Bravo
If ARM was an arm, BRN would be its biceps💪!
... and they didn't have room on the Table for cybersecurity?
That's the biggest fish in the biggest pond.
We started with QV a couple of years ago and announced a cybersecurity product using QV Cyberneuro-RT in January:
https://brainchip.com/brainchip-and-quantum-ventura-partner-to-develop-cyber-threat-detection/
Laguna Hills, Calif. – May 15, 2023 – BrainChip Holdings Ltd (ASX: BRN, OTCQX: BRCHF, ADR: BCHPY), the world’s first commercial producer of ultra-low power, fully digital, event-based, neuromorphic AI IP, announced today Quantum Ventura Inc., a San Jose-based provider of AI/ML research and technologies, will use BrainChip’s Akida™ technology to develop new cyber threat-detection tools.
https://finance.yahoo.com/news/brai...euromorphic-003500927.html?fr=sycsrp_catchall
LAGUNA HILLS, Calif., January 17, 2025--(BUSINESS WIRE)--BrainChip Holdings Ltd (ASX: BRN, OTCQX: BRCHF, ADR: BCHPY), the world’s first commercial producer of ultra-low power, fully digital, event-based, neuromorphic AI, today announced its integration into an innovative technology offering that leverages the Akida™ processor to provide cybersecurity protection for WiFi access, home router, small enterprise routers and other network access devices.
Quantum Ventura developed the CyberNeuro-RT (CNRT) technology offering in partnership with Lockheed Martin Co.’s MFC Division and Pennsylvania State University under partial funding from the U.S. Department of Energy.
Chelpis is providing an M2 PCB
https://www.chelpis.com/post/brainchip-collaborates-with-chelpis-mirle-on-security-solution
- May 2
LAGUNA HILLS, Calif.--(BUSINESS WIRE)--BrainChip Holdings Ltd (ASX: BRN, OTCQX: BRCHF, ADR: BCHPY), the world’s first commercial producer of ultra-low power, fully digital, event-based, neuromorphic AI, today announced that Chelpis Quantum Corp. has selected its Akida AKD1000 chips to serve as the processor for built-in post-quantum cryptographic security.
Chelpis, a chip company leading the Quantum Safe Migration ecosystem in Taiwan, is developing an M.2 card using the AKD1000 that can be inserted into targeted products to support their cryptographic security solutions. The M.2 card is based on a design from BrainChip along with an agreement to purchase a significant number of AKD1000 chips for qualification and deployment. Upon completion of this phase, Chelpis is planning to increase its commitment with additional orders for the AKD1000.
Chelpis is used in the Quantum Safe Migration Centre web page:
https://www.qsmc.org/
Research, Collaboration, and International Standardization
Conduct in-depth research on emerging international standardization trends and identify opportunities for academia and industry in Taiwan. Forge partnerships with global cryptographic standardization alliances and research institutions to actively participate in and contribute to the development of post-quantum cryptography standards. Become a key driving force in the international promotion of post-quantum cryptography standards.
Creation of Research and Development Investment, Subsidy, and Commercialization Platforms
Leverage resources from industry and government to select forward-looking and marketable research projects in Taiwan and international collaborations. Provide funding support and investment opportunities for research and development, and facilitate commercialization, knowledge transfer, and market promotion. Establish integrated software and hardware development platforms, ensuring a high-quality hardware technology supply chain and collective engagement in cutting-edge cryptographic research.
Strengthening Post-Quantum Cryptography Resilience in Taiwan
Assess government agencies, critical infrastructure, and public services to prioritize the adoption of post-quantum security technologies. Implement enhanced post-quantum cryptography systems based on the confidentiality lifespan and longevity of publicly transmitted content. Establish a contingency mechanism for post-quantum cryptography.
Research and Development of Quantum-Resistant Chips
Become one of the global centers for manufacturing cryptographic applications, continuously providing more efficient, secure, stable, and low-power consumption cryptographic systems to the world.
KyberSlash:
Exploiting secret-dependent division timings in Kyber implementations
This paper presents KyberSlash1 and KyberSlash2 – two timing vulnerabilities in several implementations (including the official reference code) of the Kyber Post-Quantum Key Encapsulation Mechanism, currently undergoing standardization as ML-KEM. We demonstrate the exploitability of both KyberSlash1 and KyberSlash2 on two popular platforms: the Raspberry Pi 2 (Arm Cortex-A7) and the Arm Cortex-M4 microprocessor. Kyber secret keys are reliably recovered within minutes for KyberSlash2 and a few hours for KyberSlash1.
This gives us a toe-in-the-water exposure to a network of cryptographic research organizations which will surely be keen on cybersecurity. If cyber key recovery is within Akida's purview, having a silicon solution for identifying cyber keys may be right up Akida's alley. Combined with cyber attack detection, it would be a one-stop cybersecurity solution.
Yes, and with the growing frequency and sophistication of cyberattacks targeting edge devices, such as the recent “ViciousTrap” incident that compromised over 5,500 endpoints (see below), the need for advanced, adaptive cybersecurity solutions like the one you’ve outlined is more pressing than ever.
As the threat landscape continues to evolve, it’s entirely plausible that innovations like this will play a pivotal role in safeguarding our increasingly interconnected digital ecosystem.
Just imagine if every edge device required this kind of intelligence built in. That wouldn’t just apply to mobile or IoT endpoints but also extends to fixed infrastructure like routers, access points, and gateways. That’s a massive number of devices ripe for protection, and an enormous market opportunity waiting to be captured!

ViciousTrap Hacker Compromised 5,500+ Edge Devices From 50+ Brands & Turned Them Into Honeypots
A sophisticated threat actor designated as ViciousTrap has successfully compromised over 5,500 edge devices across more than 50 brands, transforming them into a massive distributed honeypot network capable of intercepting and monitoring exploitation attempts worldwide. This unprecedented...
