Migrate Markdown-Notes: projects, meetings, reference, personal

This commit is contained in:
2026-01-26 22:05:01 +00:00
parent 9507ddf856
commit 49025b3586
93 changed files with 3422 additions and 11 deletions

View File

@@ -0,0 +1,168 @@
---
marp: true
---
# nKode
<!--
Hello, My name is Donovan Kelly, CTO at Arcanum Technologies. We've developed nKode, a patented pictographic passcode that reinvents authentication—making it more secure and intuitive for tactical edge environments. Arcanum has partnered with the McCrary Institute at Auburn University to leverage their cybersecurity expertise and veteran insights.
-->
---
# Defining the Problem
- Historical Context
- Passwords as cornerstone of "something you know" authentication since 1961 (MIT's Compatible Time-Sharing System)
- No major reinvention in over 60 years, despite evolving threats
- Key Problems in Authentication
- High cognitive load: 12-16 character passwords rotated every 60-90 days; prone to reuse and errors under stress
- Vulnerabilities: Hacked at 95 per second globally; susceptible to phishing, keyloggers, and credential harvesting
- Tactical Edge Challenges: Difficult with tactical gear (e.g., gloves); bypassed in high-risk, low-bandwidth environments; limits multi-factor authentication (MFA)
<!--
Since their introduction in 1961 with MIT's Compatible Time-Sharing System, passwords have remained the cornerstone of "something you know" authentication. Yet, amid the rapid escalation of cyber threats over the ensuing six decades, this paradigm has undergone little fundamental reinvention. Passwords impose a taxing cognitive burden on warfighters, necessitating the memorization and periodic rotation of 12-16 character sequences every 60-90 days—a process prone to reuse across systems and errors amid high-stress operations. Their vulnerabilities are profound, with breaches occurring at a staggering rate of 95 per second worldwide, rendering them highly susceptible to credential harvesting. At the tactical edge, these deficiencies are amplified by environmental constraints. Inputting credentials while encumbered by tactical gear, such as gloves, proves impractical and often leads to security bypasses in high-risk, low-bandwidth scenarios that also constrain multi-factor authentication. Compounding this, AI-orchestrated attacks from nation-state actors intensify the overall threat landscape, underscoring the urgent need for evolution.
-->
---
# Current State of the Art
- Relies on static inputs: Keyboards, text-based passwords, and mental models outdated for modern threats
- Alternatives like biometrics (facial/iris/fingerprint/voice): Effective in ideal conditions but constrained in low-light, noisy, or gloved scenarios
- Emerging Tech: Zero Trust, edge computing, AI-driven security in systems like Tactical Assault Kits—but compromised by AI attacks, signals intelligence, and nation-state exploits
<!--
The state of the art includes static text inputs and biometrics like facial recognition or fingerprints, which work well in controlled environments but falter in real-world tactical scenarios—think low light for iris scans, noise for voice, or gloves blocking fingerprints. Systems like Software-Defined Radios and Tactical Assault Kits integrate Zero Trust and edge computing for better security, but they still rely on vulnerable authentication methods that AI exploits, cognitive electronic warfare, and signals intelligence can crack. This is where nKode steps in—addressing these gaps by advancing beyond static, text-based systems to a visual, resilient alternative.
-->
---
<style scoped>
section {
font-size: 24px; /* Adjust to a smaller value like 20px or 1.5rem; default is around 35px */
}
</style>
# How nKode Aligns with DARPA ERIS
- Topic area fit: Advances resilience, efficiency, and effectiveness for strategic systems across critical infrastructure and military C2 at strategic, command, operational, and tactical edges.
- Mission tie: Supports DARPAs aim to create technological surprise for U.S. national security.
- nKodes role: Reinvents “something you know” with keyboard-less, AI-generated icons to keep auth working in contested or low-bandwidth networks.
- Surprise element: Resilient to credential reuse and keyloggers; can operate over unencrypted or bandwidth-constrained links without exposing secrets.
- Operational benefits: Faster, low-cognitive-load access under stress; reduces bypasses and maintains mission continuity for edge tools like TAK.
- Architectural alignment: Complements Zero Trust, edge computing, and secure operations in dynamic, degraded conditions.
- Impact: Hardens C2 and critical infrastructure against AI-driven credential harvesting and disruption in contested environments.
<!--
nKode aligns with ERIS Topic Area “advanced technologies for improved resilience, efficiency, and effectiveness of strategic systems,” including critical infrastructure and military C2 across all edges. In real-world degraded comms where passwords, OTPs, or push prompts fail or are vulnerable, nKode strengthens authentication with keyboard-less icon challenges that move over tiny or even unencrypted pipes while staying resistant to capture and replay. This yields quick, low-cognitive-load logins under stress and reduces workarounds, keeping tools like Tactical Assault Kits online. The approach supports DARPAs goal of technological surprise by denying adversaries easy wins from phishing and keylogging and by staying operable when bandwidth and trust are scarce.
-->
---
<style scoped>
section {
font-size: 20px; /* Adjust to a smaller value like 20px or 1.5rem; default is around 35px */
}
</style>
# Current Approaches vs. nKode
- How the Problem Is Addressed Today
- Long, complex passwords (1216 chars), rotated every 6090 days
- Prone to reuse, keyloggers, shoulder surfing; high cognitive load under stress
- Requires keyboards (impractical with tactical gear); MFA often needs secure channels
- High global breach cadence; controls get bypassed in high-risk environments
- Biometrics (face/iris/fingerprint): fragile under duress, dirt, gloves, or low light
- Whats New in nKodes Approach
- Patented virtual keypad with shuffling icons; AI-generated, user-unique icon sets
- Vs. Passwords: No text entry; strong guessing resistance with compact inputs
- Vs. Biometrics: No special hardware; reliable under pressure and harsh conditions
- Backend uses a CSPRNG (e.g., ChaCha20) to drive shuffling over low-trust links
- Resilient to keyloggers and replay; auto-rotation without user action; shoulder-surf resistant
- Field-ready path with TRL 5 progression
- Why It Matters at the Edge
- Works in low-bandwidth or contested environments
- Cuts cognitive load and speeds access, reducing bypass behavior
- Preserves mission continuity for edge tools and C2 workflows
<!--
Today, authentication relies on outdated standards, leading to credential reuse and exploitation. Passwords can be easily compromised via reuse, especially at the tactical edge where bandwidth is low and stress is high. Biometrics help but are constrained in field scenarios (e.g., gloves, environmental factors). This results in mission risks, as warfighters may bypass controls. What's new is the dynamic, visual paradigm: icons shuffle per login, mapped to tokenized values via backend cipher. Unlike static passwords or biometrics, nKode prevents reuse (unique icons) and operates in low-bandwidth environments. This compares favorably to current practices by flipping the usability-security trade-off easier to remember yet more secure. It's TRL 5, and advances SoTA by closing attack vectors like shoulder-surfing.
-->
---
# Foreseen Barriers
- Adoption Risk: Authentication changes are high-risk; companies hesitant to be first adopters
- Pitch History: Positive feedback from dozens (e.g., FIS, banks) over 10 years, but no implementations
- Technical: Integration with legacy DoD systems; user training; device compatibility (rugged tablets)
- Evolving Threats: Advanced AI shoulder-surfing; scaling to millions/billions of unique, psychologically neutral icons to prevent AI prediction of user selections
- Mitigation: Leverage ERIS for rapid pathways; partner with McCrary Institute for validation
<!--
Barriers include institutional inertia—despite excitement from fintech like FIS (Fidelity National Information Services), no one wants to pioneer due to perceived risks. In DoD, integrating with C2 systems or ATACs could face hurdles. Scaling icon generation is key: we need millions or billions of AI-generated icons that are unique and psychologically neutral (free of biases that could make selections predictable), ensuring no AI can train on patterns for attacks. We'll address this via human factors expertise (as per prior feedback), field testing, and ongoing R&D—nKode's design inherently resists many exploits, but this requires advanced AI safeguards.
-->
---
# Why nKode Will Succeed
- Market Validation: Independent survey by User Insight 52% prefer nKode (vs. 28% passwords)
- High Acceptance: 17% above "very high" benchmark (35%)
- Team Strength: Veterans with cyber ops experience; TRL 5 proven
- Dual-Use Potential: Defense (tactical edge) + Commercial
- Evidence: Exceeds benchmarks; low friction deployment
<!--
Success is backed by data: User Insight's survey showed exceptional preference (52%), far above norms, indicating strong usability. Our team's expertise (Army/Navy vets) and partnerships ensure execution. nKode's success lies in its intuitive design users remember one nKode for all, with auto-rotation. This will drive adoption, per ERIS goals, leading to safer operations.
-->
---
# Proposed Plan/Strategy if Funded
- Phase 1: Adapt commercial app for tactical edge; integrate with ATACs/Tactical Assault Kits
- Phase 2: Field validation/testing in simulated environments; address barriers (training/integration)
- Phase 3: Advance to TRL 6-7; deploy OpenID Connect for DoD systems
- Timeline: 12-18 months; focus on low-bandwidth resilience
- Outcomes: Prototype for warfighters; pathway to commercialization
<!--
If funded, we'll pivot our existing commercial app (with OpenID/OAuth support) to defense needs. Develop a glove-friendly version for tactical edges, sans biometrics. Strategy: Collaborate with McCrary for demos and integration. Budget for AI enhancements and testing. This aligns with ERIS's rapid acquisition, transitioning from idea to prototype for enhanced strategic system resilience.
-->
---
# Arcanum and McCrary Technical Team
pictures
<!--
The nKode team is a unified collaboration between Arcanum Technology LLC and Auburn Universitys McCrary Institute for Cyber and Critical Infrastructure Security. Brooks Brown, as the inventor and Co-founder of nKode, provides the foundational vision and architectural expertise essential for driving this innovative authentication solution forward. His role as Chief Development Architect positions him uniquely to guide the project's technical direction. Dr. Craig Whittinghill serves as the Deputy Director for Applied Research and Services at the McCrary Institute. As a Navy Veteran with 29 years of service as a Naval Intelligence Officer, he brings extensive leadership in high-stakes cyber and intelligence operations. Jonathan Sherk is a Principal Cybersecurity Research Engineer at Auburn Universitys McCrary Institute. He leads a USDA grant on rural cybersecurity and co-leads Alabamas State and Local Cybersecurity Grant Program. As an NSA-certified, CYBERCOM-accredited Red Team Lead, he has performed adversarial assessments on EUDs and Army products at the Threat Systems Management Office. Dr. Luke Oeding, an Associate Professor in the Department of Mathematics and Statistics at Auburn University, contributes advanced algebraic and computational expertise critical for nKode's underlying mathematical frameworks. His research focuses on applications of algebraic geometry and representation theory to tensors, quantum information processing, signal processing, and collaborative navigation. Dr. Farah Kandah, an IEEE Senior Member and Associate Professor in the Department of Computer Science and Software Engineering at Auburn University, as well as a faculty affiliate with the McCrary Institute, provides specialized knowledge in cybersecurity, networking, and emerging technologies like IoT and quantum credentials. His research encompasses distributed computing, computer security and reliability, computer communications (networks), and more. Lastly me. I have over seven years of software development experience across defense, healthcare, media, and authentication sectors, including prior work as a Space Ground Software Engineer at Lockheed Martin. In my current role as CTO of Arcanum Technology LLC, I am actively developing new ways to apply nKode to a variety of authentication problems.
-->
---
<style scoped>
section {
font-size: 24px; /* Adjust to a smaller value like 20px or 1.5rem; default is around 35px */
}
</style>
# Defense and Commercial Market Use Case/Impact
- Defense Use Cases
- Tactical edge authentication: Secure access to Tactical Assault Kits/comms platforms in DDIL environments
- Warfighter resilience: Keyboard-less icons reduce errors under stress; resists keyloggers, phishing, AI attacks
- Zero Trust enablement: Auth over unencrypted/low-bandwidth channels; integrates with C2 systems/edge compute
- Commercial Use Cases
- Banking/Healthcare/Infrastructure: Replaces passwords for online accounts; phishing-resistant, no credential reuse
- Dual-Use Potential: Scales to consumer apps; reduces MFA friction in high-volume sectors
- Market Impact ("So What")
- Enhances mission success/safety: Faster logins, fewer vulnerabilities in contested ops
- Broad Adoption: Safeguards critical ops across sectors
<!--
nKode offers significant impact in both defense and commercial markets, emphasizing the "so what" through practical applications and outcomes. In defense, nKode targets tactical edge challenges where current systems (e.g., passwords/biometrics) falter in DDIL scenarios (Denied, Disrupted, Intermittent, and Limited bandwidth/comms): Warfighters authenticate to secure comms or field kits via intuitive icons, resilient without full encryption, reducing bypass risks and improving continuity amid nation-state threats like signals intelligence. The impact? Stronger defenses, mission success, and warfighter safety. Commercially, it addresses massive markets: Replaces vulnerable passwords in banking (reducing phishing losses) or healthcare (securing patient data), with dual-use for infrastructure like utilities. The "so what": nKode closes usability-security gaps, potentially mitigating the $10.5T in annual global cybercrime costs by 2025, while enabling Zero Trust across sectors. If funded, we'll validate these via DoD pilots and commercial integrations for rapid transition.
-->