Security Lab
Cognitive Air-Gap Visual Workbench
Explore deterministic security mechanics through six interactive lenses: entropy waterfall, decoy similarity, stateless trace, attack simulation, identity radar, and OAuth trust levels.
1. Entropy Waterfall
Visualize attacker success probability collapsing as each deterministic domain is introduced.
Initial Attacker Success Chance100.0000%
2. Adversarial Distance Dashboard
Contextual decoys increase confusion for attackers while staying recognizable to the true user.
Traditional Bad KBA
Correct: apple
Decoy: zebra
Confusion Index: 0.0 / 100
IWISI Challenge
Correct: john.doe.7@gmail.com
Decoy: john.deo.7@gmail.com
Confusion Index: 90.0 / 100
3. Stateless Identity Trace
Nothing is stored, everything is reconstructed from the user seed.
1. UserId Input
→
2. SHA-256 Seed
→
3. API Fetch
→
4. Challenge Generation
4. Attack Vector Simulation
Attempts processed: 0/1000
Ready: click launch to run a 1,000-request brute-force simulation.
5. Identity Domain Radar
6. OAuth 2.0 Trust Level Gauge
Trust: Operational Trust (70%)
Suggested policy: allow read-only above 60%, require 95%+ for money movement or account recovery.