For a security system to be secure, it must be difficult. — Jeff Shiner, 1Password

<aside> <img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/3613f49f-bab2-49a7-9303-4c9c7c690695/Screen_Shot_2022-07-03_at_7.49.45_AM.png" alt="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/3613f49f-bab2-49a7-9303-4c9c7c690695/Screen_Shot_2022-07-03_at_7.49.45_AM.png" width="40px" /> At QuantumTags, we break the chain of counterfeiting with nanotechnology and deep learning.

</aside>

https://youtu.be/bkV4190UvmY

BREAK THE CHAIN - BREAK THE CHAIN - BREAK THE CHAIN


Navigation:


We Are Backed Up

<aside> <img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/c3259b67-d0d3-4e6b-9198-8b25f77cf6d9/Screen_Shot_2022-07-03_at_7.49.45_AM.png" alt="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/c3259b67-d0d3-4e6b-9198-8b25f77cf6d9/Screen_Shot_2022-07-03_at_7.49.45_AM.png" width="40px" /> QuantumTags are backed up with research, presentations and mockups allowing you to stay updated with the latest anti-counterfeiting advancements. We break the chain.

</aside>

Resources


The Breakdown

<aside> <img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/2ba1e556-39d0-4bde-8026-28f44138c627/Screen_Shot_2022-07-03_at_7.49.45_AM.png" alt="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/2ba1e556-39d0-4bde-8026-28f44138c627/Screen_Shot_2022-07-03_at_7.49.45_AM.png" width="40px" /> Understanding the ins-and-outs of QuantumTags relies on trusting the technology. From nanotech to AI, QuantumTags is a system. Read more about this system below.

</aside>

Nanotechnology

Nanotech makes QuantumTags unclonable.

We use quantum dots which emit light when light is shone upon them. Each quantum dot is unique and they are unclonable as QDs are created off of atomic randomness, meaning no attacker can replicate these QDs, their emitted light, their placement or their patterns.

QuantumTags are integrated into every product.

QuantumTags are integrated into every product.

Their three layers allow for multi-factor authentication.

Their three layers allow for multi-factor authentication.

The second and third layers contain Quantum Dots, authenticated by a smartphone.

The second and third layers contain Quantum Dots, authenticated by a smartphone.