Announcement

TideCloak Unshackles Developers from Security Worries


Major Organizations Among Early Adopters Reporting Freedom from Security Concerns

Tide Foundation, a frontier-tech cybersecurity startup, announces the launch of TideCloak, a groundbreaking Identity, Immunity, and Access Management system. TideCloak enables platform developers to escape the constant battle with hackers, allowing them to focus on building new features instead of endlessly plugging security holes. With its “breach-assumed” approach, TideCloak introduces a straightforward yet radical cybersecurity solution that future-proofs defenses using “Ineffable Cryptography,” an academically validated scientific breakthrough.

Early adopters, including major institutions, critical infrastructure providers, and AI startups are already leveraging TideCloak to transform their approach to security, offering a glimpse into a future where cybersecurity threats no longer impede innovation.

Developers are under mounting pressure as cybersecurity threats—both known and unknown—continue to rise. DevSecOps, the Zero-Trust model and countless security-by-design frameworks recognize that breaches are a matter of when, not if. Yet, today’s security environment offers little protection once an attacker gains high-level privileges, such as those of a system administrator—similar to introducing a virus into a body with no immune response.

“As developers ourselves, we know what it’s like to lose sleep over a new feature commit, hoping not to end up on TechCrunch for all the wrong reasons,” said Tide Co-Founder Michael Loewy. “We knew we needed an approach where the products we build could endure the inevitable breach, making it a non-issue.”
In an evolutionary leap, TideCloak provides developers with familiar, easy-to-use authentication and authorization capabilities to lock down systems but with a crucial underlying difference: platforms are immune against even the highest privilege breaches. This is made possible by Ineffable Cryptography, a breakthrough technology validated over years of academic research and now embedded in TideCloak allowing seamless integration into any digital platform.

Dr Matthew P Skerritt, a Mathematics and Cybersecurity Researcher at RMIT University, describes the technology: “Think of how an idea forms in the brain across many neurons. It isn’t held in any single neuron, so stealing ideas by grabbing a few neurons, is futile. Only the entire network of neurons—the brain—can express or comprehend that idea. Similarly, Ineffable Cryptography uses a network of servers to unlock data, making it virtually impossible for an attacker to steal or misuse the key, because there isn’t one to find.”

Ryan Saunders, Chief Information Security Officer at RMIT University, explains how RMIT became involved: “As a global university, we’re hyper aware of the ever-present cybersecurity  risks to our data and are always looking to the latest innovation to keep our community of users safe.

“Our partnership with Tide presented an opportunity to be involved in the evolution of technology through practical application, using research theory in a real-world scenario and using real-time data.

“This type of learning is part of RMIT’s DNA. Not only can we be part of the next step in technology and a paradigm shift in the way to approach security, but we are creating knowledge that can have impact in the world.”

Mr Saunders continued "We integrated TideCloak into one of our systems and quickly eliminated the worst-case scenario: a compromised administrator. In this instance, we have eliminated the opportunity for those with malicious intent to exploit even a super-user account in order to access our system and sensitive data. Best of all, there was no impact on the user experience."

On the developer experience, Mr Saunders added "Working with TideCloak’s standards-based OpenID Connect (OIDC) was seamless. It allowed us to use any programming language and environment while transitioning to a security model that not only addresses today’s threats but protects against the unknown threats of tomorrow."

Another TideCloak early adopter, Smart Building Services (SBS) Digital, which offers smart metering systems for industrial complexes, is also reaping the benefits. The company’s Chief Technology Officer, Jonathan Spinks, noted that in the face of growing geopolitical complexities, it was essential that entities servicing critical infrastructure such as airports and utilities could demonstrate they are beyond reproach.

“Integrating Tide’s decentralized solution ensures that access controls in SBS Digital’s utility platform are virtually immune to tampering, freeing us to focus on delivering an exceptional product,” said Spinks.

Tide has shared its foundational philosophy and technology in the op-ed Reimagining Cybersecurity. Developers can request alpha access here.

Recent News

Blog
4 Jun 2025

Ghost in the Network

Rethinking Cybersecurity with User-as-Key Architecture

Blog
19 May 2025

Treat the cause not the symptom

Another security patch. Another missed opportunity.

Blog
1 Jul 2025

Rethinking Cybersecurity

The future of cybersecurity for platform developers

Press
27 Mar 2025

Keys to Nowhere

Cryptography Revolution Thwarting Hackers

Press
6 Mar 2025

Scientist's take on Tide

2 min explainer on why cybersecurity is failing and Tide's approach to fix it

Press
20 Jan 2025

Sky News Feature

"Tide technology has potential to revolutionize cyber security"

Press
15 Jan 2025

Q&A with Co-founder Yuval Hertzog

Reimagining trust in the digital world.

Press
4 Nov 2024

Tide Win Tech Impact Award

Award for impact in transforming breaches into a non-issue.

Press
11 Mar 2024

Infrastructure Magazine Feature

New approach to securing critical infrastructure.

Press
23 Nov 2023

RMIT, Tide, AWS Collab Unveiled

Tide's "Ineffable Cryptography" to secure critical infrastructure

Blog
1 Jul 2025

Cybersecurity’s Kryptonite

It’s cybersecurity’s kryptonite: Why are you still holding it?

Blog
1 Jul 2025

Nature's key to cybersecurity’s future

How nature holds the key to cybersecurity’s future

Contact

Thanks for getting in touch. We'll get back to you as soon as possible!

Send another message