Sedicii | About Us
Sedicii has developed and patented a technology based on the Zero Knowledge Proof Protocol.
page-template,page-template-full_width,page-template-full_width-php,page,page-id-13396,ajax_fade,page_not_loaded,,qode-title-hidden,qode-theme-ver-13.6,qode-theme-bridge,wpb-js-composer js-comp-ver-5.4.5,vc_responsive


Sedicii has developed and patented a technology based on the Zero Knowledge Proof Protocol that eliminates the transmission, storage and exposure of private user data during authentication or identity verification, which reduces identity theft, impersonation and any fraud resulting from the identity theft. Sedicii, adheres to the “Right To Be Forgotten” regulation and enables users to continue to consume digital services without sharing or exposing their private data. In essence, it means they can reclaim and control the use of their identity.



Rob Leslie

C.E.O. and Founder

A qualified electronics engineer with track-record of establishing successful businesses in Europe and Asia. His recent focus is with security / trust based technologies to address fraud / privacy areas. He has responsibility for product design, planning and implementation, whilst also supporting commercial efforts. Previously he was a founding team member of Dell Japan. he was also a partner in PTS in Japan which was acquired by Datacraft Asia as part of their entry into the Japanese market and he also co-founded Global Business Register which provides a single API for organisations required to perform corporate KYC compliance checks around the world


Richard Coady

Commercial Director

A qualified marketer with strong commercial skills in establishing and developing new market opportunities for new ventures. He has responsibility for defining the marketing communications, customer engagement and implementation support along with all commercial and pricing decisions to support both market needs and revenue growth. He has previously worked with BT, WBT Systems and Certiport


Stuart Hillston

Board Advisor

Acts as an advisor for entrepreneurial people in start-ups and high growth businesses. The capacity ranges from executive coaching through mentoring to board advisory and NED. He specialises in strategy, commercialisation, sales, investor readiness and investment for technology businesses in a wide range of sectors. He is also FCA registered for financial intermediary work which includes seed and series A funding for early stage businesses and high growth companies. He is focussed on companies with potential for high-growth particularly in digital, media, medical and wearable sectors.


Andy Honess

Board Advisor

An investor and advisor to the software industry. He is also a Mentor and Entrepreneur in Residence to several high profile tech start-up incubation and accelerator programmes. He is an experienced managing director, senior manager and leader in highly driven sales organisations. His specialisation is in rapid growth environments against a backdrop of consistent success in software sales across all industries and markets with a special interest in FinTech. He has broad leadership experience in startups to Nasdaq IPO companies and has strong ability in startup operations and managing cultural change in high growth organisations.


What is Zero Knowledge Proof?

The Zero Knowledge Proof (ZKP) authentication protocol is used in cryptography systems to allow a party to prove that he/she knows something (i.e. a credential), without having to transmit this credential. There are two parties involved in ZKP; the prover A and the verifier B. ZKP allows a prover A to show that they have the credential (for example, a credit card number or password), without having to give B the exact details of the credential. With Zero Knowledge Authentication there is no transmission or storage of password / credential hashes on the authentication server and the fundamental benefits of ZKP in the authentication process are as follows: •   Zero-knowledge: if the statement is true, the verifier will not know anything other than that the statement is true. Information about the details of the statement will not be revealed. •   Completeness: if the statement is true, the honest verifier (that is, one following the protocol properly) will be able to prove that the statement is true every time. •   Soundness: if the statement is false, it is almost impossible, to an astronomically small chance, that someone could fake the result to the verifier that the statement is true.

Privacy by Design

The theft of passwords, credit card details and other personal information is a massive financial and emotional drain on society generally. It is our view that much of this data could be removed from the system once the Sedicii technology is deployed. This means there is no longer any data of any value available to hackers to steal, which would eliminate billions of euros of fraud every year. We are not convinced that the direction the market appears to be taking, biometrics, is necessarily the correct one. One needs to ask the question – Is it wise to put people’s biometric data (fingerprints, voiceprints, retina patterns etc.) into the digital domain without putting in place first the necessary security measures to ensure this data does not get stolen? We need to bear in mind that you cannot reset a fingerprint. This is one of the strongest aspects of a password in that when something goes wrong, it can be reset. With Sedicii’s technology this data could be properly protected, keeping it private and not put at risk.

Passwords, Biometrics – what’s the problem?

The password is dead! Long live the password. Today we prove that we are who we say we are with a combination of what are known as factors of identity. These factors are “Something I know” like a PIN or  a password; “Something I have” like a mobile phone or a credit card; or “Something I am” like a fingerprint or facial scan. By combining different factors we are able to prove a person’s identity according different levels of assurance. With the rush to replace the password with other, stronger forms of identification, we risk creating a whole new category of problem. For all the faults of the password, it has one massive benefit. It can be reset. With a biometric, it cannot be changed. You only have 10 fingers, 2 eyes, 1 voice, 1 face and if any of these get stolen you are in trouble because someone can now prove they are you. Sedicii’s zero knowledge process can secure your biometric data so that you never have to share or expose it ever. This makes it much safer to interact and less likely that you will fall victim to a biometric identity theft.

Zero Knowledge Authentication

When a user logs in to a Sedicii enabled Authentication Service, using the ZKP protocol the authenticating server provides a series of challenges to the user’s browser, which are responded to with answers generated from a corresponding isomorphic graph that is created using the user’s private information. The user is only authenticated when all of the challenges are answered correctly and each time a login is attempted a different set of challenges are used. Once the user’s identity is authenticated, a user session is established and the user is allowed to login to the website. The same methodology can also be applied to credit card payment authorisations so that actual card details are never exposed over WIFI, or stored on a server, preventing theft and fraud.

Customer Centric Experience

Sedicii has looked at all our daily life interactions and created one consistent, standardised authentication solution that works the same way every time including web, phone and face to face. Furthermore, many scenarios require that an organisation also identify itself to their customer securely. When a customer visits your website or they need to talk to you on the telephone, or they need to make a secure payment Sedicii can take care of it securely without any fuss. The Sedicii service has been designed with people in mind to make things easy to do without sacrificing security for either the user or the business.

Future of Identity

Consumers want control of their identity. They want the ability to easily see where their identity resides and then to manage and curate it. If they no longer want it stored with a particular organisation they can request deletion. If the data is old they can request it be refreshed or just left as it is. With a tick in a box they can provide a consent to allow one organisation share their information with another organisation and maybe receive a reward for doing so. The reward might be in the form of a discount, loyalty points, air miles or even a cash payment. Sedicii envisions a world where every person is at the centre of their digital universe and is empowered to make decisions that they chose to make. Sedicii is putting the consumer back in control of their identity.