01
Hardware-rooted.
Keys generated inside TPM 2.0 or Secure Enclave, never extractable. Every operation requires a fresh attestation quote proving device integrity.
Cryptographic Infrastructure
BlueHash binds every credential, OAuth token, session cookie, and decryption capability to specific attested hardware. The replay step that drives 88% of web application breaches fails by design.
Hardware-rooted · Decentralised · Open protocol · Reproducibly built
The Attack Class
Possession equals access. A stolen password, OAuth token, or session cookie works from any machine on the internet — indistinguishable from the legitimate user. This is the architectural defect underneath every recent supply chain breach: ShinyHunters, Storm-0558, the npm worm campaigns, the Snowflake customer attacks. Phish a credential from one machine, replay it from another, exfiltrate.
22%
of breaches start with stolen credentials
88%
of web app attacks involve them
30%
of breaches involve third parties
46%
of unmanaged devices hold company credentials in infostealer logs
Source · Verizon DBIR 2025
The Primitive
01
Keys generated inside TPM 2.0 or Secure Enclave, never extractable. Every operation requires a fresh attestation quote proving device integrity.
02
Session tokens bound to device hardware via DBSC. Stolen credentials cannot produce attestation from another machine. The replay step fails.
03
No central key authority, no vendor key custody. Customer holds all keys, all storage, all trust roots. We ship the agent and protocol.
Architecture
01 · Peer mesh
Attested clients
Human device
User keys sealed to platform. Fresh quote per operation.
Admin device
Threshold signatures. No single-key admin authority.
AI agent enclave
Confidential compute. Attestable agent identity.
02 · Sigchain
Append-only · Tamper-evident
Append-only signed log
Every membership and policy change cryptographically chained.
Public transparency anchor
Periodically anchored to a public log for non-equivocation.
03 · Customer storage
Plaintext never leaves
Ciphertext files
S3 / Drive / SharePoint. Per-file content keys.
Encrypted search index
Searchable encryption over content metadata.
Real-world Coverage
The same primitive — a bearer credential phished from one machine and replayed from another — chains together every major breach below. None required a novel exploit.
Breach
Impact
Year
Vector
McGraw Hill
13.5M
2026
Salesforce credential replay
Pitney Bowes
8.2M
2026
Phished email → Salesforce session replay
Carnival
7.5M
2026
Compromised user session → Salesforce
ADT
5.5M
2026
Vishing → Okta SSO replay
Amtrak
2.1M
2026
Infostealer → multiple SaaS
Udemy
1.4M
2026
Vishing → Salesforce
Vimeo
119k
2026
Third-party OAuth pivot
Ticketmaster (Snowflake)
560M
2024
Stolen Snowflake credentials replayed without MFA
AT&T (Snowflake)
109M
2024
Snowflake account credentials replayed
Change Healthcare
100M+
2024
Citrix portal credentials replayed (no MFA) → BlackCat
Santander (Snowflake)
30M
2024
Snowflake credential replay
Microsoft Midnight Blizzard
Exec mailboxes
2024
Password spray + OAuth app token replay
T-Mobile API
37M
2023
Leaked API token replayed against customer-data API
23andMe
6.9M
2023
Credential stuffing → DNA-relative pivot
MGM Resorts
$100M loss
2023
Scattered Spider vishing → Okta superuser session replay
Microsoft Storm-0558
25 orgs
2023
Forged MSA token replayed against M365 / Outlook
Okta Support → 1Password / Cloudflare / BeyondTrust
134 admin sessions
2023
Service-account token replay
Cloudflare (Thanksgiving)
Atlassian internal
2023
Stale Okta service token replayed
LastPass
30M+ vaults
2022
Engineer credentials replayed → encrypted vaults
Twilio
163 customers
2022
Smishing → portal credential replay
Uber
Internal SSO
2022
Stealer credentials + MFA-fatigue → SSO replay
Every chain above breaks at the same step: a bearer credential, valid from any machine on the internet, presented from one the legitimate user has never touched. Hardware attestation makes that presentation impossible.
Deployment
You keep
Your stack, untouched
We ship
Open-source agent and protocol
We do not run a KMS, an attestation verifier, or any service that touches your plaintext.
Design partners
Looking for design partners. Specific teams in scaleups and security-conscious enterprises with active credential-replay exposure.