Compound
GrantsAbout

2026 Compound

Compound
GrantsAbout
Back to Database
Novel Security & Authentication
Other

Novel Security & Authentication

Novel authentication in an advanced computing and interconnected world

Concept

In the burgeoning age of advanced computing, with AI and quantum computers potentially threatening conventional cryptographic systems, innovative security and authentication solutions that leverage new technological advancements and alternate computing systems (like biocomputing or reversible computing, among others) will become evidently necessary. This focus emerges from recognizing the fragility of our current digital infrastructures, especially when safeguarding critical information across various industries.

Longer Description

Increasingly technology is underpinning core threats that could emerge in our world, both in terms of government-centered wars as well as corporate threats. With the rapid evolution of computing technology, traditional security and authentication mechanisms face unprecedented threats. Quantum computers, for instance, could theoretically break widely-used encryption methods, and advanced AI algorithms can potentially outsmart existing digital security protocols. Thus, exploring novel authentication methods, such as biological anchors (using unique biological or biometric signatures for security) or novel computing paradigms like reversible or biocomputing, opens avenues to fortify digital security in a new world.

Biometrics

Biometrics has steadily infiltrated our digital security paradigms, with fingerprints, facial recognition, and retinal scans becoming commonplace. However, to construct a robust, renewable, and unassailable security architecture, merely employing existing biometric strategies might not suffice. The future behooves the integration of:

  • Deep-biometrics: Beyond surface-level facial recognition or fingerprint scans, harnessing aspects like heartbeat, gait, and even brainwave patterns as unique identifiers. Utilizing AI to process and secure this biometric data in a way that's incredibly hard to replicate or forge.
  • Adaptive Biometric Systems: Imagine a system that dynamically adapts its verification parameters based on a user’s behavioral and physiological biometrics, such as recognizing stress levels through voice modulation or unusual transaction patterns.

Digital Threat Vectors

An underlying threat, more substantial than direct financial theft, lies in the potential to sabotage key infrastructures. This digital warfront could manifest as:

  • Cyber-Attacks on Power Grids: Nation-states or rogue entities disabling power infrastructures, thrusting regions into darkness and crippling defense and emergency services, thereby holding nations at ransom.
  • Bioweapon Threats: Unauthorized access to genetic data could pave the way for targeted biological threats, deploying bioweapons that could exploit specific genetic vulnerabilities or countries.
  • Data Manipulation: Subtly altering digital data to disrupt financial markets, induce panic, or manipulate key decision-making in governments and corporations, which could have cascading impacts on global economies.
  • Agricultural Sabotage: Targeting precision agriculture systems, manipulating data, and disrupting crop production schedules, leading to food scarcity and economic instability.

Likely a venture-scale company will have a variety of principles including:

  • R&D Excellence: Heavy investment in research, unraveling new biometrics, understanding cryptographic vulnerabilities, and simulating potential cyber-attack scenarios to prepare and pre-emptively secure against them.
  • Collaborations: Forming alliances with governments and biotech entities to comprehend the diverse requirements and integrate respective expertise.
  • Regulatory Foresight: Engaging with regulatory bodies, ensuring that as the company evolves, it adheres to, influences, and even helps formulate cybersecurity regulations.
  • GTM Sequencing: Likely starting something high-value but narrow and expanding outward with the security modality, as companies in crypto have done with hardware wallets or Clear has done in airports to broader venues.

Comparable Companies

  • Clear
  • Trezor/Ledger
  • Palo Alto Networks/Darktrace/etc.
  • Variety of AI-detection companies
  • Quantum Xchange and other quantum security companies

Related Reading

  • Continuous Multimodal Biometric Authentication Schemes: A Systematic Review
  • SOK: An Evaluation of Quantum Authentication Through Systematic Literature Review
  • A Comprehensive Overview on Biometric Authentication Systems Using Artificial Intelligence Techniques

Related Theses

2nd Life Batteries for Storage
01
Other

2nd Life Batteries for Storage

Used EV batteries repurposed for grid and data center energy storage

Read
Marketplaces Requiring Private Intelligence
02
AI/ML

Marketplaces Requiring Private Intelligence

For deals requiring human-like analysis and negotiation but can’t risk information leakage

Read
Distraction-Free Personal Device
03
Other

Distraction-Free Personal Device

Minimally viable, distraction-freeing personal device

Read

2026 Compound