Files
notes/archive/DARPA Slides.md

3.3 KiB
Raw Blame History

Here's what i've got so far

Intro slide 1 title: Warfighter Zero Trust Authentication at the Tactical Edge

Slide 2 Title: Authentication Factors Passwords Are the Weak Link Content: •Something You Have: CAC Card, Passkey Physical, secure, warfighter-ready.

•Something You Are: Face, Fingerprint, Voice Unique, hard to steal.

•Something You Know: Passwords, Codes, Questions Easy to crack, forget, or intercept.

Slide 3 title: Passwords Are Old And Obsolete content: •1961: First password login on a time-sharing OS.

•1962: Bug exposed all passwords in plain text—exploited instantly.

•2022: 24+ billion stolen credentials flood the dark web.

•Today: nKode replaces ancient passwords with edge-ready security.

Slide 4 title: Good Passwords Are Hard to Remember And Still Fail content: •Problem: Complex passwords (e.g., 99$T7oEJ^&pHp%5#hb) defy memory.

•Weakness: Reuse invites credential stuffing; keyloggers grab every stroke.

•Flaw: Reliance on perfect encryption—compromised channels doom passwords.

•Fix: nKode ditches passwords for secure, simple warfighter auth.

Slide 5 title: Credential Stuffing Passwords Betray the Mission content: •Threat: 80% of breaches start with stolen passwords reused in automated attacks.

•Risk: Commercial breaches (e.g., email, banking) expose military accounts if warfighters overlap.

•Problem: You cant control external leaks; passwords make it your mess.

•Solution: nKode ends password risks with edge-ready security.

Slide 6 title: Keyloggers + Passwords = Warfighter Risk content: •Threat: Keyloggers (software/hardware) steal passwords by recording keystrokes.

•Risk: Exposes military networks and tactical edge ops to adversaries.

•Problem: Hard to detect; passwords are the weak link.

•Solution: nKode eliminates passwords, secures warfighters.

Slide 7 title: nKode Authenticates Over Compromised Channels content: •Challenge: Encrypted channels (e.g., TLS) can be compromised by MITM attacks.

•Risk: Adversaries intercept or spoof credentials, disrupting tactical edge ops.

•nKode Advantage: Authenticates reliably even if encryption is breached.

•How: An nKode keypad randomly shuffles making it impossible to know what icons are getting selected

Slide 8 title: nKode Outclasses Passwords Warfighter Ready content: •Passwords Fail: Hard to recall, reused, nabbed by keyloggers.

•nKode Wins: Pictographic, unique, keylogger-proof.

•Edge Power: Authenticates over compromised channels, <1KB bandwidth.

•Bottom Line: Simple to use, impossible to crack.

Slides 9-11 Explains what nKode is and how it works

Slide 12 Title: The Team Content: content about the team...

Slide 13 Demo

I think the flow should be different: The 2nd slide "Authentication Factors... " is a good intro. I think the slides that discuss all the different attacks then explain how nkode fixes the issue should be change. I think the slides should first introduce the problem of passwords. It should explain how the state-of-the-art in Something you know authentication has stagnated for the last 60 years where something you have and something you are have made progress in leaps and bounds. Then i should explain what nKode is. After the audience has a basic explanation of nkode, i can wrap up by explaining how nkode can solve all the vulnerabilities of passwords followed by the demo