Security Lab

Cognitive Air-Gap Visual Workbench

Explore deterministic security mechanics through six interactive lenses: entropy waterfall, decoy similarity, stateless trace, attack simulation, identity radar, and OAuth trust levels.

1. Entropy Waterfall

Visualize attacker success probability collapsing as each deterministic domain is introduced.

Initial Attacker Success Chance100.0000%

2. Adversarial Distance Dashboard

Contextual decoys increase confusion for attackers while staying recognizable to the true user.

Traditional Bad KBA

Correct: apple

Decoy: zebra

Confusion Index: 0.0 / 100

IWISI Challenge

Correct: john.doe.7@gmail.com

Decoy: john.deo.7@gmail.com

Confusion Index: 90.0 / 100

3. Stateless Identity Trace

Nothing is stored, everything is reconstructed from the user seed.

1. UserId Input
2. SHA-256 Seed
3. API Fetch
4. Challenge Generation

4. Attack Vector Simulation

Attempts processed: 0/1000
Ready: click launch to run a 1,000-request brute-force simulation.

5. Identity Domain Radar

AutomotiveMediaGeographicDigitalFinancial

6. OAuth 2.0 Trust Level Gauge

Trust: Operational Trust (70%)

Suggested policy: allow read-only above 60%, require 95%+ for money movement or account recovery.