Proof of Usefulness Report

TrustnGo

Analysis completed on 2/27/2026

+191
Proof of Usefulness Score
Gaining Momentum

TrustnGo is a legitimate B2B entity (TrustnGo SAS, France, est. 2023) providing essential IoT security solutions (TrustnSafe SDK, TrustnPlay OS) aligned with upcoming EU regulations (RED, Cyber Resilience Act). The project demonstrates high real-world utility and technical competence in a timely market. However, the submission metadata contains low-quality, hyperbolic claims ('most people have used my product', 'audience: everyone') which contradict the niche, specialized nature of the business. The score reflects strong technical and utility fundamentals, heavily penalized for unreliable traction data and submission quality.

Ready to Compete for $150k+ in Prizes?

Move this data into a HackerNoon blog draft to become eligible for your share of $150k+ in cash and software prizes

View All Reports

Score Breakdown

Real World Utility+102.0
Audience Reach Impact+8.0
Technical Innovation+48.0
Evidence Of Traction+17.5
Market Timing Relevance+36.0
Functional Completeness+2.0
Subtotal+213.5
Usefulness Multiplierx0.89
Final Score+191

Project Details

Project URL
Description
What could be worse than having your innovation stolen or seeing your customer data exfiltrated in the “cloud”? TrustnGo markets software solutions and services that secure your IoT products and embedded systems against physical or remote attackers. Definition of the security problem, supply of security modules and certification, TrustnGo assists you at each key stage of the process of securing your embedded products. Our products: - TrustnSafe SDK, an SDK to secure your embedded devices and make them conform to the latest cybersecurity related EU regulations. - TrustnPlay OS, an hardened version of Zephyr OS implementing the TrustnSafe SDK as well as a secure MQTT FOTA agent. Our services : - Risk analysis and definition of the security problem - Support for CSPN, SESIP, PSA Certified, Common Criteria certification - Design of a secure embedded architecture - Help in choosing secure components (ST Micro, NXP, Nuvoton, Infineon, …) and secure software (MCUBOOT, TF-M, OP-TEE, MbedTLS, …) - Help in setting up a Secure Boot with or without an update mechanism - Help in deploying a secure enclave based on ARM's TrustZone - Cryptographic analysis and support on ANSSI’s RGS - Code hardening against fault or side-channel attacks - Software, side channel and fault injection penetration tests

Algorithm Insights

Market Position
Growing utility with room for optimization
User Engagement
Documented reach suggests active user community
Technical Stack
Modern tech stack aligned with sponsor technologies

Recommendations to Increase Usefulness Score

Document User Growth

Provide specific metrics on user acquisition and retention rates

Showcase Revenue Model

Detail sustainable monetization strategy and current revenue streams

Expand Evidence Base

Include testimonials, case studies, and third-party validation

Technical Roadmap

Share development milestones and feature completion timeline