The Five-Link Proof Chain
How Enigma Works
No prior system cryptographically proves the right person was present at the moment of a confirmed request. Enigma solves this with a five-link proof chain.
The Problem No One Else Solves
Every health system can store your data. Some can encrypt it. A few can even audit who accessed it.
But none of them can prove that you — the actual biological person — were present and consenting at the exact moment your data was used. They verify passwords. They verify devices. They do not verify people.
The Five-Link Proof Chain
Every interaction with your data must pass through all five links. Break any link, and the request fails.
Enrollment
Nova is a real person
When you create your Enigma Biological ID (EBID), your biometric data — Face ID or fingerprint — binds your identity to your actual biology through Unifactor. This is not a password you can share or a device that can be stolen. This is you.
Identity
This EBID is Nova
Every access request proves this EBID belongs to you — not someone who stole your password, not someone who has your phone, not someone who knows your mother's maiden name. The system uses HMAC-SHA3-256 fingerprinting linked to your device key to verify identity continuously.
Consent
Nova personally authorized this
At the moment of every data request, you must biometrically re-authenticate. Not once during setup. Not once per session. Every single time. This proves you — the actual person — consciously authorized this specific action at this specific moment.
Request
Query answered on Nova's confirmed data
The query runs inside secure hardware enclaves with Signachain attestation. Your data never leaves your control — only the answer to the specific question you approved leaves the system. The researcher gets "yes, this patient qualifies" without ever seeing your full record.
Record
This happened and cannot be altered
Every action is cryptographically signed with ML-DSA-65 and timestamped per RFC 3161. The audit trail is tamper-proof forever. You can see exactly who asked what, when they asked it, and what answer they received. No one can edit this history. Not us. Not them. Not anyone.
Why This Matters
No hospital system, no genomics company, no health app can prove this chain. They can prove someone logged in. They cannot prove the right person was present at the moment data was accessed.
Enigma can. That is the difference.
Technical Guarantees
Quantum-Safe Encryption
ML-KEM-1024 and ML-DSA-87 protect your data against future quantum computing threats. NIST FIPS 203/204/205 compliant.
Zero-Knowledge Architecture
We cannot read your data. Ever. Even if compelled by law enforcement. Client-side encryption means we receive only ciphertext.
Biometric Binding via Unifactor
Your EBID is bound to your actual biology, not just a device or password. The person must be present.
Instant Revocation
Change your mind? Access is revoked in under 60 seconds. The system enforces your decision immediately.
Questions? Contact us