Skip to content

Zero-Trust + Quantum Security for Mobile

Michael Campbell, Steve Trevino, & Roy Stephan talk Zero-Trust and Quantum Security heading into SOF Week 2025

Michael Campbell

Michael Campbell

General Manager

Privoro

Steve Trevino headshot

Steve Trevino

Director Innovation & C5ISR

SOFtact Solutions (STS)

Roy headshot

Roy Stephan

Senior Solutions Architect

Quantinuum

Michael, can you give us a brief overview on how Privoro is turning commercial Samsung smartphones and tablets into secure tools, especially in high-risk environments where security really matters?

Michael Campbell

Our foundational solution was designed to meet the physical security requirements to allow an edge compute device – fancy name for a smartphone or tablet – to go in and out of classified work environments.  No more smartphone lockers or bans.  To do this we designed a solution that included physical risk mitigation, a shutter that covered the camera and jamming technology that blocked microphones for mobile devices used in classified environments. We continue to have success with that solution, and with more advanced organizations who needed the same level of security, and often more, but without those physical components.  Simplified and more capable.

 

In response, we worked with our partner, Samsung, to develop a hardware integrated solution that allows Privoro hardware, made in a secure facility here in the U.S., to physically control the smartphone via a hardware-to-hardware encrypted connection.

 

Instead of using shutters on the cameras, and noise blowing into the microphones, this integrated solution controls power to critical components such as the camera, microphones, and radios to physically neutralize security risks.   

 

A true Zero-Trust approach.

 

This innovation led to a product code named Slim, which evolved into the Onyx solution – an advanced chip-to-chip integration that provides enhanced security without traditional physical deterrents. 

 

Over the last 6 months, new customer requests emerged, particularly regarding support for multiple generations of devices and different form factors.

 

We first implemented support for the Samsung S23 and have expanded compatibility to include the Samsung S24 and future Samsung models. We are now working on supporting tablets, broadening the portfolio of mobile edge compute capabilities, and expansion to international Samsung phone models. 

Steve Trevino

Great update and incredible advancements, Michael. This latest convergence of Technical Power has certainly paved the way forward in safeguarding for today and establishing a solid platform for securing mobility devices in the future.  As adversaries of the US continue to evolve, we must ensure our solutions not only provide the level of security and reliability to meet today’s needs, but also have the ability to pivot, flex, and progress to mitigate risks down the road.

 

The cybersecurity landscape is becoming more complex, and the risks to mission-sets, along with sensitive operational data, have increased dramatically. Privoro’s ability to understand the environment and quickly respond to our customers’ needs with the latest innovation has set them apart. Their proactive development and relentless efforts in providing the most secure solutions solidified their credibility within the community.

Michael Campbell

Edge compute, enabled by End User Device or EUD, is highly valued, particularly in the field, where it plays a crucial role in operations. There’s an increasing demand for well-known command and control applications such as ATAK.  Plus, new requirements for AI, drones, and robotics on the edge, where secure data processing is essential, is already increasing the requirement for more edge compute.

 

The easiest way to enable this is by putting a Samsung smartphone or tablet in the hands of operators.  The commercial sector has already invested trillions into mobile device technology over decades and the military cannot hope to develop anything comparable to a commercial mobile device.

 

The problem is that these commercial smartphones come with inherent security risks. They were designed for tracking and data collection to make money via advertising, not for secure military applications. 

 

Cameras, microphones, and radios can all be used against us as the smartphone grows.

We understand that and our solution eliminates those risks, allowing smartphone use in securely sensitive environments by designing technology that meets warfighting requirements while maintaining operational effectiveness.  As the number of zero-trust devices increase, there are three critical components needed now, and one that needs to evolve.

 

First, physical control of the radios, cameras, microphones and support for multiple generations of devices and form factors are already available.  Second, back-end remote management to enable turning up and down risk management capabilities, while layering access to services not available directly on the device. Third, smart power and battery management tools.

 

A military fully embracing edge compute needs to prepare for quantum by preparing for a world where quantum capabilities will break existing commercial encryption sooner than people expect. We need to evolve now to stay ahead of that threat. That’s why we’re layering in quantum enhancements. This builds on what we’ve already done with zero trust, making it the next logical step.

 

Samsung smartphones and tablets are the edge compute solution that works today and tomorrow, and the focus is on removing the risks from existing commercial technologies and adapting them for secure military use. That’s what we’re doing – driving out risk, implementing zero trust, and now looking at quantum-enhanced security. 

Harvest Now, Decrypt Later.

Steve Trevino

Absolutely, Michael. The notion of “Harvest Now, Decrypt Later” is certainly a strategy our adversaries are using.  Our solutions must have the ability to establish a platform for the future. It is vital we continue to innovate and achieve victories within the Cybersecurity space that enable a Quantum solution ensuring mission success by protecting and reinforcing our networks. Privoro’s Zero Trust Mobility technology coupled with Quantinuum’s random number generator capability form a partnership of significant worth and is proving to be the “one of a kind” solution for the future in security. 

Roy Stephan

Quantum computing is a complete game changer, not just in terms of threats, but also in the opportunities it creates for security. We’re leveraging the power of quantum computing to improve and enhance security, reaching levels that were never possible in the classical world.

 

Those security enhancements apply all the way down to embedded devices in smartphones, like what Privoro is doing, and the need to address the longer-term threats around post-quantum cryptography. Our solution, Quantum Origin, is a quantum random number generator. It’s the first step toward leveraging quantum computing for security and protecting against threats to encryption keys. It’s also the world’s only NIST-validated software QRNG, which is a big deal for government and regulated industries. Our comprehensive approach to quantum security involves two steps. First is deploying Quantum Origin to strengthen randomness and increase key strength. The second step is implementing National Institute of Standards and Technology (NIST)-authorized post-quantum cryptographic algorithms to protect against algorithmic threats. Together, these create a complete quantum security foundation.

 

Our software-based approach allows us to integrate with companies and devices like Privoro quickly and easily. Legacy QRNG relies on hardware chips, which makes Quantinuum the only software-based QRNG provider. This gives us an enormous advantage in flexibility and speed. Additionally, we are designed to integrate seamlessly with existing NIST-approved cryptographic systems without requiring recertification, which saves time and money.

 

To summarize: quantum computing creates new opportunities to improve security while also introducing new threats. The first phase is our Quantum Origin solution, which leverages quantum computing to enhance existing security. The second phase involves implementing NIST algorithms to defend against quantum-based threats.

Steve Trevino

Thanks Roy, and welcome to the team. It’s been a great partnership with outstanding promise for the future. Your organization’s foresight, coupled with flexibility and agility, is proving to be an indispensable strength and vital to the team’s success. 

 

STS will continue to seek out the latest innovations and partnerships that fill gaps and facilitate on-the-ground needs of our customers and will continue relentless problem solving on behalf of our customers most difficult to solve tasks. We are thrilled to have you and your team on board and are excited to see how the Privoro/Quantinuum collaboration solves the problems of today and tomorrow.

 

We are looking forward to another great SOF Week and are extremely excited to highlight strategic partnerships combining strengths to solve our nation’s problems.

Stay tuned! Later this month, we will take a deep dive into Privoro and Quantinuum’s capabilities, exploring how they are addressing real challenges faced by warfighters today and preparing for the problems of the future.