About our Products

Welcome to the future of digital signing security with DHSM!

Short for Decentralised Hardware-less Security Module, DHSM revolutionises the way you store and utilise your digital signing keys.

With DHSM, your organisation gains a new level of security without the need for physical hardware. Say goodbye to the worries of hardware failures or vulnerabilities.

Our state-of-the-art multiparty system ensures that your keys are protected at all times, allowing you to focus on what matters most—your business.

What is DHSM?

Get ready to elevate your data protection to new heights with DHSM, your ultimate solution for secured digital signing. We've got you covered with the industry-leading RSA and ECDSA protocols, but that's just the beginning of what we offer.

Stay ahead of the curve with our forthcoming Quantum-resilient Digital Signing algorithms. Our commitment to innovation ensures that your data remains secure in the face of emerging threats.

DHSM's fully configurable set of signing modules allows you to take full control of your security strategy. Tailor your security protocols to perfection, whether you choose the reliability of on-premise solutions or the flexibility of the cloud. With DHSM, customisation is at your fingertips.

  • Multi-factor Authentication
  • Multi-party Authentication
  • Multi-party Signing

How it Works

Key Generation

Signing key particles and public validation key are generated through a trustless decentralised protocol across signing parties (nodes), located in different data centers.

Digital Signing

Digital signing requires a quorum of signing nodes cooperating to produce a valid signature.

Signature Validation

Signature can be validated by any standard application: unlike “Multi Signature” protocols, the DHSM digital signatures are identical to those produced by centralised applications.

Full Control and Limited Risk

With just a fraction of the signing key, clients are protected from theft whilst controlling their digital signature.

Success

The signing key is now protected against hacks and accidental loss. The solution is easy to deploy, scale and operate.

Steps Illustration

Business Applications

Why is it so crucial to protect signing keys? Here are a few real-life use cases. This is a small representation of all the problems DHSM can solve. It shows the wide range of applications to our technology, therefore the fantastic market potential behind our innovations.

Digital Identification: The Potential for Retail Banking

Forbes, June 2021: 'Surprisingly, even in today’s digital age, 51% of North American banks still require a person to visit a bank branch to verify their identity when opening a new account. Just 16% use the types of new technologies that enable a secure and fully digital account.

Whether in financial services or other industries, these technologies will enable businesses to deliver a better customer experience, put an end to online fraud, provide consumers with greater control over their sensitive data and help us all protect our identities online.

Source: https://www.forbes.com/sites/forbestechcouncil/2021/05/07/four-technologies-disrupting-banking/?sh=62324e1211c5

The Event Horizon Solution:

Digital signing is essential to all Digital identification mechanisms. DHSM can be deployed to boost and protect a scalable authentication system.

Fiber Optic

Argentina Digital ID Database

Demonstrating just how hard it is going to be to engender trust in public or private biometric systems, a hacker reportedly has stolen the government digital ID information for every citizen in Argentina.

Biometric data in the form of government photos are among the information that has been stolen. Also among the compromised data are home addresses, birth dates, Trámite (social security) numbers and citizen numbers.

The person contacted by the publication reportedly said the personal information of one million or two million more could be released. “Careless employees” enabled the theft, the person reportedly said.

Last year, the registry enabled remote digital ID processing for mobile devices during the COVID pandemic. It is not clear how, if at all, the hack impacts citizens or this policy.

Source: https://www.biometricupdate.com/202110/potentially-devastating-digital-id-hack-in-argentina-could-have-many-ripples

The Event Horizon Solution:

DHSM makes secure employee connection easy. Private keys instead of easy to hack passwords, and multi-authentication for sensitive data to protect even against rogue internal threat.

Fiber Optic

The Ronin Network Hack

The biggest cryptocurrency theft of all time, calculated using the value of the crypto assets at the time they were stolen, was March 2022's raid on Ronin Network, an exchange that allows players of the Axie Infinity videogame to exchange their in-game tokens for other cryptocurrency.

On 30th March, the network revealed that an attacker had stolen the private keys required to authenticate transactions, and had transferred 173,600 Ethereum and 25.5m USDC to their own Wallet.

The theft was discovered when a customer tried to make a legitimate withdrawal.

Source: https://techmonitor.ai/technology/cybersecurity/biggest-cryptocurrency-hacks-of-all-time

The Event Horizon Solution:

DHSM allows to split the validator node’s signing key, making it impossible to steal in one single hack, and much more difficult to compromise

Fiber Optic

Protected Signing: Software updates

“Updates available“ appears on your digital device, a digital signing transaction has just happened: Your local version has queried the vendor server, detected a software update, then identified the vendor Digital Signature thanks to his public key. Should the vendor private key be compromised, it would be possible to get a faulty or infected version of his software installed on your machine

Google Apps: Android security certificates (signed through the hardware vendors private keys) compromised by hackers. Malware can gain control of your smartphone or tablets.

Hyundai: A hacker managed to identify the Hyundai software master Key to upgrade his own vehicle.

Sony Playstation: The hacker group “fail0Overflow“ managed to compromise Sony’s private key and break the signatures on the hypervisor as well as all signed executables. (Free PS3 games for all!!).

Source:
Android: https://www.wired.com/story/android-platform-certificates-malware
Hyundai: https://develop.secure.software/hyundai-devs-used-sample-code-signing-keys-making-updates-vulnerable
Sony: https://medium.com/asecuritysite-when-bob-met-alice

The Event Horizon Solution:

DHSM provides secure, truly randomized decentralised signing key generation in a fashion that cannot be tampered with by a developer mistake.

Fiber Optic

The Bitcoin Millionaire Problem

Of the existing 18.5 million Bitcoin, around 20 percent — currently worth around $80 billion — appear to be in lost or otherwise stranded wallets, according to the cryptocurrency data firm Chainalysis. Wallet Recovery Services, a business that helps find lost digital keys, said it had gotten 70 requests a day from people who wanted help recovering their riches in Spring 2022, three times the number of a month ago.

Even sophisticated investors have been completely incapable of doing any kind of management of private keys: when will there be an affordable, easy to use and trustable way of controlling private keys, without having to give them away to a third party institution?

Source: https://www.nytimes.com/2021/01/12/technology/bitcoin-passwords-wallets-fortunes.html

The Event Horizon Solution:

DHSM allows to build easy to use and yet safe Digital Private Key protection solutions, to be used either by individuals, or offered as a cooperative service by Digital Custodians or Banks.

Fiber Optic

Download our Tech Paper

Download our Tech Paper to learn more about our product and how it works.