SecureDNA
- QualityRated 60 but structure suggests 80 (underrated by 20 points)
- Links1 link could use <R> components
Quick Assessment
Section titled “Quick Assessment”| Dimension | Assessment | Evidence |
|---|---|---|
| Focus Area | DNA synthesis screening technology | Free, privacy-preserving screening for synthesis providers worldwide1 |
| Founded | November 2022 (Swiss Stiftung) | Project originated 2019 at MIT Media Lab; incorporated in Zug, now Basel2 |
| Key Innovation | DOPRF cryptographic protocol | Screens to 30bp while keeping both orders and hazard database confidential3 |
| Deployment | Operational, global | Validated on 67M nucleotides from US, European, and Chinese providers4 |
| Regulatory Position | Already exceeds 2026 requirements | OSTP framework requires 50nt by October 2026; SecureDNA screens at 30bp5 |
| Key Concern | Adoption metrics not public | Number of onboarded providers not disclosed4 |
Overview
Section titled “Overview”SecureDNA is a Swiss nonprofit foundation (Stiftung) that provides free DNA synthesis screening software to prevent the ordering of dangerous pathogen sequences. Co-founded by Kevin Esvelt and Turing Award winner Andrew Yao, the system uses a novel cryptographic protocol that allows screening without revealing either the customer’s order or the contents of the hazard database—addressing the key tension between biosecurity and commercial confidentiality.1
The system screens orders down to 30 base pairs (bp and nt are used interchangeably in screening contexts, referring to the contiguous sequence window size), far exceeding current and planned US regulatory requirements (the OSTP framework requires 50 nucleotide minimum screening by October 2026). It generates millions of predicted functional variants of each known hazard to prevent evasion through sequence redesign, and uses patented reverse screening against non-hazard databases to achieve approximately zero false positives.3
SecureDNA is legally separate from but closely related to SecureBioSecurebioA biosecurity nonprofit applying the Delay/Detect/Defend framework to protect against catastrophic pandemics, including AI-enabled biological threats, through wastewater surveillance (Nucleic Acid ...Quality: 65/100—both were co-founded by Kevin Esvelt, but SecureDNA is specifically focused on the synthesis screening chokepoint while SecureBio works on the broader Delay/Detect/Defend framework. See the Biosecurity Interventions overview for how synthesis screening fits within the broader portfolio.
How It Works
Section titled “How It Works”The DOPRF Protocol
Section titled “The DOPRF Protocol”SecureDNA uses Distributed Oblivious Pseudorandom Functions (DOPRF), a cryptographic protocol that ensures neither party learns the other’s secrets during screening:36
- Windowing: Each DNA order is broken into overlapping subsequences of 30 base pairs (also screens 20 amino acid peptides)
- Hashing and Blinding: Each subsequence is cryptographically hashed and “blinded by being raised to an arbitrary secret power”
- Distributed Key Server Encryption: The blinded hash passes through multiple independent keyservers, each applying an additional encryption layer. No single server can reconstruct the original sequence
- Unblinding and Comparison: Results are unblinded on-premises at the provider and compared against the encrypted hazard database
The hazard database is centrally maintained and rapidly updated when new threats are identified. Providers do not maintain local installations—they connect via REST API or web UI.1
What Gets Screened
Section titled “What Gets Screened”The hazard database contains all known pathogens, BSAT and CCL listed agents, Australia Group/US ITAR/Chinese/EU regulated sequences, potential pandemic pathogens, and emerging threats. The system also generates millions of predicted functional variants of each hazard, specifically to prevent evasion through sequence mutation or AI-guided redesign.3
History
Section titled “History”Origins at MIT (2019-2022)
Section titled “Origins at MIT (2019-2022)”The project originated in 2019 as an academic collaboration at MIT Media Lab’s Sculpting Evolution group. The team deliberately avoided involving government employees or relying on government funding to maintain political neutrality and enable international adoption.2
Incorporation (2022)
Section titled “Incorporation (2022)”SecureDNA Stiftung was incorporated on November 28, 2022, in Zug, Switzerland (CHE-269.863.420). The choice of Switzerland was deliberate—providing a neutral international jurisdiction. The registered office later moved to Basel in May 2024.2
Security Audit (December 2025)
Section titled “Security Audit (December 2025)”An independent security audit by Sherman et al. (to appear at NDSS 2026) identified a vulnerability in SecureDNA’s custom SCEP authentication protocol: it achieved only one-way authentication, meaning the hazard database and keyservers “never learn with whom they communicate.” This could theoretically allow a malicious keyserver to bypass rate limits. SecureDNA v1.1.0 implemented the proposed SCEP+ protocol fix—requiring approximately five lines of code—which was formally verified to achieve mutual authentication.7
Management: Jens Berlips (Project Manager), Dr. Leonard Foner (Software Architect and Security Lead), Kirsten Engel (Global Strategic Partnerships).8
Advisory board includes world-class cryptographers: Adi Shamir and Ron Rivest (RSA co-inventors), Vinod Vaikuntanathan (fully homomorphic encryption pioneer, Godel Prize winner), Ivan Damgård (Merkle-Damgård construction co-inventor), and Yu Yu (Shanghai Jiao Tong University). The 2024 technical paper had 63 authors from MIT, Aarhus University, Tsinghua University, Weizmann Institute, and others.86
The codebase is approximately 64,000 lines of Rust across 300 files.7
Deployment
Section titled “Deployment”SecureDNA does not publicly disclose specific adoption numbers. Known deployment details:4
- Validation: 67 million base pairs of real-world DNA from providers in the US, Europe, and China
- Geographic reach: “Diverse implementation” across multinational corporations, academic institutions, and specialized providers across North America, Europe, and Asia
- Capacity: Claims ability to screen all gene synthesis orders in the world
- Speed: Thousands of base pairs per second
Funding
Section titled “Funding”SecureDNA is funded by “several generous donations from philanthropists in the United States, Europe, China, and elsewhere.” The team deliberately avoided government funding.9
Open PhilanthropyOpen PhilanthropyOpen Philanthropy rebranded to Coefficient Giving in November 2025. See the Coefficient Giving page for current information. is listed as their only philanthropic collaborator. Indirect support flowed through grants to SecureBioSecurebioA biosecurity nonprofit applying the Delay/Detect/Defend framework to protect against catastrophic pandemics, including AI-enabled biological threats, through wastewater surveillance (Nucleic Acid ...Quality: 65/100 (≈$9.4M total), which provided operational support during SecureDNA’s development.9 An anonymous Chinese philanthropist donated to team members at Tsinghua University and Shanghai Jiao Tong University.2
Policy Relevance
Section titled “Policy Relevance”OSTP Framework Compliance
Section titled “OSTP Framework Compliance”| Requirement | OSTP Framework | SecureDNA |
|---|---|---|
| Initial screening window | 200nt | 30bp (≈6.7x smaller window) |
| October 2026 window | 50nt | 30bp (already exceeds) |
| Sequence-based screening | Required | Yes, plus millions of functional variants |
| Customer verification | Required | API integration + Exemption Certification System |
| Verifiable compliance | Required by May 2025 EO | Cryptographic proof of screening |
The Trump administration’s May 2025 Executive Order mandating “verifiable” screening mechanisms directly aligns with SecureDNA’s cryptographic verification capabilities—providing “mathematically secure, unalterable proof of screening compliance.”5
Known Limitations
Section titled “Known Limitations”Despite its technical sophistication, SecureDNA faces the same fundamental challenges as all screening approaches:
- Fragment assembly bypass: Edison, Toner, and Esvelt (2026) demonstrated that short unregulated DNA fragments can be assembled to bypass screening entirely10
- AI-designed evasion: Microsoft’s “Paraphrase Project” showed AI protein design tools can generate functional toxin variants that evade homology-based screening11
- Benchtop synthesizers: Desktop DNA synthesis devices could bypass centralized screening altogether12
- Adoption gap: ≈20% of global synthesis capacity operates outside voluntary screening frameworks13
Key Questions (4)
- Can SecureDNA achieve near-universal adoption among DNA synthesis providers before benchtop synthesizers proliferate?
- Will function-based screening (predicting what a protein does, not just what it looks like) become necessary as AI protein design tools improve?
- How effective is the cryptographic privacy guarantee at encouraging adoption by providers who resist screening on IP grounds?
- Will the regulatory vacuum following the Trump EO's rescission of the Biden framework help or hinder screening adoption?