top of page

Inside Fortytwo: Ideas, Insights & Innovation
Stay informed with the latest breakthroughs, media features, and product announcements from Fortytwo Labs. From cutting-edge advancements in π-Control to industry recognitions and collaborative milestones, this is where innovation meets impact.


Securing India's Financial Future: Why cryptography must be the core of BFSI cybersecurity
Smooth online financial transactions are the bedrock of ‘Digital India’, the flagship initiative of the Indian government to transform the country into a successful knowledge economy and a digitally empowered society. From the now ubiquitous Unified Payment Interface (UPI) or mobile banking to digital lending and AI-driven insurance, India’s Banking, Financial Services & Insurance (BFSI) industry is integrating technology at every aspect of its operations. Cracks in Today’
Nilesh Dhande
Oct 134 min read


RBI says no to OTPs & releasing new guidelines on principle-based authentication
Reserve Bank of India (RBI) Governor Shaktikanta Das, during the Monetary Policy Committee (MPC) meeting on February 8, 2023, suggested the adoption of a principle-based framework for Additional Factor of Authentication (AFA) in digital transactions. The aim is to enhance security and replace the widely used SMS-based OTP mechanism. This proposed framework will provide a mPlease provide the content you would like me to review, and I'll be happy to suggest any corrections or
Nilesh Dhande
Sep 305 min read


Secure Remote Access: Traditional VPN or VPNless Zero Trust Access?
In 2023, the great reset or the new normal of 2020 is now well established, and we are looking at the next normal, where the work-from-anywhere mindset stayed even after the Coronavirus pandemic. When all of a sudden, millions of employees started working remotely, enterprises the world over had no choice but to accelerate the pace of digitalisation. The urgency to “go remote” compelled them to lean into VPNs. But are VPNs security tools? And are VPNs meant for providing secu
Nilesh Dhande
Sep 294 min read


Quantum-Safe MFA Beyond "What You Know"
In an era where the digital world continues to expand, so do the threats that loom in cyberspace. Traditional multi-factor authentication methods, while once reliable, now find themselves outmatched by the ever-evolving sophistication of cyberattacks. But a security strategy that presents MFA as a stack of step-up authentication options only after a 2-way mutual authentication is done for digital identities and assets makes a mark to be infallible. This approach doesn't just
Nilesh Dhande
Sep 287 min read


Password based Authenticator Vs Cryptographic Authenticator - 12 Things to know
Password based authenticators are a widely used means of authentication for digital services. Examples of password based authenticators include a password, a pin, a secret question and answer, a one time password (OTP), offline OTP, transaction password, CVV, VBV. The password based authenticators have inherent vulnerabilities leading to cyber threats and attacks. An effective alternative to password based authenticators is Cryptographic authenticators to eliminate the vulner
Nilesh Dhande
Sep 272 min read


Quantum Computing's Crystal Ball: Unravelling Threats and PQC Shield
Introduction In the realm of technology, we humans are constantly pushing the boundaries of what is possible. One such frontier that has been gaining momentum is quantum computing. Unlike classical computers that rely on bits to represent data as either 0 or 1, quantum computers use quantum bits or qubits, which can exist in multiple states simultaneously. This revolutionary technology promises tremendous computational power, tackling complex problems that were once deemed un
Nilesh Dhande
Sep 265 min read


Why National Data, Networks, and Systems could be at Risk?
Renowned mathematician and cryptographer Daniel Bernstein has raised concerns about the collaboration between NIST and the NSA in defining post-quantum cryptography (PQC) standards. Bernstein has taken legal action, filing a lawsuit that highlights the lack of transparency in the selection process, which could potentially compromise global security systems. The lawsuit mirrors a past incident where NIST unknowingly standardized a flawed algorithm championed by the NSA. T he i
Nilesh Dhande
Sep 254 min read


Cryptography Conundrum!
Cryptography is pivotal in virtually every digital operation, ensuring security, privacy, and trust. Irrespective of the end points enterprise needs to implement the core tenets of security (Authentication, Confidentiality, Integrity, Provability and privacy). Let’s explore it through the lens of a simple example: Say your mobile app needs to send data out to a server, a good developer will take care of the following aspects - Authentication When an application communicates w
Nilesh Dhande
Sep 244 min read


A Call to Overhaul Authentication with Phishing Resistant I-AM MFA
It’s a wakeup call. The digital threats are looming larger than ever. Our common login systems that were once considered safe are now the Achilles’ heel of our digital defenses. The vulnerabilities of these traditional approaches are so in the face that they are sending shockwaves throughout the cybersecurity landscape. So much so that the US government published a comprehensive Cyber Safety Review Board (CSRB) report on July 24 to sound an urgent alarm for organizations to a
Nilesh Dhande
Sep 222 min read


How Race to Digital Killed the Identity in Every Transaction
Digital identity should never have an absolute shape, form, value, appearance, structure, format, display. Humans are capable of recognizing and validating an identity in distributed form. In fact, fundamental nature of any identity is that it is always distributed. A few computer technologists thought the absolute form of the identity should be an unrecognizable secret (the password) only known to the user. Well, they soon realized what gets typed on a machine is not a secre
Nilesh Dhande
May 302 min read


Future of Customer Identity: Password Free and Cryptographic
In 1961, when MIT was leading the computing activity and innovation in the world, their computer scientists, under the direction of the mastermind, Professor Fernando Corbató, built a giant Compatible Time-Sharing System (CTSS). The system allowed multiple users to access a shared mainframe. It was around the same time, passwords were born. When several users wanted their own private access to the terminals, Corbató created the first digital password as a problem-solver. The
Nilesh Dhande
May 305 min read


Why Adopt Distributed Ledger of Identities in Banking?
Blockchain as a technology has a potential to eliminate 99% of the time and risk involved in banking transactions. Because distributed ledger, the underlying framework of blockchain, approach takes away multiple steps involved in enabling a digital banking service due to reduced clutter of centralized identity management, banks are going to be benefitted with agility, high responsiveness to market demands and amazing digital experience. In essence this is a technology disrup
Nilesh Dhande
May 31, 20222 min read


22+ Banking Use Cases Transformed by Cryptographic Authentication
From OTP to CryptoID: A Shift in the Trust Paradigm Until recently, banks across the world relied heavily on One-Time Passwords (OTPs) and challenge–response (Ch-Re) methods for user authentication. While these mechanisms helped accelerate digital adoption, they’ve proven increasingly vulnerable to SIM-swap frauds, phishing, and deepfake impersonations . Post-2019, the paradigm has changed — from reactive authentication to cryptographically provable trust .Regulators and c
Nilesh Dhande
May 30, 20194 min read
Our Blogs


Embedding Trust in Every Digital Conversation
The π-Control Platform unites identity, authentication, authorization, confidentiality, provability, and privacy — creating the world’s most complete digital trust fabric.
bottom of page


























