White Hat is a weekly column that speaks to leaders in the cyber security sector touching on the hack of the week and what can be done to protect the future.
This week we interviewed Eric Dresdale, President and Co-Founder of Entrokey Labs.
White Hat (WH):
What was the genesis for Entrokey Labs?
Eric Dresdale (ED):
Entrokey began with a patented innovation from KNWN Technologies, using cosmic radiation to generate quantum-resistant digital identities. After key conversations between myself and my co-founder David Harding, we realized this breakthrough could be a perfect response to the rising threats from AI and quantum computing. We set to work to evolve it from space-based to hardware-based, and ultimately into a software-only solution powered by generative AI trained on natural entropic phenomena.
WH:
What is Entrokey’s competitive edge?
ED:
EntroKey is rebuilding the cryptographic foundation for the post-quantum era, fixing entropy at the source to secure the world’s most critical digital systems.
In crypto, blockchain, and Web3, we ensure the integrity of key generation and synchronization, enabling resilient wallets, trustless protocols, and quantum-safe infrastructure without hardware dependence.
Our lightweight, stateless random number and key generator safeguards everything digital — from individual privacy to global enterprise systems — enabling organizations to scale trust and security without friction.
WH:
Who would best benefit from Entrokey’s security protocol?
ED:
Entrokey is a dual-use technology, making it ideal for governments, defense, and national security agencies where cryptographic integrity is mission-critical.
In parallel, we are targeting regulated industries such as cloud providers, financial services including crypto and stablecoins, healthcare, and aviation where trust, compliance, and AI and post-quantum resilience are essential.
WH:
Crypto trading platform WOO X was hacked recently, how could have Entrokey prevented this?
ED:
Phishing happens. But with Entrokey, access alone is not enough. Our keys are bound to high-quality entropy and the environment they were created in. So even if an attacker gets in, they cannot use or move anything. No static keys to steal, no way to spoof the system. That is how we contain damage before it starts
WH:
What advice do you have for everyday crypto users to protect themselves?
ED:
Use an MPC or hardware wallet — These eliminate single points of failure. No seed phrase, no static key to steal. Watch for phishing — Most hacks start with a fake link. Never connect your wallet unless you’re 100 percent sure. Keep your funds off exchanges — Centralized platforms are honeypots. If you’re not trading, withdraw and hold on a cold wallet.
Disclaimer: This article is provided for informational purposes only. It is not offered or intended to be used as legal, tax, investment, financial, or other advice.
Credit: Source link