Migrate Markdown-Notes: projects, meetings, reference, personal
This commit is contained in:
99
archive/DARPA Slides.md
Normal file
99
archive/DARPA Slides.md
Normal file
@@ -0,0 +1,99 @@
|
||||
Here's what i've got so far
|
||||
|
||||
Intro slide 1
|
||||
title: Warfighter Zero Trust Authentication at the Tactical Edge
|
||||
|
||||
Slide 2
|
||||
Title: Authentication Factors – Passwords Are the Weak Link
|
||||
Content:
|
||||
•Something You Have: CAC Card, Passkey – Physical, secure, warfighter-ready.
|
||||
|
||||
•Something You Are: Face, Fingerprint, Voice – Unique, hard to steal.
|
||||
|
||||
•Something You Know: Passwords, Codes, Questions – Easy to crack, forget, or intercept.
|
||||
|
||||
Slide 3
|
||||
title: Passwords Are Old – And Obsolete
|
||||
content:
|
||||
•1961: First password login on a time-sharing OS.
|
||||
|
||||
•1962: Bug exposed all passwords in plain text—exploited instantly.
|
||||
|
||||
•2022: 24+ billion stolen credentials flood the dark web.
|
||||
|
||||
•Today: nKode replaces ancient passwords with edge-ready security.
|
||||
|
||||
Slide 4
|
||||
title: Good Passwords Are Hard to Remember – And Still Fail
|
||||
content:
|
||||
•Problem: Complex passwords (e.g., 99$T7oEJ^&pHp%5#hb) defy memory.
|
||||
|
||||
•Weakness: Reuse invites credential stuffing; keyloggers grab every stroke.
|
||||
|
||||
•Flaw: Reliance on perfect encryption—compromised channels doom passwords.
|
||||
|
||||
•Fix: nKode ditches passwords for secure, simple warfighter auth.
|
||||
|
||||
Slide 5
|
||||
title: Credential Stuffing – Passwords Betray the Mission
|
||||
content:
|
||||
•Threat: 80% of breaches start with stolen passwords reused in automated attacks.
|
||||
|
||||
•Risk: Commercial breaches (e.g., email, banking) expose military accounts if warfighters overlap.
|
||||
|
||||
•Problem: You can’t control external leaks; passwords make it your mess.
|
||||
|
||||
•Solution: nKode ends password risks with edge-ready security.
|
||||
|
||||
Slide 6
|
||||
title: Keyloggers + Passwords = Warfighter Risk
|
||||
content:
|
||||
•Threat: Keyloggers (software/hardware) steal passwords by recording keystrokes.
|
||||
|
||||
•Risk: Exposes military networks and tactical edge ops to adversaries.
|
||||
|
||||
•Problem: Hard to detect; passwords are the weak link.
|
||||
|
||||
•Solution: nKode eliminates passwords, secures warfighters.
|
||||
|
||||
|
||||
Slide 7
|
||||
title: nKode Authenticates Over Compromised Channels
|
||||
content:
|
||||
•Challenge: Encrypted channels (e.g., TLS) can be compromised by MITM attacks.
|
||||
|
||||
•Risk: Adversaries intercept or spoof credentials, disrupting tactical edge ops.
|
||||
|
||||
•nKode Advantage: Authenticates reliably even if encryption is breached.
|
||||
|
||||
•How: An nKode keypad randomly shuffles making it impossible to know what icons are getting selected
|
||||
|
||||
Slide 8
|
||||
title: nKode Outclasses Passwords – Warfighter Ready
|
||||
content:
|
||||
•Passwords Fail: Hard to recall, reused, nabbed by keyloggers.
|
||||
|
||||
•nKode Wins: Pictographic, unique, keylogger-proof.
|
||||
|
||||
•Edge Power: Authenticates over compromised channels, <1KB bandwidth.
|
||||
|
||||
•Bottom Line: Simple to use, impossible to crack.
|
||||
|
||||
Slides 9-11
|
||||
Explains what nKode is and how it works
|
||||
|
||||
Slide 12
|
||||
Title: The Team
|
||||
Content:
|
||||
content about the team...
|
||||
|
||||
Slide 13
|
||||
Demo
|
||||
|
||||
|
||||
I think the flow should be different:
|
||||
The 2nd slide "Authentication Factors... " is a good intro.
|
||||
I think the slides that discuss all the different attacks then explain how nkode fixes the issue should be change.
|
||||
I think the slides should first introduce the problem of passwords.
|
||||
It should explain how the state-of-the-art in Something you know authentication has stagnated for the last 60 years where something you have and something you are have made progress in leaps and bounds.
|
||||
Then i should explain what nKode is. After the audience has a basic explanation of nkode, i can wrap up by explaining how nkode can solve all the vulnerabilities of passwords followed by the demo
|
||||
Reference in New Issue
Block a user