Who We Serve

Everyone Needs Our Permanent Protections

The startup that has everyone as a potential customer can easily drown in that sea of opportunity if it cannot find enough motivated early adopters to get them on solid ground.

What Our Marketplace & Communication Platform Needs
Marketplace Needs

Motivated buyers and sellers that want to securely transact their business, and they will need our communication platform to communicate with each other to securely conduct that business.

What Our Nation's Security Forces Need
National Security Needs

They need to realize and take advantage of the actionable intelligence capabilities of the data our platforms create and deploy our reciprocal authentication technology to permanently secure the remote access and remote control of our nation's critical infrastructure.

The Early Adopters We Target Are:

Private School Students
Private School Students
Certified Public Accountants (CPAs)
Certified Public Accountants (CPAs)
National Security Forces
National Security Forces

Our Private School Fundraising Project

Private School Fundraising Project

Most private school fundraising projects have a beginning, a middle, and usually an annual end, generating most of their revenues from those directly and then indirectly associated with the school. The level of most participation and earnings drop off as the quality of the relationship with the school becomes more distant. This occurs because a significant motivation for these early adopters is their relationship with the school and not with the items sold, or the services being offered.

The Base

We want to use this base of early adopters as the foundation from which to grow our business by finding a constant supply of new and repeat customers that are motivated by our services, our rewards, and their needs rather than just a school relationship.

Enrollment

The enrollment process gives users access to both our marketplace and communication services. The marketplace is free for enrolled buyers, and our sellers pay commissions equal to their industry's traditional marketing and advertising expenditure. Enhanced communication services at $45 a month are free for all new student signups for the first three months and then they can switch to our free basic communication services.

We Ask

Every individual that enrolls is asked to add twelve new users over the next two years with the same three-month free trial of our enhanced communication service. Once enrolled we never give anyone a reason to leave and keep offering them reasons like sharing our marketplace commissions and enhanced communication service fees to encourage their continued use of our services.

How We Share Communication Fees

The plan to share our $45 a month enhanced communication service revenues gives back more than 70% to pay our user's $45 fee, support the sponsoring school, provide a rainy-day fund for our user's health and education funding, and creates endowment vehicles for a private school tuition reimbursement program and an endowment to eventually guarantee our user's $45 fee is paid into perpetuity.

How We Share Marketplace Commissions

Gartner, the marketing experts, say that on average 10% of the B2C prices buyers pay goes to cover their seller's traditional marketing and advertising expenditures. We give back 40% to our buyers and sellers to share, 10% to reward the CPAs that help us set up and manage their business clients and their clients' customers, and 10% to the third-party software developers that build versions of the internet's most popular software services for our secure service platform users. Assuming buyers and sellers would split 50/50 their 40% share of our marketplace commissions, that could give buyers as much as a 20% share. Buyers that continue the enhanced communication trial for $45 a month get 10% of that 20%. Signing up more than 6 and less than twelve in two years earns them another 5%. Signing up twelve or more gets them another 5%.

Everyone Must Change & Choose

Quantum computers are coming, and everyone must change how we protect our digital way of life going into this post-quantum world, and students, faculty, and everyone they would want to communicate and do their business with are no exceptions. Everyone must decide between our permanent cyber solutions that will make and/or save them money, time, and effort and all the costly NIST alternatives that perpetuate that endless cycle of encryption failure that constantly exposes their data with each failure.

Lead & Take Ownership & Control

Students and everyone joining our marketplace and communication platform with this fundraiser get to lead their fellow countrymen away from the wasteful endless cycle of encryption failure to a permanently secure world where the people finally take communal ownership and control of their information.

Tech Life Extension

Most technology has a seven-to-ten-year lifespan. The way we share our commissions and service fees along with our quantum-proof protections and communal data ownership should help extend that lifespan for our private schools, their students, our country, and as it expands to the rest of the free world.

School Benefits

Private schools will receive monthly revenues for many years over the life of these technologies, be able to remain in contact with their alumni with our secure tech, and appoint tuition reimbursement endowment board members that will decide how their school's tuition reimbursement fund will work for their school and future students.

Our Solution for CPAs

Certified Public Accountants (CPAs)

The only way for CPAs to minimize client and customer losses is to transition their client's business systems to either the NIST quantum resistant alternatives or our technology's permanent quantum proof protections as soon as possible. The older data is the less valuable it becomes, making the last to transition the most valuable target. Unauthorized copies of any encrypted data will forever be insecure. Copying our data that is already secure won't keep it from being secure forever.

Protecting Your Clients & Their Customers

CPAs that encourage their clients and their clients' customers to choose our permanent cyber solutions will remove their clients and their clients' customers from the constant data exposures and transition costs that the endless cycle of encryption failure will impose on everyone going the NIST temporary quantum resistant route.

Motivating CPA's To Enroll Their Business Clients & Their Customers

CPA Integrity & Going Concern Requirements
CPA Integrity & Going Concern Requirements

CPAs must believe in the integrity of their clients' information systems and report on their viability to survive.

Impact Of Encryption Failures
Impact Of Encryption Failures

Encryption failures and data breach liabilities make achieving CPA integrity and going concern requirements unlikely.

Our Solution for CPAs
Our Solution for CPAs

Our platform helps CPAs protect their clients' identities and avoid financial liabilities from quantum decryption threats.

Carriers Concerns Captured

Professional Liability Carriers and the underwriters of those policies will want to cover the CPAs shielded from lawsuits with our technologies rather than those that will be constantly exposed by the NIST alternatives. Contacting these insurance carriers for introductions to their CPA clients is part of our go-to-market strategy.

Money Making Motivations

Our technologies address the going concern and integrity issues for our CPA's business clients that allow CPAs to provide their customary services, and they make new client services possible. New business client services that include designing and managing market research, marketing & advertising campaigns, advertising delivery, the omni channel customer experience, coordinating enterprise-wide communications.

New Client Services

CPAs as they help their business clients and their client's customers transition to our secure technologies are in position to transition away from merely accounting for their client's sales to helping them make those sales by designing and managing the new business client services our technologies make possible.

Help Clients Make The Money You Count

CPAs are now positioned to use our marketplace scale research capabilities to help their business clients dramatically improve how they discover new potential customers and manage how many they can effectively service. The one thing that might be worse than not having enough customers might be trying to service more customers than you can manage. You only get one chance at first impressions.

Impressing New Customers

Our platform opens each business client to the research and advertising delivery capabilities connected to every other enrolled business and individual. If operations can only handle 100 orders a week, contacting every potential customer with a marketing campaign might get 1000 orders for next week, most of which will not be filled. CPAs from their understanding of their client's unit costs and our capabilities can help their clients balance these matters with the goal of maximizing efficiency and profitability.

Omni Channel Customer Experience

Where most businesses pay different services to have their client information extracted from their siloed legacy information systems and pushed into a clouded environment for them to obtain the access, they need to provide the omni channel customer experience their customers expect we provide this data view naturally. Our marketplace and communication platform offloads this information to our cloud for research, analysis and to present this view of each entity's customer information along with sending a copy for each entity to process into their legacy information systems with the SDI (Software Development Integration) kits we provide them upon enrolling. CPA's already familiar with their clients financial information systems will be able to help them design the means to securely draw down the financial and communication information from our cloud to provide the customer experiences they want to provide.

Communication Coordination Problem

With so many different means of communication for different work, home, and social reasons most of us spend too much time answering and chasing these communications. The CPAs that know you, your business, and our communication platforms capabilities will reveal how you can take control of all inbound contacts across work, home and social to address this communication coordination problem to efficiently address everyone's needs.

Competitive Advantages

Solving our CPA's going concern, integrity, and liability issues and giving them new client services and a share of our marketplace commissions are not the only means of motivating them. Giving the CPAs that work with us competitive advantages over their off-platform competitors and enabling them to give their clients and customers edges and competitive advantage over their off-platform counterparts is another motivating factor for them all.

Our Government Impact

Our Government Impact

Actionable Intelligence

Our token tech removes identity and payment details from the data our users create on our marketplace and communication platform. Privacy regulations have prohibited our government from accessing this kind of data in the past and our tech by anonymizing it makes actionable intelligence capabilities possible for government and private sector research and investigations. Collecting detailed marketing information upon enrollment and using our token tech to link everyone's anonymized marketing, transaction, and communication information makes what we collect for intel purposes even more valuable without endangering anyone's right to privacy.

National Security Forces

National Security Forces

Anonymizing real-time data and combining it with anonymized marketing information provides a secure research potential for generating artificial intelligence. Reciprocal authentication proves the source of the data AI processes learn from and authenticates the source of the data AI processes apply what it has learned to, verifying the authenticity of the AI outcomes achieved for national security. This creates a robust, privacy-preserving training environment, mitigating risks like data poisoning. Consequently, the AI's predictions and decisions for national security gain a critical level of trustworthiness.

Lone Wolf Problem

Seemingly random acts of violence by lone wolf actors are said to be almost impossible to predict in time to possibly prevent where studying well planned terrorist attacks such as the 911 commission revealed histories of detailed site planning, target behavior research, reviews of similar historical events, techniques, event timelines, and strategies that could have alerted authorities if they knew someone was doing this kind of research, gathering supplies to conduct such an operation and expressing these kind of violent points of view or belief systems.

Wolf Hope

We have not had access to anonymized data of this quality to be able to say convincingly that it would not have provided patterns in the behavior of these lone wolf actors that could not have revealed their likelihood to suddenly act so violently. When I first hear about one of these events my first thought is that the perpetrator must be schizophrenic and usually a mental component is revealed in their backstory. We need to study these backstories to discover patterns that can help us diagnose these conditions in the future hopefully in time to nudge these people in the direction of the help they need or allow us to take actions to avert or mitigate the consequences of their violent actions.

Automating Actionable Intelligence

Where violence is from hostile nation state actors it is hard to plan and perpetrate a plan without creating a trail of communications and transactions that provide evidence of their intentions that our intelligence gathering capabilities would uncover with the anonymized data access our technologies provide. To be successful our platform needs to know what triggers us to gather what information to send to what designated government official. For example, a patient walks into a Tampa medical clinic with burns consistent with exposure to radiation and the bill uses that ICD9 code. Before the patient has left the office that code and 48 hours of that patients anonymized marketing, communication, and transaction history could be sent to the Tampa FBI Weapons of Mass Destruction Field representative. When the next patient presents with the same burns generating the same ICD 9 code at a different medical facility that patent’s anonymized data is sent to the FBI. Then, upon reviewing both these patient histories it reveals they both work out of the port of Tampa I hope someone gets down to the port with at least a Geiger counter to find out what’s going on.

Delivering Actionable Intelligence Capabilities

Our platform is gathering the raw data. We just need to know what data to send, who to send it to, and what triggers us to determine when to send it. Only the government representatives responsible for processing this kind of raw data into actionable intelligence and then acting upon it can provide these answers. Tell us what you want, what triggers us to send it, and where it is to go and we can automate our part of generating near real time actionable intelligence responses to identified mission critical events.

Reciprocal Authentication

Proving who the sender is to our network and then our network to that sender allows our network to act as the monkey in the middle between any senders and recipients authenticating all parties before initiating access or the exchange of information or instructions, This is essential for establishing secure remote access and secure remote control of our nation’s critical infrastructure and our user’s IOT devices. Digital certification based on encryption will provide this functionality until that encryption eventually fails, and we will never really know exactly when that will be until things go seriously wrong. Our nation’s critical infrastructure must be defended 100% of the time and our adversaries need only be right once to inflict devastating results. Tokenization and reciprocal authentication combine to give us the best chances of creating and maintaining a defense 100% of the time and auto generative symmetric encryption at 256 characters will help in the short run.

Securing The DOW Chain of Command & Control

This same combination of technologies also gives us the best chance of securing the DOD chain of command from the most remote of sensors, warfighters, and autonomous vehicles, drones and robots on the outermost edge all along the chain of command up to and then back down from central command and control. Authenticating supply chain requests and verifying resource deliveries informs central command and control of what our warfighters need and when they get what they need to conduct their assigned operations. Deploying a secure network linking every DOD asset with our technologies would produce data that only the DOD can make useful while providing near real time actionable intelligence capabilities for command and control. Delivering this level of authentication and control to all government divisions is the objective and requires that we stand up a separate networked version of our technologies for each government division and an all government only network for automating government interdepartmental communications.

The Government Versus Private Sector Monkey Business

Our network has been described as a monkey in the middle between a sender and a recipient that offloads all the anonymized data as fast as it is created into a single secure researchable data repository for all private sector data. Giving the businesses that enroll with our services a Software Development Integration (SDI) Kit, enables them to integrate the data our network sends to their identified legacy enterprise software systems. Each enterprise is responsible for securing their own set of secret identified legacy data. Businesses have no reason to share secretive data like the different departments of government are expected to do and rarely do well. That is why we need an all-government monkey in the middle to keep government departmental secrets separate from each other and from our private sector data. DOD secrets need to remain in DOD networks and whatever data DOD divisions need to share with each other and any other non-DOD governmental divisions need to pass through an all-government monkey in the middle and not enter the realm of private sector data. The old saying that the left hand does not know what the right hand is doing generally applies to all large institutions and this all-government monkey in the middle, if implemented correctly should make this old saying less true.

Our Third-Party Software Developers

Our Third-Party Software Developers

The technologies we are using to build our marketplace and communication platform deploy a different approach to cybersecurity by creating data that is already safe. We are inviting third party software developers to build secure versions of today’s most popular software for the users of our marketplace and communication platform. Secure versions of Meta, Google, Tik-Tok and Instagram would be likely examples. Requiring developers to honor our user’s communal data ownership and continue the protection of their identities restricts their ability to derive revenue from selling our user’s marketing data. They replace that marketing revenue with monthly user service charges and a share of our 10% in marketplace commissions collected that month. Their share is based on what percentage their total user charges for that month compared to the total of all user charges collected that month and it is limited to 100% of the services fees they collected that month. Our users decide what third party services they want and at what price. Then we reward the third party software developers that create the most value for our users with the largest portion of the 10% allocated for their efforts.

Enterprises Transition To Our Secure Tech

We are hoping these third-party software developers will transition from designing adaptations of our technologies for these general user services to working with our CPAs to design enterprise level adaptations of our technologies to replace the identified legacy enterprise information systems.

To Discover

+1(813) 831-6002

support@hiddin.com