Unlocking Triangulated Security
How Branta's Cross Device QR Scan improves security by modeling mycelium
Mycelium-as-a-Model
Mycelium is a root-like structure of a fungus consisting of a mass of branching and thread-like hyphae. Hyphae are long, branching, structures fungi have that typically act as the main mode of vegetative growth. Through the mycelium, a fungus absorbs nutrients and mycelium can span thousands of acres and come together as an entire ecosystem. In this way, Mycelium functions as a highly decentralized and efficient network within the natural world and is known for its ability to connect vast networks of plants and trees and facilitating exchanges of nutrients, water, and even information about the environment. There is no central command, instead the individual hyphae respond to their immediate environment and then interact amongst each other to dispense information. This decentralized nature makes mycelium networks resilient to changes in the environment and enables survival of the system as a whole.
If a pest or disease attacks one area of the network, chemical signals are sent throughout the mycelial network to warn other areas so they can prepare their defense. This system in the natural world perfectly explains how systems in the digital world should be set up to mitigate attacks, and draws parallels to how Brandon Quittem compared Bitcoin to mycelium in his essay “Bitcoin is The Mycelium of Money.” With no single point of failure, a disease attacking mycelium will struggle to destroy the whole ecosystem. In the digital world, the analogy would be compromising one device (Pegasus, Spectre, etc) and trying to damage adjacent networks.
The philosophy of Branta, and specifically with Branta’s Cross Device QR Scan, is to eliminate single points of failure that can occur if a device or invoice were manipulated or hacked. Branta is a company that champions the idea of triangulated security by fortifying a network of accessible consensus.
The Power of Triangulated Security
Triangulated security means no single point of trust decides the outcome. This model follows the Zero Trust Architecture and never relies on one trust point but instead always verifies before acting. Branta pulls verification from multiple independent sources—your devices, the merchant storefront, and our own Guardrail service—to ensure every detail matches your intent. These sources are the mycelium webs that all pull information as a means of reaching consensus. If consensus is not reached, the transaction should not be initiated.
Without a network there cannot be triangulated security.
With Guardrail, Branta introduces an ephemeral network in a privacy-preserving, protocol-adjacent way.
No Logins, No Downloads
Our base assumption is ephemerality and zero trust. This mandates that Guardrail must operate without linking users to accounts or app-specific software, and must not retain data.
The sole purpose of Guardrail is to eliminate single points of failure. Therefore, the only piece of information Guardrail cares about is if the address displayed at checkout is the verified address.
If consensus, or confirmation, is received via the triangulation, the user is notified and may proceed with their purchase. No personal information was shared in this exchange. Just like Bitcoin only cares about processing its next block, Branta only cares about verifying the validity of an address that a customer will send funds to. No other information is important, and no other information is asked.
No Friction, All Speed
Commerce is fast, so is Branta.
Branta Cross Device QR Scan streamlines anonymous verification.
In an airport attempting a Bitcoin transaction? You’ll be presented the QR, BOLT-11/BOLT-12/Onchain address. Spare 1 second to verify, if you choose. This check reaches consensus if the address is approved by Guardrail, the business, and your device. The chance that all three options procured a false positive is extremely low
Want more consensus? Grab another device, open the camera, and verify. The device doesn’t track who you are, they’re simply another node in a secure, ephemeral network.
Networks are stronger when there is no single-point of failure.
Networks are stronger when there is no trust, just verification.
Networks are stronger through Branta.