Files
notes/archive/DARPA Slides.md

99 lines
3.3 KiB
Markdown
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

Here's what i've got so far
Intro slide 1
title: Warfighter Zero Trust Authentication at the Tactical Edge
Slide 2
Title: Authentication Factors Passwords Are the Weak Link
Content:
•Something You Have: CAC Card, Passkey Physical, secure, warfighter-ready.
•Something You Are: Face, Fingerprint, Voice Unique, hard to steal.
•Something You Know: Passwords, Codes, Questions Easy to crack, forget, or intercept.
Slide 3
title: Passwords Are Old And Obsolete
content:
•1961: First password login on a time-sharing OS.
•1962: Bug exposed all passwords in plain text—exploited instantly.
•2022: 24+ billion stolen credentials flood the dark web.
•Today: nKode replaces ancient passwords with edge-ready security.
Slide 4
title: Good Passwords Are Hard to Remember And Still Fail
content:
•Problem: Complex passwords (e.g., 99$T7oEJ^&pHp%5#hb) defy memory.
•Weakness: Reuse invites credential stuffing; keyloggers grab every stroke.
•Flaw: Reliance on perfect encryption—compromised channels doom passwords.
•Fix: nKode ditches passwords for secure, simple warfighter auth.
Slide 5
title: Credential Stuffing Passwords Betray the Mission
content:
•Threat: 80% of breaches start with stolen passwords reused in automated attacks.
•Risk: Commercial breaches (e.g., email, banking) expose military accounts if warfighters overlap.
•Problem: You cant control external leaks; passwords make it your mess.
•Solution: nKode ends password risks with edge-ready security.
Slide 6
title: Keyloggers + Passwords = Warfighter Risk
content:
•Threat: Keyloggers (software/hardware) steal passwords by recording keystrokes.
•Risk: Exposes military networks and tactical edge ops to adversaries.
•Problem: Hard to detect; passwords are the weak link.
•Solution: nKode eliminates passwords, secures warfighters.
Slide 7
title: nKode Authenticates Over Compromised Channels
content:
•Challenge: Encrypted channels (e.g., TLS) can be compromised by MITM attacks.
•Risk: Adversaries intercept or spoof credentials, disrupting tactical edge ops.
•nKode Advantage: Authenticates reliably even if encryption is breached.
•How: An nKode keypad randomly shuffles making it impossible to know what icons are getting selected
Slide 8
title: nKode Outclasses Passwords Warfighter Ready
content:
•Passwords Fail: Hard to recall, reused, nabbed by keyloggers.
•nKode Wins: Pictographic, unique, keylogger-proof.
•Edge Power: Authenticates over compromised channels, <1KB bandwidth.
Bottom Line: Simple to use, impossible to crack.
Slides 9-11
Explains what nKode is and how it works
Slide 12
Title: The Team
Content:
content about the team...
Slide 13
Demo
I think the flow should be different:
The 2nd slide "Authentication Factors... " is a good intro.
I think the slides that discuss all the different attacks then explain how nkode fixes the issue should be change.
I think the slides should first introduce the problem of passwords.
It should explain how the state-of-the-art in Something you know authentication has stagnated for the last 60 years where something you have and something you are have made progress in leaps and bounds.
Then i should explain what nKode is. After the audience has a basic explanation of nkode, i can wrap up by explaining how nkode can solve all the vulnerabilities of passwords followed by the demo