to day, the chain stays sealed. The moment a theft, claim or public sector request opens a case, the full chain unseals automatically for the investigating party. Source cited, signed, end to end.

    How a chain verification flows

    From the booking email to a sealed, provable chain.

    1. Step 01Shipper books the load
    2. Step 02You authorise the next link
    3. Step 03More subcontracting?Yes / No fork
    4. Step 04Each link authorises the next
    5. Step 05Shipper sees yes / no chain proof
    6. Step 06Sealed, ready for incident audit

    Signature view

    One frame, the whole pattern.

    The bespoke lane visual: how a verified record actually looks where this lane lives.

    Shipper sees

    Chain trusted.

    Under the seal

    1. A

      Lead forwarder

      You

    2. B

      Pair A β†’ B

      sealed

    3. C

      Pair B β†’ C

      sealed

    4. N

      Tier N

      any depth

    Audit on incident only

    Tier N Β· any depth

    Illustrative metrics

    What forwarders typically report.

    Modeled ranges from field deployments. Your numbers depend on the share of subcontracted volume and how many of your tenders already require chain proof.

    01
    Tier N
    Any chain depth, per shipment
    02
    Days β†’ minutes
    Subcontractor approval cycle
    03
    50 to 80%
    Less manual diligence handling
    04
    1 click
    Audit unseal on incident

    Freight forwarder scenarios

    Pick the one that matches your week.

    Each scenario is one concrete situation, with the same verification primitive underneath.

    Objections we hear most

    Honest answers. No theatre.

    Claim

    Our margins must stay invisible to the shipper.

    Reply

    They do. The shipper gets a yes or no on chain integrity, never the carriers in it and never the price. The full chain only unseals if an incident triggers an audit.

    Claim

    We already vet subcontractors annually.

    Reply

    Annual vetting misses the lapses that happen between reviews. Continuous source verification keeps the policy intact and removes most of the manual handling.

    Claim

    Our TMS already manages our carrier base.

    Reply

    Keep your TMS. The verified record sits underneath and feeds back where it helps. There is no required swap and no migration project to start.

    Claim

    Deep chain proof is unrealistic in spot.

    Reply

    Pairwise authorisation makes any depth tractable. Each link only proves its own next step. The shipper still gets one signed yes or no answer, no matter how long the chain.

    FAQ

    Quick answers.

    What exactly does the shipper see?

    A single signed answer for the shipment: the chain is trusted and authorised, or a link is missing or unauthorised. The shipper does not see who is in the chain, what they paid, or your commercial relationships. Day to day the chain is sealed.

    When does the full chain become visible, and to whom?

    Only on incident. If a theft, claim, public sector request or dispute opens a case, an automated deep audit unseals the full chain for the investigating party. Source cited, signed, end to end. No manual digging through emails.

    How does this work for spot freight?

    The same way. New carriers complete a guided registration in about five minutes. Already verified carriers approve the next link in one click. The chain proof is available even on a same shift booking.

    Do our subcontractors have to use a portal?

    No. They authorise the next link through the same email or message flow you already use. A portal is available, but never required.

    What happens when a subcontractor's licence lapses mid contract?

    The platform flags the lapse the same day across every shipment that depends on it, so dispatch sees it immediately and the shipper's chain proof flips to broken until it is resolved.

    Where does the verified data come from?

    National operator registries, national operator and driver registers, VAT registers, sanctions lists, the carrier's insurer for live cover, and the issuing bodies for licences and certifications. Every fact is signed and source cited.

    Verified once. Trusted everywhere.

    Map your first chain in about 5 minutes.

    Free to start. One sub or your entire network.