Unlike traditional data security technologies that are always one clever hack away from losing all data and keys, TrustForge uses cryptographic-strength defenses. For the attacker, this means that hacking is useless: to steal your TrustForge-protected data, attackers must break industry-standard cryptographic algorithms. The strength of these algorithms is witnessed by the fact that they have successfully withstood decades of attacks. Because TrustForge possesses highly durable security, it can be deployed as either a security mechanism (to stop data breaches or supply chain attacks) or as a privacy technology (to enable zero-trust data sharing).

Zero-trust data sharing is a game-changing approach to sensitive business operations because it allows data monetization and data collaboration to occur without enabling the sharing parties to see, copy, or modify the data being shared. TrustForge limits access to always-encrypted shared data to already agreed-upon analyses and operations. Unlike other data sharing technologies, TrustForge’s protections persist even if the system is externally or internally hacked.

TrustForge, as its name implies, is a programming framework and hardware security technology that facilitates the construction of cloud-based zero-trust data sharing.

For client data analysis TrustForge permits analysis of encrypted client data without needing a key, signaling to clients that their data privacy is held to the highest standard possible. TrustForge users hold client data without having the ability to see that data. Yet, users can also compute upon that data and see analysis and computation results if permitted by their clients. A typical application might be, for example, an end-to-end encrypted social media service, in which the “likes” and “shares” of the clients remain encrypted while also contributing to post recommendations . In this example,  access to encrypted client data requires a cryptographic attack on an industry-standard cipher. In the end, neither conventional hacking nor superuser IT staff mischief can penetrate TrustForge defenses.

For sensitive data monetization… TrustForge permits the sharing of sensitive, valuable, and/or regulated data intellectual property (IP) with other (potentially untrusted) parties, without the normal risks of data exposure, theft, or abuse. TrustForge users have complete control over what other parties do with their data and for how long that right is granted. Moreover, TrustForge’s cryptographic defenses ensure that the data cannot be seen, copied, or abused in any way. A typical application of this type includes, for instance, a hospital sharing its patient medical records IP with a machine-learning based medical diagnostics provider. The diagnostics provider would license the hospital IP and then use the medical data (as allowed by the hospital) to train its TrustForge-built machine learning training application. In this scenario,TrustForge’s cryptographic-strength defenses would prevent the diagnostics provider from seeing the hospital IP and also limit their operations to only the  approved-in-advance training application on the data.


For interorganizational data collaboration… TrustForge enables data sharing between (potentially adversarial) collaborators to create aggregate data perspectives. Examples of this form of data sharing include fraud detection, insurance model collaboration, federated machine learning, medical registries, and private blockchain implementations. Like other zero-trust data sharing modes, TrustForge’s cryptographic-strength defenses ensure that no entity in the collaboration can see others’ data or run unapproved analysis on the collective data IP.


For durable data breach protection… TrustForge capabilities allow business operations to continue without ever having to decrypt sensitive data or provide a data access key to software. Only key IT personnel have access to sensitive data encryption keys, and all operations on encrypted sensitive data are performed with TrustForge-enabled DevOps. Using this development approach, sensitive data is always protected with TrustForge’s cryptographic-strength defenses, even if the TrustForge-protected service is hacked or a programmer or member of the IT staff goes rogue.