Elevating business continuity through NIS2

NIS2, the EU's latest cyber security directive, is now in full effect, marking a new era in digital security compliance. As organizations adapt to these enhanced requirements, it's crucial to understand what this means for your business.

Here at DigiThree, we're already helping organizations navigate these changes. If you're looking for guidance on where to start, our expert team has got you covered with these top tips.

What is NIS2?

NIS2 represents the EU's ambitious expansion of cyber security legislation, casting a wider net across industries and implementing stricter security measures than ever before. It applies to organizations that provide essential services or are considered important for maintaining critical societal and economic activities.

The directive officially came into force on January 16, 2023, but requires member states to transpose it into their national laws by October 17, 2024. This means that while the directive is active, its enforcement depends on each country's legislative process. However, as of now, only a few EU member states have fully integrated NIS2 into their domestic laws, while others are at various stages of implementation.

For business leaders, this brings both challenges and opportunities. Compliance requires a comprehensive, organization-wide approach, with proper resource allocation and strategic planning. The good news? These improvements will ultimately strengthen your organization's security posture.

4 tips for your NIS2 journey

  1. Conduct an applicability assessment
    Understanding exactly how NIS2 affects your organization is crucial. Before you even think about bringing in new frameworks, you should work out whether you’re in scope, which products are impacted and how critical your company is.
  2. Check out ISO 27001
    NIS2 outlines high-level cyber security requirements for the organizations affected. If you don’t already have a cybersecurity management framework, ISO 27001 is the perfect baseline. Just bear in mind that some NIS2 requirements – like incident reporting and supply chain security – might call for more resources and planning.
  3. Keep senior management accountable
    Your senior leadership team should own NIS2 compliance, as they’re the ones who can be held personally liable. Company leaders must prioritize compliance, allocate resources for cyber risk management and boost all business continuity practices.
  4. Third-party risk management
    Third-party risk management (TPRM) involves identifying, assessing, and mitigating risks that arise from an organization's relationships with external vendors, suppliers, and partners. This is crucial for maintaining cybersecurity and ensuring compliance with regulations like NIS2.

NIS2 business continuity planning 

NIS2 emphasizes the importance of business continuity for your ICT systems, which means having plans in place for cyber incidents and system failures. DigiThree solutions are highly relevant in this area, with the following options available to help you stay compliant and continuous.

DGMV-ID
Elevate your digital trust with DGMV-ID, a secure and decentralized solution for identity management and access control (IAM). Thanks to a secure combination of QR codes, biometrics, and blockchain, users benefit from a seamless login experience without compromising security. With features like geofencing and unique password generation, DGMV-ID ensures the highest level of authentication with minimal risk of exposure to data breaches.

DGMV-Secure Meets
Own the conversation with DGMV-Secure Meets, our ultra-secure video conferencing solution. Whether on-premise or in the public or private cloud, this video conferencing platform offers secure access from any network, inside or outside, ensuring confidentiality and data integrity. With features like role-based access and centralized management, DGMV-Secure Meets provides ultimate versatility and seamless integration with your existing IT infrastructure.

DGMV-SmartLayer
Master your data with the DGMV-SmartLayer, a powerful tool for master data management and audit trail creation. Built on the DigiByte blockchain, our SmartLayer ensures complete data control and traceability, enabling organizations to validate, verify, and maintain transparency across their data and auditing management processes.

DGMV-Edge Box
Leverage the benefits of cloud computing at the edge of your network with the DGMV Edge Box. Designed for low latency, scalability, and reliability, our solution optimizes performance and enhances data security and privacy. With features like disaster recovery, IoT support, and data sovereignty compliance, the DGMV Edge Box offers comprehensive and convenient edge computing capabilities for businesses and organizations.

DGMV-Cloud
Secure your business and optimize operations with a private, decentralized cloud system designed to revolutionize everything from storage to productivity. The DGMV-Cloud enhances data protection with next-level encryption, providing the ultra-modern tools your developers need to innovate—all at highly affordable prices.

Start here
Kick off continuity planning for your business today. Whatever your setup and situation, we’re here to keep your communication and collaboration seamless. Head over to our product page to learn more about our videoconference and compliance data solutions today, and get in touch to discover how we can support you.

Video conferencing for legal firms: Compliance, connectivity and cyber threats

In today’s globally connected landscape, video conferencing has become a staple for legal proceedings – and thus a prime target for cybercriminals. As a result, governments across the world and particularly in Europe are enforcing stricter regulations than ever. 

Corporate compliance legislation – such as NIS2 in the EU – and data sovereignty regulations like GDPR have increased significantly, calling for organizations to scrutinize where their data is stored and transmitted. It’s essential to ensure that all solutions comply with local and international regulations, including data protection laws such as GDPR in Europe, or equivalent standards based on your region. Web3 technologies offer a groundbreaking approach to compliance through a multi-layered strategy, utilizing building blocks for effective security and compliance enforcement. They empower legal firms by leveraging decentralized infrastructure, ensuring interoperability across platforms, and granting users greater control over their data.

Developments like these encourage other companies across the world to enhance their risk management practices and adopt a more proactive approach to cyber threats. This kind of lead-by-example process is seeing global organizations assess their software and tools with a view to dialing up safeguarding processes – but what are the implications for the legal sector, where security is a matter of critical importance? 

Let’s explore the impact of cyber threats on law firms, and what measures can be taken to ensure optimum security.

What's at risk?

Nowhere is information safeguarding more important than at law firms, where cybercriminals often target sensitive data such as names, bank details and personal identification numbers. 

Unauthorized recordings of important meetings and video conferences pose another significant threat, with the potential to explore confidential information and damage a company’s reputation or financial structure. 

Even after the event of a live meeting, the call detail records (known as CDRs) – which contain user and room names – can be targeted and exploited. The imperative to protect every element of the video conferencing process has never been clearer. 

Choosing a secure meeting solution: key considerations

While video meetings have the potential to enhance productivity in the legal sector, firms must remain vigilant in choosing the right software to remedy all growing vulnerabilities. Let’s explore what to think about when selecting your next solution.

  1. Deployment options
    Flexibility in deployment is crucial. Consider solutions that offer self-hosting on-premises, private cloud services, or hybrid options. This flexibility allows legal firms to maintain control over their data and comply with specific jurisdictional requirements.
  1. Compliance & Data Sovereignty
    Legal professionals must prioritize solutions that adhere to compliance standards such as GDPR and support data sovereignty. This involves ensuring that data remains within specified jurisdictions to meet local laws and protect client confidentiality. Web3 technologies offer a revolutionary approach to compliance by providing immutable records and enhanced audit trail capabilities for compliance enforcement.
  1. User-facing features
    Meeting authentication ensures only authorized participants join discussions, protecting sensitive information from intruders. PIN-protection adds an extra layer of security, giving users control over who accesses their virtual spaces. One-time meeting links generate unique, disposable credentials, making unauthorized reuse nearly impossible.

    Cutting-edge solutions are pushing the boundaries of security technology by incorporating blockchain wallet integration and a zero-trust architecture, verifying every user in real time. Biometric authentication provides irrefutable identity verification, ensuring that each participant is who they claim to be.

    These features securely validate every identity, reducing the risk of unauthorized access and enhancing overall security.
  1. Meeting Efficiency and User Experience
    While robust security is crucial, it shouldn't come at the expense of user experience. Look for solutions that balance strong security measures with intuitive interfaces. The best systems provide seamless and efficient meeting experiences, allowing users to navigate security features effortlessly.

    With easy-to-use interfaces and transparent security measures, users can focus on their tasks without being burdened by complex security protocols. This approach fosters a sense of trust and reliability in the system, ensuring that security enhances rather than hinders productivity. Choose software that prioritizes both security and usability to maximize meeting efficiency and user confidence.
  1. Recording Functionality
    For law firms that require meeting recording, it's essential to choose a video conferencing solution with robust recording features. Look for platforms that offer secure, encrypted storage of recordings to protect sensitive information. Granular access controls are also important, allowing administrators to manage who can view, share, or download recordings. Compliance with legal requirements is another key consideration.
  1. Physical security
    To achieve the highest level of protection, consider solutions that incorporate robust physical security measures. The Secure Boot Stick, a NATO-approved device, ensures that only authorized hardware can access critical systems, adding an extra layer of defense to your video conferencing setup. By utilizing the Secure Boot Stick, law firms can guarantee that their video conferencing activities are safeguarded by the most advanced security measures available.

To continue reaping the benefits of video conferencing, law firms must adopt a proactive cybersecurity approach. That means carefully and honestly evaluating how your video conferencing tools could make you vulnerable, and implementing security solutions that strengthen those weaknesses.

Staying compliant and mitigating cyber risks against the backdrop of ever-evolving threats and regulations means security-first solutions are now far superior to generic video conferencing platforms. By leveraging advanced technologies like blockchain and zero-trust architectures, legal firms can ensure the confidentiality, integrity, and availability of their sensitive communications while maintaining compliance across jurisdictions.

Keen to know more? Head over to the DigiThree Labs website to learn more about our services, or check out the DGMV-Secure Meets solution.

Discover portable business continuity with the DGMV-Edge Box

Cyber incidents are on the up, and operational continuity has never been more important.  That’s where the DGMV-Edge Box from DigiThree Labs comes in. 

This mobile, hardware-based solution can set up an onsite data center in just 30 minutes, with secure Wi-Fi, 4G, and 5G connections that allow employees to work seamlessly in crisis situations. 

With a compact, portable design and power options including batteries, solar panels and external sources,The Edge Box offers a lifeline during disasters and disruptions by enabling swift critical function recovery. 

Perfect for rapid installation, this clever little box enables organizations to maintain communication and safeguard against downtime or financial losses.

Why a mobile hardware solution?

Decentralization is the key to resilience in today's cybersecurity landscape – and by providing a secure, transportable, instantly deployable safe place, that’s what the DGMV Edge Box is all about.

While centralized platforms are vulnerable to cyber threats and downtime, the Edge Box offers ultimate autonomy and reliability. Its compact size and versatile power options make it indispensable for organizations keen to boost resilience against cyber incidents and data breaches.

Decentralization for resilience

The rise of Web3 and decentralization reflects a shift away from the centralized platforms dominated by tech giants. By embracing decentralization, organizations can regain control of their data and applications and lower the risks associated with centralization. 

The DGMV Edge Box is a practical solution for maintaining continuity in an increasingly volatile digital landscape, empowering organizations to respond to cyber threats and disruptions quickly.

Building a business continuity plan

A robust business continuity plan (BCP) is essential for safeguarding your critical functions in emergencies. While traditional BCPs rely on centralized platforms, the Edge Box offers a decentralized alternative.

Whether it’s a cyber incident, a natural disaster or another unforeseen circumstance, the Edge Box gives you everything you need to keep essential services running. You can even use it in conjunction with DGMV-ID, our decentralized identity and authentication solution, to secure your operations further in the face of the unexpected.

Keep to know more? Head over to the DigiThree Labs website to learn more about our services, or check out our decentralized, blockchain-based identity and access management suite DGMV-ID solution here.

Digital sovereignty in action: Secure video conferencing best practice

Public sector organizations – particularly those in defense, public safety, and government – are facing increasing pressure to adopt digitally sovereign video conferencing solutions. This trend is particularly prominent in Europe, where several countries are strengthening their digital strategies to prioritize sovereign tools.

Video conferencing platforms for the public sector 

Digital sovereignty is a critical factor for public sector entities selecting video conferencing platforms, especially when sensitive or classified communications are involved. Right now, we’re seeing a growing emphasis on technological and commercial independence – as demonstrated by the Dutch government’s publication of its agenda for Digital Open Strategic Autonomy (DOSA), emphasizing the need to implement more sovereign digital solutions and rely less on proprietary software.

Many public sector organizations are currently adopting a dual approach, with one video conferencing solution for routine, non-sensitive meetings and a separate, digitally sovereign platform for mission-critical communications.

The significance of sovereign solutions

Two key factors underscore the importance of digitally sovereign video conferencing solutions for critical use cases:

  1. Data control
    Staying in control of data storage and transmission locations to meet data sovereignty requirements is critical when it comes to high-stakes meetings. Usually, this calls for self-hosted or private cloud solutions.
  1. Avoiding vendor lock-in
    Deeply integrated video conferencing systems can be difficult to replace, which is problematic for sensitive sectors. A more autonomous solution offers greater flexibility and reduces dependence on a single provider.

Achieving digital sovereignty

To successfully implement digital sovereignty in a way that maximizes data control and communication privacy, organizations should focus on three key elements:

  1. Data sovereignty
    Take complete control of data storage and processing.
  1. Operational sovereignty
    Avoid public cloud subscription models and gain autonomy – either by self-hosting or partnering with trusted private cloud providers.
  1. Technological sovereignty
    Customize the solution to make sure it integrates with existing systems and meets specific interface requirements.

While public cloud solutions might be sufficient for less sensitive applications, mission-critical use cases demand standalone sovereign cloud solutions to maintain total digital sovereignty.

Strategic recommendations for public sector entities

Organizations in the public sector face different challenges when it comes to implementing data sovereignty. These entities can better prepare for the evolving landscape of sovereign video communication in Europe and beyond by addressing the following four key considerations:

  1. Evaluate existing video conferencing solutions to identify areas for sovereignty improvement
  2. Engage with vendors offering fully sovereign solutions
  3. Consider the long-term implications of potential vendor lock-in
  4. Influence tender requirements to make sure they align with digital sovereignty mandates, particularly for mission-critical video conferencing needs

Keen to explore secure, sovereign video conferencing options for your unique, public sector needs? Here at DigiThree Labs, we’ve got a range of purpose-built, customizable solutions to meet your data needs. Ready to start the conversation? Get in touch today.

Secure your organization's digital future with cutting-edge decentralized solutions and guidance

The world is becoming increasingly digital, and that makes cybersecurity more important than ever. According to the Organisation for Economic Co-operation and Development, rapid technological advances are likely to transform one billion jobs in the next decade. Add to this the unprecedented workforce impact of Covid-19, and it’s clear that the need for upskilling and training in cybersecurity can no longer be ignored.

The state of cybersecurity

Unfortunately, despite the growing need for cybersecurity, teams in every global region are understaffed. In fact, in its 2022 Cybersecurity Workforce Study, (ISC)2 reported a need for 3.4 million more skilled cybersecurity professionals globally, and that this skills gap has more than doubled since 2019. This comes as cybercriminals and nation-state actors launch increasingly frequent attacks, and the cost of cybercrime is set to grow from $8.44 trillion in 2022 to $23.84 trillion in 2027.

Decentralization for the future

Here at DigiThree Labs, we recognize the importance of cybersecurity in today's world. That's why we offer secure, decentralized solutions that helps organizations protect themselves and their users against cyber threats. Our solutions use cutting-edge blockchain technology to keep sensitive data safe. Our DGMV-ID platform is providing an easy, secure and passwordless authentication to access critical applications and data.

By using the DGMV-ID platform, organizations have the peace of mind that comes with comprehensive cyber threat protection, as well as the benefits of a seamless, easy-to-use authentication process and user experience.

Best practice knowledge

Our team members help organizations upskill and advise their employees on implementing effective cybersecurity measures. We believe that anyone can arm themselves with the right cybersecurity tooling – regardless of background or experience – and by offering our decentralized technology expertise, we’re closing the skills gap and helping organizations implement the right infrastructure to protect against cyber threats.

As society relies more and more on technology, cybersecurity has become mission-critical. By offering a secure, decentralized passwordless authentication solution alongside comprehensive guidance, we’re doing our bit to build a sustainable, trustworthy digital future.

Authentication: the first line of defense against cybercrime

Cybersecurity is one of the most pressing concerns of recent years, with the increasing frequency of cyber attacks posing an ever-greater threat to individuals and businesses across the world.

In its Global Risks Report, the World Economic Forum (WEF) names widespread cybercrime and insecurity among the world’s top threats for the first time ever – marking a significant and potentially damaging change to the global order and in turn, how we should act.

Because today, cyber attacks don’t just mean lost or stolen data – although those consequences are problematic enough in and of themselves. Now, malicious activity in cyberspace could play a part in catastrophes such as wars and pandemics. It could bring down health systems and impact global security in ways we have yet to understand.

In late 2022, Zurich’s Chief Executive Insurer, Mario Greco, told the Financial Times he sees cyber attacks becoming uninsurable in the coming years. He highlighted the grave threat of a third party taking control of the IoT components within a large organization, citing the damage done everywhere from hospitals to government departments as a key indicator of the security risk at play. Greco went on to emphasize the importance of seeing beyond data alone – realizing that the threat is to civilization and our lives as a whole.

So, as the rising demand for cyber liability insurance leads underwriters to look more closely at organizations’ security policies, it’s more important than ever for businesses to double down on their systems and implement solutions designed to maximize security at all costs.

Employing authentication and passwordless login systems is a crucial first step in reducing the risk of cyber attacks and safeguarding your business from potential threats. The DigiThree Labs DGMV-ID solution offers organizations the tools they need to ensure high security levels, self-sovereignty and interoperability in different digital environments.

DGMV-ID works in combination with blockchain technology to provide next-level passwordless, multi-factor authentication – all with a smooth, intuitive user experience. You’ll benefit from decentralized architecture with the aim of using quantum-safe technology to protect against potential threats and attacks.

WEF calls for the harnessing of quantum computing in order to find new ways of using stealth technologies and to combat the growing threat of cyber attacks. Its additional predication that digital tools such as AI, edge computing and autonomous technologies will pose greater threats is also something we recognise here at DigiThree, having created this new method of authentication to protect even the most cutting-edge systems from potential threats.

With several proof of concepts currently in the beta stage, this is an exciting time for our business and future customers – even against the backdrop of growing risks and uncertainty. With authentication as cybersecurity’s first line of defense, there’s never been a better time to double down on the safety of logins within your business.

Quantum secure encryption and data storage.

Recently Siliconangle reported a flaw in "Microsoft 365 message encryption". The Electronic Code Book (ECB) used to encrypt mail is a simple encryption method that converts 'message blocks' into separate standard encrypted text blocks rendering the text unreadable. The problem associated with such a simple form of encryption is that hackers are able to re-engineer the used codebook without any trouble, if they get their hands on enough of these encrypted mails, hence destroying Microsoft 365 message encryption’s security.

Flemish Origin

ECB is first-generation encryption, defined in the Advanced Encryption Standard AES. Considering it's the most basic form of block encryption, it's astonishing Microsoft would still use this minimalistic encryption method. A more advanced form of block encryption is Cypher Blocker Chaining (CBC), where the CBC mode in each text block depends on the plaintext blocks processed up to that point. In other words, a kind of blockchain that makes decryption and codebook reengineering much more cumbersome.

AES stems from the work of two Flemish cryptographers, Joan Damen and Vincent Rijmen, who, under the name 'Rijndael', developed the specification for this standard in 1999, basing their method on a family of numbers with different key and block sizes. For the AES standard, NIST selected three parts of this Rijndael family, each with a block size of 128 bits, but with different key lengths: 128, 192 and 256 bits.

The Future of AES

AES was released by NIST in 2001 and incorporated into the ISO/IEC 18033-3 standard. The US government adopted this encryption standard in 2002, and it still remains the first and only publicly accessible encryption. Approved by the National Security Agency (NSA) for top-secret information when using NSA-approved cryptographic modules. The clever thing about AES is that it relies on permutation substitution. Several substitution and permutation steps ultimately yield an encrypted block and therefore, are inherently less susceptible to the above crypto analysis as with the more straightforward Electronic Code Book.

The flexibility in the use of key lengths contributes to that security. For example, 10 rounds with 128 bit, then 12 rounds for 192 bit and then 14 rounds with 256 bit. After all, unknown variation requires extra computing power for deciphering. In a previous blog, 'Quantum safe,' I reported that the NIST had chosen four new encryption algorithms this year in connection with the arrival of the enormously powerful quantum computers. NIST's new quantum cryptographic standard will be valid for two years. An important milestone in the world of encryption for the continued protection of the growing amount of data and information generated. Fortunately, over the past few years, an increasing number of quantum-resistant algorithms have been developed that are difficult or impossible to solve for quantum computers and which guarantee our information security in the post-quantum period.

Quantum security used for data storage.

The above algorithms focus on general encryption designed to protect any information exchanged over public networks, in addition to digital signatures used for identity verification. Key protection is needed for data that has come to rest and is stored on a storage platform. We are talking about quantum secure storage. Of course, an encrypted message that we keep in the event of theft is difficult to decrypt. But the performance of quantum computers will proliferate in the future, so it is wise also to make 'the search' for those stored files more difficult.

The principle of quantum secure storage is aimed at cutting it into varying pieces, encrypting it differently and then distributing it over different places in the network. First, this makes the search extremely difficult because, if someone already finds such an encrypted block, it is only an unknown fragment of the entire message. In addition, by not cutting up and dividing the data via an algorithm but via relatively simple 'human logic', any computer, even with super quantum properties, can do very little. And that's the charm of this new way of storage: how can you find the needle in the haystack if you don't know and understand what a needle is in the first place?

Grid Computing.

A distributed grid network is ideally suited for the distributed storage of the shredded file. The decentralized networks seen as Web 3.0 infrastructures are emerging for the new Web3-based initiatives. Data and identity protection in these increasingly surrounding virtual worlds are one of the major challenges of our time. In a previous blog, 'Protection of digital identity and privacy,' I talked about the European standards developed to work securely with these new digital identities within Europe. A kind of new GDPR, not for privacy but for identity protection.
IDC studies show that by 2025, global data will grow to 175 ZB, a fivefold increase from the 33 ZB created in 2018. With the advent of outsourcing and later the cloud, data is being stored in increasingly centralized ways; by 2025, IDC expects 49% of this in public clouds. While these public providers have taken their security to an increasingly professional level, at the same time, centralization creates a single point of failure. A single security breach, virus or hack threatens the entire database— a risk that can translate into millions, even billions, of stolen files.

Data Decentralization.

While the pendulum swings between decentralized and centralized, with the cloud – as the mainframe of the internet –greatly enhancing this central movement, we see that edge and grid computing create a decentralized movement.

Due in part to the 'Internet of Things & People', greater processing power and local storage are needed at the edges and at the nodes of networks, to store and process data locally. A balance between central Big Data and local Fast Data. I pointed this out years ago; refer to the 2015-blogs on 'VM-world 2018' and 'the attractiveness of data'.
Data centralisation isn't just risky; it's also unfair. While highly effective as a solution, it often leads to unequal assets and resource distribution. Terms and conditions attached to the systems protect big data companies, not individuals or small businesses. Meanwhile, the users of these centralized data systems have no choice but to accept the terms, or be banned from participating. For that reason too, data decentralization is a sound proposition. Provided that the data can be stored and retained just as securely – and even more securely without a single point of failure.
Fortunately, with modern decentralized, quantum secure storage, this has come within reach. DigiThree Labs, part of the DigiCorp Labs family, is developing enterprise solutions as part of its secure, decentralized and metaverse-based services, and is aiming to develop solutions using quantum secure storage.

Barricade your digital front door with Passwordless authentication.

If your security does not bring you peace of mind, you should interrogate its use.

As technology has gotten more advanced, so have the threats that come with it. Our online personas and activity are big business and their value increases by the millisecond, so it makes sense that any business that has a digital footprint and online presence needs to protect themselves.

And before you think of this issue as trivial, consider these very real scenarios.

LastPass, a password manager with 25 million users recently reported a breach. Their development servers were compromised and even though no consumer data was accessed, it should be a cautionary tale to all when a virtual security vault is hacked.

Given how carried cyber attacks are, it can be hard to determine which approach is best suited for your business. However, in our experience, most individuals and businesses are not practicing the tried and tested methods, so advanced tools are often lost on them.

For instance, passwords are still too easy to guess, they are too short, are not changed often, are not kept confidential, and are used on too many platforms. And what’s worse, seasoned IT professionals are guilty of these habits in the same way that the general public is.

If you want to protect what you worked hard for, maintain the trust of your customers and secure a better tomorrow, you need next-level security.

Research has shown that 3⁄4 of users create a password and forget it soon after, mostly because they do not get the point of creating one. Which is why platforms need to evolve their authentication systems to fit the lived experiences of the user.

We are introducing a QR-Code scanning authentication system that bypasses the tedious password system and gives access to the system through the DGMV-ID App...and the secret to this simplicity is in Web3 technology.

The DGMV Authentication uses blockchain wallet technology to decentralize the password system. When we think about increasing security, we do not default to building higher walls, we reconfigure the lock and store keys in different locations!

Platforms that host sensitive information, have high internet traffic, and experience a high frequency of password resets are best suited for this solution.

The DGMV-ID app does the work so that you don’t have to. Strong Multi Factor Authentication in one single application, on one (mobile) device to generate very strong and unique passwords for all websites that use a login/password system. The passwords are never stored on mobile phones, apps, computers or supporting servers. Our app is using DigiByte Blockchain wallet technology to make it more secure and decentralized.

The reality is that you can rely on very few things to give you peace of mind. A notepad of passwords literally gets lost, a note on your phone is at the mercy of the phone being misplaced, a local server is always at risk of being hacked, and your mind most certainly forgets!

DGMV-ID uses unrivaled innovative authentication technology, allowing the user a convenient and easy operation, so inconvenience and complexity will no longer be a reason not to use it. That level of control and awareness is what has been missing from the market and in true Web 3 style...that power can now be in everyone's hands with our passwordless authenticator.

Think about it, stop being vulnerable, don't use passwords. 

That is exactly what DGMV-ID offers: a zero knowledge approach without reliance on vulnerable elements residing on your devices, apps, platform and places in diversified locations. Passwordless authentication in the way it's designed with DGMV-ID is simply the best way to protect yourself.

DGMV ID Atomic Essay #4

Passwords are often typed on a keyboard. The keyboard detects the keystrokes and transmits them to the computer. The actions of the fingers on the keyboard make visible movements, and create specific key-sounds and electromagnetic emanations that all potentially can be detected and analyzed by a third party. That’s why DGMV ID uses passwordless authentication by scanning a QR code that minimizes possibilities for third parties to engage in the authentication process. By using its own blockchain solution with a self-developed operating system, DigiThree created a quantum-safe and trustless environment for the new distributed metaverse. Working completely isolated on your own digital island and inviting visitors by this secured authentication process for private communication and private sharing of data – data that is also quantum-safely stored on trusted neighbor islands as nodes in a trusted grid. For corporate use, the metaverse should be intrinsically safe and protected – always, at any moment and for any activity by any entity. DGMV ID delivers this corporate trusted solution.

DGMV ID Atomic Essay #3

DGMV ID uses an authentication protocol that relies on an extra authenticated channel. Checking fingerprints through a passwordless parallel second channel enhances the security enormously. The authenticator app from DigiThree uses these high-security protocols to make life in the digital metaverse easy and pleasant. Traveling from digital galaxy to digital galaxy while in the backdrop your self-sovereign identity is constantly protected. Human participation in the authentication protocol via feedback through a second channel is securing the authentication process. It implicitly ensures integrity and is based upon SAS-based cryptography where SAS stands for Short Authenticated Strings. DGMV ID, of DigiThree, is based upon this cryptography standard in combination with passwordless identification and biometrical authentication in the communication channels.