RADICL Blog

EP 36 —  ZKX Solutions’ Collin Sweeney on Zero-Knowledge Proofs and Digital Identity Security

Written by Chris Petersen | 2024 | 10


On this week's episode of the DIB Innovators podcast, David speaks with Collin Sweeney, CTO & Co-founder of ZKX Solutions, who shares his insights on the innovative applications of zero-knowledge proofs in enhancing digital identity verification and cybersecurity. 

He discusses the importance of collaboration in developing effective security solutions and emphasizes the need to understand customer pain points to tailor technologies that address real-world challenges. Collin also highlights how his team is working to make advanced cybersecurity measures accessible to businesses of all sizes. 

Topics discussed:

  • How zero-knowledge proofs enable secure authentication without revealing sensitive information, enhancing privacy and security in digital identity verification.
  • The challenges in securing digital identities and how innovative technologies can address vulnerabilities in current systems.
  • The importance of partnerships in the tech industry to develop comprehensive cybersecurity solutions that effectively combat evolving threats.
  • The need to identify and understand customer challenges is crucial for tailoring cybersecurity technologies that meet specific organizational needs.
  • The competitive landscape of cybersecurity and how ZKX Solutions differentiates itself through unique approaches and innovative technologies.
  • Applications of zero-knowledge proofs and how they can be implemented in various sectors to enhance security.
  • Making advanced cybersecurity measures accessible to smaller organizations that often lack the resources for robust security solutions.
  • The challenges faced by cyber operators in military and tactical environments, highlighting the need for effective security measures.
  • The role of AI in cybersecurity, particularly how automated systems can adapt to emerging threats in real-time. 

 

Guest Quotes: 

“All of those methods that I just talked about as far as authentication and authorization go, specifically the authentication and digital identity piece, a lot of those different mechanisms, their secret information involves passing from one party to another, from client to server, from little hardware, pluggable token into the computer. There are sensitive and exploitable areas from the adversarial perspective to just about every one of those mechanisms I described. The technology that my company invented, we have this approach where we're not employing that private or that sensitive or that authenticating data in any part of the transaction whatsoever.” 

“So in very short terms, we're transforming that password into high-entropy and fixed-length data, which is then being combined with information we're storing on the device. That again is not inherently private. But when you combine that password-derived data and that device-stored data, voila, you have recreated dynamically, on the fly, that corresponding private key to the public key that's being challenged on the basis of your identity here.” 

“You're absolutely correct that sometimes it is a hard sell. And usually when we're having the zero trust conversations, it usually starts by us, the ZKX team, asking a question of our audience member of what does zero trust mean to you?” 

“As we start to look at these other market verticals now, we're finding ourselves having to go through a similar kind of exercise where we have to really be honest about what the things that we don't know are, and then figure out what are the most effective ways to start learning that information for gaining those contacts such that we can have these well informed conversations of, hey, I've got this really cool technology that certainly could do a lot for your organization, your structure, your business.” 

Get in touch with Collin Sweeney:  

LinkedIn 

Website 

Get in touch with your host, David Graff: 

LinkedIn 

Listen to more episodes: 

Apple 

Spotify