Future Proof Cyber-Security Solutions for Goverments and Entreprises
Why blockSmith ?
Future Proof security for Enterprises
At Blocksmith™, our mission is driven by a profound belief that the Internet is inherently insecure and flawed. As AI technologies permeate cyberspace, the proliferation of ransomware across industries poses a significant threat to user privacy and data security. In response to these challenges, we are dedicated to revolutionizing the Internet landscape by developing cutting-edge technologies that not only safeguard user information but also contribute to the betterment of humanity as a whole.
You simply type your regular password, our app encodes it
and provides an enhanced replacement with 340bit of entropy.
YUP makes it unbreakable with today computing power.
And when you adopt our PAM solution with the Pleione-Suite, you end-up with a quantum resistant system.
FutureProof Cyber-Security Solutions for Governments and SMEs.
Silent Seal Token
Have you ever wanted to store PIN code or other rarely-used low-entropy password / secret, so you have them handy when needed
We devise a tool to generate token that can be safely decoded
from anywhere with the proper authenticated credentials.
PassTimed Biometrics is an innovative cybersecurity solution that addresses the growing need for more robust user authentication methods in the digital age. This application leverages the unique typing patterns of individuals to create a powerful, yet unobtrusive, layer of security for password-protected systems.
Problem Solved:
Traditional password-based authentication systems are increasingly vulnerable to various attacks, including password guessing, phishing, and keylogging. Even complex passwords can be compromised if they fall into the wrong hands. PassTimed Biometrics solves this problem by adding a dynamic, behavior-based authentication factor that is extremely difficult to replicate.
Unique and Innovative Approach:
What sets PassTimed Biometrics apart is its ability to analyze the subtle nuances in a user's typing rhythm when entering their password. The system captures and processes various metrics such as:
Inter-key intervals
Key hold times
Typing speed and consistency
Specific patterns in trigraphs
Using advanced machine learning techniques, specifically a decision tree algorithm,
the system creates a unique "typing signature" for each user.
This signature is then used to verify the user's identity in real-time, even if the correct password is entered.
Value in Cybersecurity:
Enhanced Security: By adding a behavioral biometric layer, PassTimed Biometrics significantly increases the difficulty of unauthorized access, even if the password is compromised.
Non-invasive: Unlike other biometric systems (e.g., fingerprint or facial recognition), this solution doesn't require additional hardware and seamlessly integrates into existing password entry processes.
Continuous Authentication: The system can potentially provide ongoing verification throughout a user's session, not just at the initial login.
Adaptability: The machine learning model can adapt to gradual changes in a user's typing patterns over time, maintaining accuracy while reducing false negatives.
Phishing Protection: Even if a user's password is phished, the attacker would still need to replicate the user's unique typing pattern to gain access.
Cost-effective: As a software-based solution, it's relatively inexpensive to implement and maintain compared to hardware-based biometric systems.
User-friendly: It doesn't require users to learn new behaviors or change their login process, leading to higher adoption rates.
PassTimed Biometrics represents a significant advancement in multi-factor authentication. By harnessing the power of behavioral biometrics and machine learning, it offers a robust, user-friendly, and cost-effective solution to the persistent challenges of password-based security systems. This innovative approach has the potential to dramatically reduce unauthorized access incidents and strengthen overall cybersecurity postures across various digital platforms.
Get your order ready..., will be happy to protect you and your systems.
The Pleione suite will protect your data w/o compromize,
we secure your data the same way we would protect a "nuclear" switch or a AI model.
QRcode Fraud Detection
Have you ever wanted to pay by phone with a QRcode, but you didn't know how to check if the QRcode is not a SCAM
We devise a tool to verify QRcode before any URL redirect.
Abstract for White Paper
In the wake of increasing QR code fraud, particularly in public spaces, BlockSmith has developed a robust solution to secure static QR codes against "QR in the middle" attacks. This white paper delves into the scientific principles behind BlockSmith's technology, which leverages cryptographic signatures and blockchain-based verification to ensure QR code authenticity. By incorporating unique visual authentication elements and providing a DNSSEC-like URL validation service, BlockSmith's solution offers a comprehensive defense against fraudulent QR codes. This technology is designed to be easily integrated into existing systems, offering enhanced security without compromising user convenience. Download the white paper to explore how BlockSmith is revolutionizing QR code security and protecting users from sophisticated cyber threats.
It easy to overlook a vulnerability in modern software technologies and infrastructure,
here are 5 tips to make sure you play on the safe side.
Regular Updates: Ensure that all software, libraries, and dependencies are regularly updated to patch any known vulnerabilities. This helps in staying ahead of potential security threats.
read more
Code Review: Implement a thorough code review process to identify and address any security issues in the codebase. This practice helps in catching vulnerabilities early in the development cycle.
read more
Access Control: Limit access to sensitive data and systems only to authorized personnel. Use strong authentication methods like multi-factor authentication to enhance security.
Use our FortA tool to get unparallel security and access control
Encryption: Encrypt data at rest, in use and in transit to protect it from unauthorized access. Utilize strong encryption algorithms to safeguard sensitive information.
Adopt a InUse Encryption strategy w/ RAEL for Ultimate protection.
Monitoring and Logging: Set up robust monitoring and logging mechanisms to track system activities and detect any suspicious behavior promptly. Monitoring helps in identifying security incidents early on.
read more
YUP: boost your password immunity !
How strong is your password ?
fancy a game: check out our “bingo” game !
With us you’ll remember your password and still they will be secure
as we abandoned the 7bit per character every one is using and have the
32bit version the unicode space provide. Having your password UTF-32 encoded
make a simple 7 characters un-brute-forceable: it can effectively multiply its length by 4.
Moreover our authentication protocol makes our passwords quantum resistant as it doesn’t use
the classical hashed credentials.
so next time you’ll change your password adopt: YUP Security
The YUP module is part for the Pleione suite, it allows you to have robust passwords without
the time and mental energy to remember them.
So it is better than any password manager,
its main advantage compare to pruducts in the market is : we do not store any data on the device or cloud.
All you need to be operational with YUP is your “registration code” and your easy-to-remember password.
You have the St Peter’ keyring with you anytime for accessing your data and online credentials.
Documents Anomizer
Have you ever wanted to outsource the translation of a convidential documents
to a 3rd party you might not fully trust.
Get the job done on anoymized documents, and we provide you with the tools
so you can "de-anonymzed" the translated documents.
Ask for a demo
note: we use "SecureMy.digital" tokenization service to provide
unparallel protection of your original documents.
Our business Model Canva
Who am I ?
Michel Combes, PhD. with 25+ years in securing both hardware and software (TI,Infineon,Intel).
Throughout my career, I have cultivated a profound understanding of cryptography and embraced a holistic approach to privacy.
Recognizing the escalating cyber threats faced by Small and Medium Enterprises (SMEs), we embarked on a journey to democratize security.
In early 2024, we launched BlockSmith™ a venture aimed at making security accessible to all.
Leveraging our extensive expertise, we meticulously designed solutions that are both simple and innovative,
challenging the industry's status quo.
Our commitment to excellence ensures that our solutions are 100% secure, setting a new standard in the market.
We are the proud partner of Safewatch providing a blockchain private engine (a.k.a "BPE") to secure and protect
mental health data of patients so their can be assured no-one will discover their history and health data.
You have the full exclusive ownership of your data.