OPPORTUNITY FOR LARGE PRIVATE BANKS
The Problem and Opportunity
According to recent surveys, cybersecurity is the n.1 concern of family offices worldwide, while it is the n.2 concern for high net-worth individuals. Apparently, the more successful and wealthy one becomes, the larger the cybersecurity problem gets: there is nothing money can buy. It seems like they just have to live with it, like rain or lightning.
Meanwhile, top bank exclusive and staff are not better off. Like their most advanced clients, they rely on a patchwork of mobile client endpoint security mitigations, including secure messaging apps, older hardened Blackberries and iPhone, dedicated obscure “below-the-radar” cryptophones, or recent iPhone with very advanced malware protection systems and severe usage guidelines. Scandals such as that of Credit Suisse and Threema reveal the huge risks involved in terms of compliance, internal crime, and especially reputation and drip blackmail scenarios.
Recent scandals like Crypto AG, ANOM, Infoguard AG, Phantom Secure, Omnisec - and continuous vulnerabilities discovered in the iPhone - reveal the huge vested interest that powerful nations have to prevent access to unfettered encryption by anyone, including wealthy individuals or powerful bankers.
Sure, ideally, we'd love for an app or software to solve that. But there is not “an app for that”. An app can never be more secure than the device it runs on. And all client endpoint devices are hackable by innumerable actors willing to incurring a moderate cost, and very minimal discovery risk, rent the necessary hacking capability.
Exclusive Go-to-market Opportunity
To solve this huge cybersecurity problem of private banks top staff and executive and their clients, we set out to build an ultra-secure 2mm-thin personal computer that will disappear in a custom next leather wallet, to bring you unimagined freedom and peace of mind to their private digital life and e-banking, while seamlessly interacting with their smartphone.
There is a unique opportunity for leading large private banks to acquire a limited-time exclusivity to be the only private e-banking app on the Seevik Wallets, produced initially in 10'000 units for the most demanding family offices, UHNWIs, and their close personal and business associates.
While open to various kinds of engagements, we offer one or two leading large private banks to enter into an agreement for limited-time exclusivity to be the only private e-banking app on the Seevik Wallet:
For an extent of time, your private e-banking app will be preloaded and prominently visible on every Seevik Wallet - and no other private bank or wealth manager will be allowed to offer their services to our users, including through its messaging features.
Your bank will have a chance to engage in joint product integration, customization and development - over a few months, with limited mid-management engagement - to ensure the best fit to your bank-specific integration, requirements, desiderata, compliance needs, and user acceptance.
Your bank agrees non-bindingly that it intends to buy a large approximate number of Seevik Wallet units, with set features and apps, at a target price. Our company bindingly reserves for your bank an option for up to 3000 units, at a fixed price and discount, exercisable up to 6 months before our go-to-market,
Your bank joins as co-leader of a publicity campaign for new IT security certifications that will ensure radically-unprecedented privacy and security for all citizens - and not only for the wealthy - which will be launched next June 24th in Geneva our 8th Edition of the Free and Safe in Cyberspace series.
The agreement is confidential, and maybe be suspended and conditional on the closing of our next funding round. Your bank would have the option to join as a shareholder of the company, for extra control and assurance.
The Value Proposition
Large private banks stand to benefit the most from offering our Seevik Wallet to their top executives and top (U)HNW and family office clients. In fact, it provides radical mitigation of what recent surveys by UBS and by Northern Trust found is their n.1 or n.2 concern: cybersecurity.
Deepen top client relationship with the highest net-worth clients, offering digital confidentiality levels even higher than most in-person meetings, enabling you to become their unique digital confidant and becoming the digital trust gateway to secure and confidential financial services.
Increase average revenue per user (ARPU) by offering remotely, digitally and with limited exclusivity high-margin services that currently require in-person interactions because their confidentiality and/or integrity requirements are too high for current IT security state-of-the-art.
Increase top client retention, via exclusivity of private e-banking on the most secure client device, and unique new e-banking services
Increase top client acquisition by onboarding client associates via network effects, via publicity, and via an ultra-private online and offline social network.
For top clients and staff, and later all, replace all external hardware authentication devices and dedicated secure client devices - eliminating the huge costs for the bank and client of supporting, maintaining, upgrading, and troubleshooting such systems that derive from ever more complex, changing, and insecure mainstream mobile platforms.
Increase your reputation and brand by joining as co-leader of a global publicity campaign for new standards that will affirm in Cyberspace the constitutional rights of the most targeted law-abiding citizens - and not only for the HNWIs - via the Trustless Computing Certification Body the global Free and Safe in Cyberspace Conference series.
Key Benefits for End-Users
Radically increase your protection for your most valuable data, communications and transactions from cyber-enabled crimes, including ransomware, extortion, financial loss, reputation damage, blackmail, secret thefts, and physical safety arm that derive from being hacked - detectably or not - by state and non-state actors.
Substantially increase your freedom to engage in sensitive or private personal and social communications, and pursue business opportunities, which you avoid to reduce the risk of being subject to cyber-enabled crimes. Expand your freedom to interact, do business with and deepen your relationship with current and new personal, family, social and business associates.
Enjoy a radical increase in security, confidentiality, and convenience for their most sensitive e-banking, including transactions, communication with relationship managers, and liquidity view and simulation of their consolidated bank accounts, and new advance services enabled by its unique security levels.
Replace your mobile e-banking, advisory, and onboarding user experience with one that is substantially more confidential, secure, intuitive, easy, user-friendly, pleasurable, elegant. Replace all external authentication hardware and secure mobile devices, and related user experience problems, with our ultra-secure and user-friendly Seevik Wallet, which includes for bank staff and executives a separate personal virtual space for their personal private digital life, which they get to keep even post-employment termination.
Enjoy dozens of apps on the seevik Wallet for financial, business, and personal use that leverage radically unprecedented levels of confidentiality or integrity and ease of use - including text and voice 1-to-1 and group messaging, financial transactions, social networking, contracts finalization and signing, personal journal, passwords, e-health, and digital voice assistant.
Integration into Bank Infrastructure
Seevik Wallet Service Pricing
The price is $4’900 for a pair per year, and $1,800 for each additional unit, plus a mandatory package of managed security services, proportional and specific to the user risk profile, including net-worth.
Seevik Wallets are available as managed IT security service, that includes advanced security training, emergency response, support 24/7, and ambient security consulting.
In fact, as the risk profile of the user increases, how and where it is operated becomes more and more critical. So those services are needed to reduce the risks deriving from attackers hacking remotely (or even in-person) the users’ other IT devices or surveillance cameras, vehicles, homes, or offices.
Yearly Membership for each pair includes:
2 Seevik Wallets with default skins, and 2 wireless chargers.
Default Apps: one-to-one and group messaging and calls; full access to the Seevik Net social network; agreement writing and signing; intergenerational data custody; personal notes; password manager; an app for your iOS or Android mobile; and 2nd-factor authenticator.
Included mandatory special services proportionate to each user’s risk profile include: advanced security training, emergency response, support 24/7, ambient security consulting.
3 “Invitation gifts” for a 25% discount for 2 years.
Politically-exposed politicians, elected officials, journalists, and activists, and their organizations, are eligible for large discounts, up to receiving the service at cost.
Competition: Trusted Execution Environments
Every year, for over a decade now, new advances in Trusted Execution Environments (TEE), and CPU secure enclaves promise to enable a more secured component to isolate the user from vulnerabilities in other stacks.
Yet, the truth is that Trusted Graphical User Interface has never been fully implemented in real-life devices. Also, TEE confidentiality assurance is assured by self-referential and only partially transparent standards-setting and certifications, dominated by entrenched large companies with a vested interest in maintaining the status quo, and supposedly always allowing enabling nations to hack their devices to fulfill their mission. As even Bruce Schneier said after what we learned with Snowden (and before Spectre and Meltdown!) “we should assume all CPUs to be compromised”.
Competition: Bespoke Hardware?
Hardware is difficult and expensive. Ultra-secure hardware is very difficult and expensive. Bespoke hardware is not the solution to the client endpoint cybersecurity problem as it is very costly and time-consuming to develop and test.
Yet, opportunities for creating ultra-secure hardware client devices emerge, however, from the explosion of the R&D and market development of integrated circuits based on RISC-V instruction set architecture. Increasingly there are several open-source implementations of RISC-V for high-security low-performance environments. They have already mature toolsets of the rapidly growing environment of adopters that have made even the EU and US military major adopters.
The most secure OSs and low-level stack technologies are being ported to it, including Sel4 OS. Recently, an even faster acceleration came from new regulation by the US denying to Chinese groups the use of US chip intellectual property.
Furthermore, advancements in ASIC, FPGA, and fast iteration tools and techniques have dramatically spread up the time required to develop, test and battle-test chipsets. Also, it is becoming increasingly common to have solutions that start by implementing certain components in FPGA, which are then later turned into silicon as the volumes rise over the years. All this makes certain technologies, standards and providers of the RISC-V ecosystem highly suitable for use cases where performance requirements are low, volume is low (initially), and having a high marginal unit cost is not a problem because the device price is relatively high.
So it can be concluded that there unprecedented opportunities to develop semi-bespoke SoC and client device solutions without the cost and times that creating a bespoke or semi-bespoke solution traditionally required.