Proof of Usefulness Report

AtfCYBER

Analysis completed on 1/26/2026

+75
Proof of Usefulness Score
You're In Business

The project is backed by a credible founder (Dr. Eric Burger) and addresses a critical need (IoT security), but appears to be commercially dormant. The website is inactive, and the submission contains misleading claims regarding reach ('everyone') and traction ('most people have used my product'). While the technology is theoretically sound and patented, there is no evidence of active use, accessibility, or recent product updates.

Ready to Compete for $150k+ in Prizes?

Move this data into a HackerNoon blog draft to become eligible for your share of $150k+ in cash and software prizes

View All Reports

Score Breakdown

Real World Utility+65
Audience Reach Impact+10
Technical Innovation+75
Evidence Of Traction+5
Market Timing Relevance+40
Functional Completeness+20
Subtotal+33.62
Usefulness Multiplierx1.12
Final Score+38

Project Details

Project URL
Description
Our Technology Fits Your Needs atfCYBER is a company founded by experts in cyber security to dramatically change how people access information and services important to them with significantly reduced risk of attack. Our suite of patented, customizable authentication solutions targets the IOT and IIOT in order to protect critical infrastructure, providing both with new levels of security while reducing the supporting infrastructure cost and complexity. atfCYBER breakthrough solutions are simple, fast, affordable, flexible and adaptive across multiple technologies and platforms. Our solutions consume minimal CPU and bandwidth resources, making them ideal for home IOT devices, as well as corporate access. Our authentication solutions can eliminate passwords, PINs, CAPTCHA, or PKI. Combined with our anti-tamper technology, our authentication root cannot be copied, logged or eavesdropped. Security for the Internet of Things The “Internet of Things” (IOT) is expected to number into the 10’s of billions within a decade. There is no existing authentication technology that can readily provide security for these devices. Passwords do not provide adequate security and PKI is too complex and costly to utilize for consumer/home IOT security. atfCYBER’s patented LS Authentication is quantum proof, easy to understand, and can be implemented by the home owner with just a small app on their smart phone to create the key root and load it on the their devices. Securing the “Industrial Internet of Things” The challenge for securing the “Industrial Internet of Things” (IIOT) is that control of IIOT critical infrastructures, like the grid and manufacturing systems, requires control processes to complete in very small fractions of a second. Typical security password and PKI implementations require a “back and forth” communication to establish security consuming precious limited bandwidth, CPU, and time in these Realtime environments. LSA can simply add a few bytes to a control or sensor input message to authenticate and it can be implemented with no change in the process control system code. atfCYBER Follow-on Product Suite Following our patented LS Authentication technology, we have a full suite of new cyber security and network products in work based on the LS Authentication. This suite will allow atfCYBER to build private networks with a base security level much better than any existing commercial Internet. • Anti-Tamper (Message & File) – Patent pending Anti-tamper protects the data both at rest and in transit from access or change. • Mobile/Portable Device Dynamic Access Control This allows portable devices to move between corporate access points and have their correct access rights instantly in place. • 3-D Routing This will provide 1-meter location resolution of communicating nodes for First Responders, aircraft/drones, or military tactical units. • Hyper Message Compression This compression technology will reduce the bandwidth requirements by over 50% for text message communications. • Structured Routing This routing technology allows full routing control of private networks. • Secure-Cloaked Network Design This is the result of the combination of our other technologies that will allow construction of private high security networks. In the IOT space, we anticipate that a home owner will be able to download this and install it across their home network with just a few clicks. • Cyber Shielding for Critical Infrastructure This is a similar product for critical infrastructure that allows multiple entities to share control securely of assets such as generating plants, or grid substations. For more information, contact: info@atfCYBER.com

Algorithm Insights

Market Position
Growing utility with room for optimization
User Engagement
Documented reach suggests active user community
Technical Stack
Modern tech stack aligned with sponsor technologies

Recommendations to Increase Usefulness Score

Document User Growth

Provide specific metrics on user acquisition and retention rates

Showcase Revenue Model

Detail sustainable monetization strategy and current revenue streams

Expand Evidence Base

Include testimonials, case studies, and third-party validation

Technical Roadmap

Share development milestones and feature completion timeline