Sequenced DNA comparison,

without DNA sequence disclosure.

robots

🢩 A Compliance Imperative 🢨

Patents: GRANTED

Offering: Licences with know-how, training & reference code.


The Perspectives of Different Communities


        
        The newness of Undisclosed DNA lies not with a fundamental reordering of physics or breaking some universal law such as the speed of light. Our methods do not rely on nebulous and untested quantities. We live in the realm of not science fiction but science reality.
        We have brought together the concerns of disparate groups and found solutions across various fields. We should not define the strength of human ingenuity in a specific tool, weapon, or formula. Undisclosed DNA combines the findings of multiple fields to create something that exceeds the sum of its parts.


I     Biologists

Research by Charles Darwin and Gregor Mendel made possible any discussion of genetic code. Every lifeform carries its code for its own growth and for reproduction. Whatever the code is and however it is stored, some information on how to build another human is in each of us and carries to the next generation.
        Clever minds had already worked out that this code is separate from our bodies as a whole or life experiences. If a certain sparrow’s offspring flourished and reproduced, maybe it was thanks to the beak shape of that sparrow. If it matched the environment, it was advantageous.
        To have a certain beak shape or a certain color of plumage depended on an individual’s genetic code, not what it ate. Damage to a body does not impact your children in the same way. We see this with the man who lost an arm in war and later sires children who all are born with two arms each.
        Looking back, this seems obvious because we now know our genetic code lies in the DNA in the nucleus and the mitochondria of every cell of the human body. If we had only known about base pairs and the double helix and RNA at an earlier time, maybe our knowledge of genetic diseases and therapies as well as vaccines could be further along. In order to not fall behind, it is imperative to further our knowledge. Let’s sequence thewhole of the human genome and learn what DNA gives you red hair or good eyesight.


2     Law Enforcement and Detective Work

If the biologist is unbothered by the question of whether we even ought to know which DNA does what and whose DNA belongs to whom, then the detective inspector is positively against privacy. Think of how much faster we could solve crimes and apprehend culprits if we had a database of everyone’s fingerprints and DNA.
        In this ideal world, we would not have to wait until someone had a run-in with the law before we got their records. Forensics could visit any crime scene and compare any fingerprints against the fingerprints of every person on earth.
        DNA may break down over time if left out in the open, but you can take the cells, blood, hair follicles, and whatever else, and preserve them. Unlike fingerprints, DNA will never get smudged. If a bit of cells are there, then they are there. Early tests for DNA were like tests for fingerprints. If you only had access to a single right hand ring finger’s fingerprint, then that is all you had. It was likely that even if you nabbed the perpetrator and placed her in a pool of ten suspects, you would end up with two people whose right ring fingers resembled the sample fingerprint.
        A single coincidence is possible. Likewise, a simpler genetic test from the 1990s could also result in pointing to an innocent suspect. A full set of all ten fingerprints makes such a ‘collision’ practically impossible. Two fingers on two people could each bear a resemblance to a blurred fingerprint that Scotland Yard acquired. The odds of two persons sharing similar fingerprints across the same three fingers? Get out of town.
        Therefore, the best way to reliably find the ‘bad guys’ without missing one or accidentally fingering an innocent suspect is to get more information, be it more fingerprints or more refined DNA searches. No act of Parliament, however, has addressed exactly how this wonder-machine and DNA database would work. Computing resources are limited, and the UK police would benefit from the much more efficient processes of Undisclosed DNA.


3     Cryptographers

Cryptographic experts have usually formed the vanguard of the privacy advocates. They wanted to keep things secret, private, and secure. This meant they would often speak of plain text and encrypted text, or ‘cypher-text’ – and they also carried an antiauthoritarian bent. It is not for nothing that the people who implemented one certain communication protocol dubbed themselves ‘cypher-punks’.
        These mathematically gifted rebels naturally found the police approach distasteful in communication and in so-called biometrics, such as one’s genetic code. Differently from the biologists, they never wanted to map out entire things, be it a chromosome or a document. Breaking up messages, creating checks that never required one to know the original information, making the original information nearly impossible to recover, encrypting material so that only intended recipients could read it – these were the impulses of cryptographers.
        Along theway, they alsowanted to reduce computationalworkload – don’t we all! Fortunately for them and for us, maths and physics are on their side. You can make a key or a hash twice as long, which means twice as much work for the encryption, decryption, or act of hashing, but an exponential growth in difficulty for attackers. A key that is twenty digits long is harder to use than a key that is ten digits long, but it is over a thousand times harder to break for a spy.
        They also desired to make things unique. Making everything singular was an unalloyed good or had no negative impact – just implement it everywhere. This meant that no one would confuse two messages, two points of contact, or two conversations. The business and banking worlds also loved how advances in this field made many transactions and receipts impossible to forge.
        To the goals of Undisclosed DNA, however, the push for uniqueness added an exorbitant burden when analyzing genetic code. This required us to land on a two-step process.


4     Politicians

Legislators – be they members of Parliament, the Australian Senate, the US House of Representatives – have to balance the concerns of the citizens and the police with the need to lead in science. It is not uncommon for them to articulate impossible demands as a result.
        When it comes to digital communications, some have said that ‘we’ need to have unassailable encryption that keeps our communications safe and secure but to also have ways for government agents to listen in on the activities of the bad guys.
        This appears to make a certain kind of sense. When telephones were ubiquitous and before modern cryptography, we had a reasonable expectation of privacy on the telephone. Soviet agents could not pop in and record a conversation between you and your nan in Dublin. At the same time, it was possible for law enforcement to get a warrant and work with the telephone company to record calls between two suspected drug smugglers in Bristol.
        Digital security, however, is all or nothing. Because it relies on mathematical principles, an algorithm is either strong for everybody or weak for everybody. Other options also fail.
        Let’s say that we maintain strong algorithms, but include copies of every message sent or received and encrypt that with a special key that only MI5 possesses. This would double the computational workload and energy requirements of every communications device – and then where do we store these copies of messages? From a logitistics perspective, let alone an environmentally conscious one, this is a non-starter. Worst of all, having a single master key to unlock all communications in Britain would mean that one mistake, one leak, one hack, one accidental loss of the master key would expose every single Briton to espionage.
        In an effort to take advantage of the benefits for law enforcement, genetic research, medicine, and more, MPs in the UK have recently set out policies for recording the DNA of newborns. This presents a serious challenge to the privacy of an individual, sovereignty over one’s information, and protection from potential discrimination. In addition, we could end up forfeiting a powerful source of unique key encryption and still fail to give what the police may want, a usable directory of all persons in the UK.


5     Connecting the Groups

Undisclosed DNA uses two tools, the DNA Address and the private key, to satisfy both law enforcement and privacy advocates. Politicians can thread the needle by mandating the handling of genetic code in a way that protects the privacy of each person. Undisclosed DNA offers ways to accomplish this here and now so that a relevant law would be practicable.
        We use cutting-edge technology, but the underlying science has existed in the worlds of biologists and mathematicians for decades. As a result, our methods are not experimental or perpetually ‘just around the corner’.
        From biology, we know what DNA is, the various chromosomes, the mitochondria, and the four base pairs that form DNA. Genetic code is not a black box. We know exactly how each snippet relates to every other snippet. The downside is that it is more disastrous if someone can read your DNA code.
        With cryptographers, we have the know-how to make algorithms and formulas that tick the boxes we want. We can deploy maths that is easy in one direction but not another – i.e., not reversible – and at the same time we can speed up searches. Most significantly, we can differentiate near matches while still preserving privacy. Traditionally, cryptography has concerned itself with people who already know about each other or to conduct financial transactions or to be as unique as possible.
        The DNA Address brings us almost all the way there. It reduces the workload of matching millions of people’s DNA, an enormous computing burden. It is deterministic, needing only a single cell from your body to make a hash that will never change from birth to death.
        At this point, the computer whiz notices a serious and unaddressed obstacle: hash collisions. After whittling down the list of possibilities with the DNA Address, we have a shortlist of candidates, people who may (or may not) be related.
        Next, we look to the private keys of Undisclosed DNA. These will allow us to separate people who coincidentally share hashes.