Skip to content
Longterm Wiki
Navigation
Updated 2026-02-05HistoryData
Citations verified3 accurate1 flagged9 unchecked
Page StatusContent
Edited 8 weeks ago1.1k words8 backlinksUpdated every 6 weeksOverdue by 14 days
60QualityGood •28.5ImportancePeripheral44.5ResearchLow
Content8/13
SummaryScheduleEntityEdit history1Overview
Tables2/ ~4Diagrams0Int. links3/ ~8Ext. links0/ ~5Footnotes13/ ~3References3/ ~3Quotes11/13Accuracy11/13RatingsN:8 R:7 A:7 C:5Backlinks8
Change History1
Extract wiki proposals as structured data#1417 weeks ago

Created two new data layers: 1. **Interventions** (broad categories): Extended `Intervention` schema with risk coverage matrix, ITN prioritization, funding data. Created `data/interventions.yaml` with 14 broad intervention categories. `InterventionCard`/`InterventionList` components. 2. **Proposals** (narrow, tactical): New `Proposal` data type for specific, speculative, actionable items extracted from wiki pages. Created `data/proposals.yaml` with 27 proposals across 6 domains (philanthropic, financial, governance, technical, biosecurity, field-building). Each has cost/EV estimates, honest concerns, feasibility, stance (collaborative/adversarial). `ProposalCard`/`ProposalList` components. Post-review fixes: Fixed 13 incorrect wikiPageId E-codes in interventions.yaml (used numeric IDs instead of entity slugs). Added Intervention + Proposal to schema validator. Extracted shared badge color maps from 4 components into `badge-styles.ts`. Removed unused `client:load` prop and `fundingShare` destructure.

Issues1
QualityRated 60 but structure suggests 87 (underrated by 27 points)

SecureDNA

Safety Org

SecureDNA

A Swiss nonprofit foundation providing free, privacy-preserving DNA synthesis screening software using novel cryptographic protocols.

TypeSafety Org
1.1k words · 8 backlinks

Quick Assessment

DimensionAssessmentEvidence
Focus AreaDNA synthesis screening technologyFree, privacy-preserving screening for synthesis providers worldwide1
FoundedNovember 2022 (Swiss Stiftung)Project originated 2019 at MIT Media Lab; incorporated in Zug, now Basel2
Key InnovationDOPRF cryptographic protocolScreens to 30bp while keeping both orders and hazard database confidential3
DeploymentOperational, globalValidated on 67M nucleotides from US, European, and Chinese providers4
Regulatory PositionAlready exceeds 2026 requirementsOSTP framework requires 50nt by October 2026; SecureDNA screens at 30bp5
Key ConcernAdoption metrics not publicNumber of onboarded providers not disclosed4

Overview

SecureDNA is a Swiss nonprofit foundation (Stiftung) that provides free DNA synthesis screening software to prevent the ordering of dangerous pathogen sequences. Co-founded by Kevin Esvelt and Turing Award winner Andrew Yao, the system uses a novel cryptographic protocol that allows screening without revealing either the customer's order or the contents of the hazard database—addressing the key tension between biosecurity and commercial confidentiality.1

The system screens orders down to 30 base pairs (bp and nt are used interchangeably in screening contexts, referring to the contiguous sequence window size), far exceeding current and planned US regulatory requirements (the OSTP framework requires 50 nucleotide minimum screening by October 2026). It generates millions of predicted functional variants of each known hazard to prevent evasion through sequence redesign, and uses patented reverse screening against non-hazard databases to achieve approximately zero false positives.3

SecureDNA is legally separate from but closely related to SecureBio—both were co-founded by Kevin Esvelt, but SecureDNA is specifically focused on the synthesis screening chokepoint while SecureBio works on the broader Delay/Detect/Defend framework. See the Biosecurity Interventions overview for how synthesis screening fits within the broader portfolio.

How It Works

The DOPRF Protocol

SecureDNA uses Distributed Oblivious Pseudorandom Functions (DOPRF), a cryptographic protocol that ensures neither party learns the other's secrets during screening:36

  1. Windowing: Each DNA order is broken into overlapping subsequences of 30 base pairs (also screens 20 amino acid peptides)
  2. Hashing and Blinding: Each subsequence is cryptographically hashed and "blinded by being raised to an arbitrary secret power"
  3. Distributed Key Server Encryption: The blinded hash passes through multiple independent keyservers, each applying an additional encryption layer. No single server can reconstruct the original sequence
  4. Unblinding and Comparison: Results are unblinded on-premises at the provider and compared against the encrypted hazard database

The hazard database is centrally maintained and rapidly updated when new threats are identified. Providers do not maintain local installations—they connect via REST API or web UI.1

What Gets Screened

The hazard database contains all known pathogens, BSAT and CCL listed agents, Australia Group/US ITAR/Chinese/EU regulated sequences, potential pandemic pathogens, and emerging threats. The system also generates millions of predicted functional variants of each hazard, specifically to prevent evasion through sequence mutation or AI-guided redesign.3

History

Origins at MIT (2019-2022)

The project originated in 2019 as an academic collaboration at MIT Media Lab's Sculpting Evolution group. The team deliberately avoided involving government employees or relying on government funding to maintain political neutrality and enable international adoption.2

Incorporation (2022)

SecureDNA Stiftung was incorporated on November 28, 2022, in Zug, Switzerland (CHE-269.863.420). The choice of Switzerland was deliberate—providing a neutral international jurisdiction. The registered office later moved to Basel in May 2024.2

Security Audit (December 2025)

An independent security audit by Sherman et al. (to appear at NDSS 2026) identified a vulnerability in SecureDNA's custom SCEP authentication protocol: it achieved only one-way authentication, meaning the hazard database and keyservers "never learn with whom they communicate." This could theoretically allow a malicious keyserver to bypass rate limits. SecureDNA v1.1.0 implemented the proposed SCEP+ protocol fix—requiring approximately five lines of code—which was formally verified to achieve mutual authentication.7

Team

Foundation Council

Andrew Yao
Foundation Council Member
2000 Turing Award winner; Dean of Interdisciplinary Information Sciences, Tsinghua University
Benjamin Mueller
Foundation Council President
Also Executive Director of SecureBio
Raphael Egger
Foundation Council Member
Attorney-at-Law, Egger Dommer Bar

Management: Jens Berlips (Project Manager), Dr. Leonard Foner (Software Architect and Security Lead), Kirsten Engel (Global Strategic Partnerships).8

Advisory board includes world-class cryptographers: Adi Shamir and Ron Rivest (RSA co-inventors), Vinod Vaikuntanathan (fully homomorphic encryption pioneer, Godel Prize winner), Ivan Damgård (Merkle-Damgård construction co-inventor), and Yu Yu (Shanghai Jiao Tong University). The 2024 technical paper had 63 authors from MIT, Aarhus University, Tsinghua University, Weizmann Institute, and others.86

The codebase is approximately 64,000 lines of Rust across 300 files.7

Deployment

SecureDNA does not publicly disclose specific adoption numbers. Known deployment details:4

  • Validation: 67 million base pairs of real-world DNA from providers in the US, Europe, and China
  • Geographic reach: "Diverse implementation" across multinational corporations, academic institutions, and specialized providers across North America, Europe, and Asia
  • Capacity: Claims ability to screen all gene synthesis orders in the world
  • Speed: Thousands of base pairs per second

Funding

SecureDNA is funded by "several generous donations from philanthropists in the United States, Europe, China, and elsewhere." The team deliberately avoided government funding.9

Coefficient Giving is listed as their only philanthropic collaborator. Indirect support flowed through grants to SecureBio (≈$9.4M total), which provided operational support during SecureDNA's development.9 An anonymous Chinese philanthropist donated to team members at Tsinghua University and Shanghai Jiao Tong University.2

Policy Relevance

OSTP Framework Compliance

RequirementOSTP FrameworkSecureDNA
Initial screening window200nt30bp (≈6.7x smaller window)
October 2026 window50nt30bp (already exceeds)
Sequence-based screeningRequiredYes, plus millions of functional variants
Customer verificationRequiredAPI integration + Exemption Certification System
Verifiable complianceRequired by May 2025 EOCryptographic proof of screening

The Trump administration's May 2025 Executive Order mandating "verifiable" screening mechanisms directly aligns with SecureDNA's cryptographic verification capabilities—providing "mathematically secure, unalterable proof of screening compliance."5

Known Limitations

Despite its technical sophistication, SecureDNA faces the same fundamental challenges as all screening approaches:

  • Fragment assembly bypass: Edison, Toner, and Esvelt (2026) demonstrated that short unregulated DNA fragments can be assembled to bypass screening entirely10
  • AI-designed evasion: Microsoft's "Paraphrase Project" showed AI protein design tools can generate functional toxin variants that evade homology-based screening11
  • Benchtop synthesizers: Desktop DNA synthesis devices could bypass centralized screening altogether12
  • Adoption gap: ≈20% of global synthesis capacity operates outside voluntary screening frameworks13

Key Questions

  • ?Can SecureDNA achieve near-universal adoption among DNA synthesis providers before benchtop synthesizers proliferate?
  • ?Will function-based screening (predicting what a protein does, not just what it looks like) become necessary as AI protein design tools improve?
  • ?How effective is the cryptographic privacy guarantee at encouraging adoption by providers who resist screening on IP grounds?
  • ?Will the regulatory vacuum following the Trump EO's rescission of the Biden framework help or hinder screening adoption?

Sources

Footnotes

  1. SecureDNA Official SiteSecureDNA Official Site 2 3

  2. MIT Media Lab — Secure DNA ProjectMIT Media Lab — Secure DNA Project; Moneyhouse — SecureDNA Stiftung 2 3 4

  3. SecureDNA FeaturesSecureDNA Features 2 3 4

  4. Citation rc-c959 2 3

  5. SecureDNA and the Executive Order on Biological Research SafetySecureDNA and the Executive Order on Biological Research Safety; SecureDNA and the OSTP Framework 2

  6. arXiv:2403.14023 — A system capable of verifiably and privately screening global DNA synthesisarXiv:2403.14023 — A system capable of verifiably and privately screening global DNA synthesis 2

  7. arXiv:2512.09233 — Security audit of SecureDNAarXiv:2512.09233 — Security audit of SecureDNA 2

  8. SecureDNA TeamSecureDNA Team 2

  9. SecureDNA FAQSecureDNA FAQ 2

  10. Citation rc-f42c

  11. Microsoft — The Paraphrase ProjectMicrosoft — The Paraphrase Project

  12. Citation rc-bc83

  13. IGSC market coverageIGSC market coverage

References

1arXiv:2512.09233 — Security audit of SecureDNAarXiv·Alan T. Sherman et al.·2025·Paper

A formal security audit of SecureDNA, a privacy-preserving biosecurity screening system that checks DNA synthesis orders against a hazards database using distributed oblivious pseudorandom functions. The authors identify two critical structural vulnerabilities—one-way authentication in the SCEP protocol enabling rate-limit circumvention, and inadequate cryptographic bindings enabling replay attacks—without breaking the underlying cryptography. Version 1.1.0 addresses these issues via the proposed SCEP+ protocol.

★★★☆☆
Claims (1)
SecureDNA v1.1.0 implemented the proposed SCEP+ protocol fix—requiring approximately five lines of code—which was formally verified to achieve mutual authentication.
Accurate100%Feb 22, 2026
Software Version 1.1.0 fixes SCEP with our proposed SCEP+ protocol.

This paper presents SecureDNA, a privacy-preserving system for screening DNA synthesis orders against a database of controlled sequences to prevent misuse of DNA synthesis technology. The system addresses the biosecurity challenge of preventing unauthorized synthesis of dangerous pathogens while maintaining customer privacy and enabling rapid updates to threat databases. The authors describe the system's architecture, demonstrate its operational performance on 67 million nucleotides synthesized across US, European, and Chinese providers, and show it can effectively identify problematic sequences while maintaining high specificity and protecting legitimate research.

★★★☆☆
Claims (1)
SecureDNA uses Distributed Oblivious Pseudorandom Functions (DOPRF), a cryptographic protocol that ensures neither party learns the other's secrets during screening:

This Nature Communications paper by Edison, Toner, and Esvelt demonstrates a critical vulnerability in U.S. DNA synthesis screening regulations. The authors show that current select agent regulations fail to prevent the acquisition of dangerous pathogens because they do not regulate individual DNA fragments—only complete sequences. By obtaining unregulated DNA fragments from multiple commercial providers, the researchers were able to collectively assemble genetic material sufficient for a skilled individual to synthesize the 1918 influenza virus. The paper argues that DNA fragments must be regulated as select agents to make synthesis screening effective and prevent potential biosecurity threats.

★★★★★
Claims (1)
- Fragment assembly bypass: Edison, Toner, and Esvelt (2026) demonstrated that short unregulated DNA fragments can be assembled to bypass screening entirely
Accurate100%Feb 22, 2026
U.S. select agent regulations ignore easily assembled DNA fragments, making synthesis screening ineffective regardless of accuracy.
Citation verification: 9 verified, 2 unchecked of 13 total

Related Wiki Pages

Top Related Pages

Organizations

Blueprint BiosecurityCoefficient Giving

Concepts

Biosecurity Orgs OverviewBiosecurity Overview