No human? No access.
Dydema makes that enforceable.

Wear the device to keep access live. Take it off, and access ends.
Dydema enforces human presence for privileged access, without surveillance.



The problem

Most security systems authenticate once, at the start of a session.Passwords, MFA, and device checks decide who is allowed in. After that, the system assumes a human stays present and in control. That assumption no longer holds.AI agents now operate inside secure sessions. Privileged access stays open after the human steps away. Scripts and agents keep executing. When something breaks, there’s no clear signal of whether a human was actually there.The missing control here isn’t stronger authentication. It’s a way to require and verify human presence at the moment high-risk actions occur, not just when access is granted.


What is Dydema?

Dydema is a control layer that enforces human presence for privileged access.It works by verifying that a real human is physically present at the moment sensitive actions occur. Dydema uses live physiological signals generated by the body and gates access in real time. If the signals stop, access stops.Dydema is low-friction. There are no prompts to click, no puzzles to solve, and no screens to monitor.Our current prototype is a lightweight wearable that measures signals such as electroencephalography (EEG), electrodermal activity (EDA), and heart rate variability (HRV). These signals are evaluated together to confirm live wear and continuous human presence.Dydema integrates as an enforcement layer alongside existing security systems. It doesn’t replace authentication or change how people work. It simply ensures that privileged sessions, commands, or workflows remain active only while a human is actually there.


Safety and Privacy

Dydema is built to enforce human presence, not to surveil people.The system answers one question only: is a live human physically present right now? Dydema does not measure attention, emotion, cognition, intent, or behavior.All physiological data is processed in de-identified form, and the system is not designed to track individuals or monitor behavior across contexts.


Where we start

We’re starting with a small number of tightly scoped, high-risk environments (like privileged SSH access) where it's critical to know that a human is present and supervising.These early deployments let us validate enforcement, reliability, and auditability under real operating conditions, with real consequences.From there, Dydema expands as a control layer and API that enterprises can integrate into their own systems without replacing existing identity, MFA, or access infrastructure.Initial roadmap:
- Ship and validate the first production-ready wearable
- Run private pilots enforcing presence on specific privileged workflows
- Generalize the presence API for partner and enterprise integrations
If you want to follow progress or explore early access, join our updates list. We’ll share concrete milestones as we move toward production deployment.


Help us build dydema

Sharing your email helps us gauge interest in Dydema.It’s optional, and we’ll never spam or share your info.

© 2025 Dydema. All rights reserved.