Pre-Seed Stage — Sovereign Pilots Underway

The sequence
stays sovereign.
The proof travels.

bDNA applies zero-knowledge proofs, Merkle commitments, and post-quantum signatures directly to raw genomic sequencing data — inside a certified hardware enclave. The raw sequence is processed, hashed, signed, and erased. It reveals nothing.

Raw sequence never exposed  —  Zero data custody  —  Sovereignty guaranteed

$68B
Genomics market 2026
Global · CAGR 14–18%
15+
Active national programmes
UK · UAE · India · Singapore · Saudi Arabia
0
Data custody taken
By design · Architecture not policy
PQ
Post-quantum ready
Dilithium · Recursive STARKs · AES-256-GCM

The Device

bDNA Enclave

bDNA Enclave — Secure Genomic Cryptographic Device

165 × 165 × 55 mm  ·  65W passive cooling  ·  Tamper-evident  ·  Post-quantum secured


Core principles

Built on absolute constraints


Structure

Two adjacent, firewalled entities

The Foundation defines and owns the open standard. The Enclave builds and deploys certified systems. Each serves a distinct function. Neither can be the other.

Non-Profit · Switzerland
bDNA Foundation
Neutral international standard-setter
  • Defines and maintains the open protocol (Apache 2.0)
  • Issues and revokes deployment certification
  • Certifies regional integrators to replicate
  • Audits all deployments independently
  • Governed separately from the for-profit Enclave
  • Revenue: certification · compliance · grants
For-Profit · Certified Hardware
bDNA Enclave
Certified hardware + sovereign deployment
  • Manufactures and delivers certified Enclave units
  • Partners with sovereign systems integrators
  • Coordinates certified HSM, data centre, and connectivity partners
  • Milestone-based coordination fee per deployment
  • Delivers post-quantum upgrades as separate contracts
  • Revenue: hardware · SLA · PQ upgrades

Hardware Security
AMD EPYC + SEV-SNP · FIPS 140-2 Level 3 HSM · TPM 2.0 · Custom 7nm ASIC · Passive cooling
Post-Quantum Cryptography
Dilithium signatures · Recursive STARK proofs · AES-256-GCM · SHA-3-512 · CP-ABE
Sovereignty & Compliance
HIPAA · GDPR · GA4GH · ISO · NIST SP 800-53 · HL7 FHIR · Chain-agnostic anchoring