SlideShare a Scribd company logo
1 of 11
Download to read offline
Roberto Tinelli
Lorenzo Rossi
Michele Mascherpa
Alessia Pisano
Maximilian Kullmann
Christian Knoll
Biological Cryptography
Bio-Graphy
1
On Average, every data breach
costs a company $3,9 mln
Datatheft is common practice
Every second, 44 personal
records are being stolen
Cyber warfare is a growing
concern for governments
2
Add a second layer of security
Using a biological process
 Folding data into proteins; accessed only by the respective user
 Offsets any potential damage that would derive from a breach
 Vital data unusable for unauthorized actors
How are we going to change this?
3
private and state-sponsored cyber crime
protecting your intellectual property
original message
Folding Process
Computational alogrithmc
Using a protein database
4
«Il nostro progetto si chiama biography e mira a
sviluppare un nuovo approccio crittografico utilizzando
la struttura terziaria delle proteine come vettore
dell’informazione»
Mind blowing:
The possible combination of
a 64 characters Bio-Graphy
message are more than the
total amount of atoms in
the entire universe.
Quaternary protein structure
Possible applications:
 message, database and
identification
Application
of Method
5
c
c
Main field of application:
 Folder and file encryption
(e.g. blueprints)
Governmetal Agencies
Military / Defense
Medium and LargeCorporations
 Implementation for securing medical
data or credit card information
Key
Customers
6
Licensing process to companies
Sell unique database to particular customers
Maintainance of software
Revenue
Generation
Creating and Capturing Value
Market and its
Barriers to Entry
Creation of basis for
encryption needs
HPC
...
rental is expensive;
alternative mvp
database can be
generated within
monthsHPC: High Performance Computing:
Google Cloud TPU from $24/h or $136k/year
Depending strongly
on performance of
our process (trust)
...
ho w to achive
reputation/ trust in
competitive
market?
7
High Start-up
cost
Brand
Recognition
Encryption Software
Market
Expected growth: ~16% CAGR
Expected market size:
estimate 1: $2.5 bn in 2021
estimate 2: $16.5 bn in 2024
Competitive
Advantage Computational demand to hack
Common PC not able to conduct
unfolding of proteins, raising the bar for
adversary actors
Superiority in # combinations
20n combinations of folding a protein are
possible
 Just a short plaintext of 60 characters has
as many possible combinations as the
advanced encryption standard
AES (256-bit)
n = number of characters in a plaintext
n = 33.000 can be reached
over direct competition –
encryption standards
(AESand RSA)
8
Did you know? Accessing only parts of an
encrypted information is not possible with the
current encryption standards.
9
Financial Projections for 2020
Sources of funding:
 Academic fundings
 Generated revenue through trials
Projected: 25.000 €
 Private investment (Partnership)
(depending on investment model)
Arrising costs:
Acquisition of licenses:
Rosetta license for Beta version ~ 5.000€
Additional Staff:
 software developers: 24.960 €
Marketing & Sales:
 cost related to travel expenses,
participation to fairs and website: 22.000 €
Patents – if deemed necessary:
 EU patent 7.320 € / International patent 9.150 €
Base for final software product
Road to 2020 including Beta
software and creation of
partnership
Timeline and Expert support
Feedback and Support from… Prof.M.Vendruscolo
(UniversityofCambridge)
10
Prof.Colombo
UniversityofPavia
ComputationalBiochemestry
Prof. F. Forneris
UniversityofPavia
StrucutralBiology
„Èun‘idea tanto rischiosa quanto
originale. Por questo avrà successo“
MVP protein
base with
Rosetta
mid Q2 2020
Prof. F. Roli
(University of Cagliari)
Testing of
database
and matching
end Q2 2020
Partner search
and negotiations
Q4 2020
Own, indepen-
dent database
Q4 2021
Meet the team
11
Alessia
Pisano
Lorenzo
Rossi
Michele
Mascherpa
Roberto
Tinelli
Maximilian
Kullmann
Christian
Knoll
Phone: +39 389 980 5965
Mail: Biological.Criptography@gmail.com
linkedIn: https://linkedin.com/company/bio-graphy

More Related Content

What's hot

What's hot (17)

2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2 nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
 
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
 
PAPER SUBMISSION -9th International Conference on Mobile & Wireless Networks ...
PAPER SUBMISSION -9th International Conference on Mobile & Wireless Networks ...PAPER SUBMISSION -9th International Conference on Mobile & Wireless Networks ...
PAPER SUBMISSION -9th International Conference on Mobile & Wireless Networks ...
 
Gsc mstf m_koster_atlanta_may_7_2013_rev1.1
Gsc mstf m_koster_atlanta_may_7_2013_rev1.1Gsc mstf m_koster_atlanta_may_7_2013_rev1.1
Gsc mstf m_koster_atlanta_may_7_2013_rev1.1
 
Call for papers - 10th International Conference on Mobile & Wireless Networks...
Call for papers - 10th International Conference on Mobile & Wireless Networks...Call for papers - 10th International Conference on Mobile & Wireless Networks...
Call for papers - 10th International Conference on Mobile & Wireless Networks...
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
 
Big Crypto for Little Things
Big Crypto for Little ThingsBig Crypto for Little Things
Big Crypto for Little Things
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
 
Vicinity glo tsummit yajuan guan
Vicinity glo tsummit yajuan guanVicinity glo tsummit yajuan guan
Vicinity glo tsummit yajuan guan
 
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
2nd International Conference on Cloud, Big Data and IoT (CBIoT 2021)
 
Call for papers - International conference on networks, blockchain and intern...
Call for papers - International conference on networks, blockchain and intern...Call for papers - International conference on networks, blockchain and intern...
Call for papers - International conference on networks, blockchain and intern...
 
Ncwmc ppt
Ncwmc pptNcwmc ppt
Ncwmc ppt
 
Granular or holistic approaches 210126 Alejandra Ruiz
Granular or holistic approaches 210126 Alejandra RuizGranular or holistic approaches 210126 Alejandra Ruiz
Granular or holistic approaches 210126 Alejandra Ruiz
 
Antonio kung impact of ai on privacy sept 10
Antonio kung impact of ai on privacy   sept 10Antonio kung impact of ai on privacy   sept 10
Antonio kung impact of ai on privacy sept 10
 
13th International Conference on Wireless, Mobile Network and Applications (W...
13th International Conference on Wireless, Mobile Network and Applications (W...13th International Conference on Wireless, Mobile Network and Applications (W...
13th International Conference on Wireless, Mobile Network and Applications (W...
 
13th International Conference on Wireless, Mobile Network and Applications (W...
13th International Conference on Wireless, Mobile Network and Applications (W...13th International Conference on Wireless, Mobile Network and Applications (W...
13th International Conference on Wireless, Mobile Network and Applications (W...
 

Similar to Bio-Graphy pitch

A Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity EducationA Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity Education
ijtsrd
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
PECB
 

Similar to Bio-Graphy pitch (20)

PolySwarm Token Review
PolySwarm Token Review PolySwarm Token Review
PolySwarm Token Review
 
Introduction to new technologies
Introduction to new technologiesIntroduction to new technologies
Introduction to new technologies
 
FESE Capital Markets Academy - New technologies
FESE Capital Markets Academy - New technologiesFESE Capital Markets Academy - New technologies
FESE Capital Markets Academy - New technologies
 
2008 Trends
2008 Trends2008 Trends
2008 Trends
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.ppt
 
Protecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACAProtecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACA
 
Cyber Defense: three fundamental steps
Cyber Defense: three fundamental stepsCyber Defense: three fundamental steps
Cyber Defense: three fundamental steps
 
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
 
ICT Resilience in EU
ICT Resilience in EUICT Resilience in EU
ICT Resilience in EU
 
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server
 
CYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptxCYBERCRIME INVESTIGATION AND ANALYSIS.pptx
CYBERCRIME INVESTIGATION AND ANALYSIS.pptx
 
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
 
Software Piracy Protection
Software Piracy ProtectionSoftware Piracy Protection
Software Piracy Protection
 
A 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care ProvidersA 2020 Security strategy for Health Care Providers
A 2020 Security strategy for Health Care Providers
 
NICANTI BARCODE SECURITY AND BRAND PROTECTION PRINTING SYSTEM
NICANTI  BARCODE SECURITY AND BRAND PROTECTION PRINTING SYSTEMNICANTI  BARCODE SECURITY AND BRAND PROTECTION PRINTING SYSTEM
NICANTI BARCODE SECURITY AND BRAND PROTECTION PRINTING SYSTEM
 
A Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity EducationA Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity Education
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
 
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technology
 

More from polotecnologicopv

More from polotecnologicopv (17)

Umiles pitch
Umiles pitchUmiles pitch
Umiles pitch
 
Shabosh pitch
Shabosh pitchShabosh pitch
Shabosh pitch
 
Safer pitch
Safer pitchSafer pitch
Safer pitch
 
Netabolics pitch
Netabolics pitchNetabolics pitch
Netabolics pitch
 
Ineed pitch
Ineed pitchIneed pitch
Ineed pitch
 
Alma Tek pitch
Alma Tek pitchAlma Tek pitch
Alma Tek pitch
 
Tropicalina pitch
Tropicalina pitchTropicalina pitch
Tropicalina pitch
 
Talkeeng pitch
Talkeeng pitchTalkeeng pitch
Talkeeng pitch
 
Pharmacare pitch
Pharmacare pitchPharmacare pitch
Pharmacare pitch
 
Jojolly pitch
Jojolly pitchJojolly pitch
Jojolly pitch
 
Hearth pitch
Hearth pitchHearth pitch
Hearth pitch
 
Gustavo pitch
Gustavo pitchGustavo pitch
Gustavo pitch
 
Feedon pitch-finale
Feedon pitch-finaleFeedon pitch-finale
Feedon pitch-finale
 
ELIO pitch finale
ELIO pitch finaleELIO pitch finale
ELIO pitch finale
 
Lumentile pitch finale
Lumentile pitch finaleLumentile pitch finale
Lumentile pitch finale
 
1clickfashion pitch-finale
1clickfashion pitch-finale1clickfashion pitch-finale
1clickfashion pitch-finale
 
Cikìs - pitch finale
Cikìs - pitch finaleCikìs - pitch finale
Cikìs - pitch finale
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Bio-Graphy pitch

  • 1. Roberto Tinelli Lorenzo Rossi Michele Mascherpa Alessia Pisano Maximilian Kullmann Christian Knoll Biological Cryptography Bio-Graphy 1
  • 2. On Average, every data breach costs a company $3,9 mln Datatheft is common practice Every second, 44 personal records are being stolen Cyber warfare is a growing concern for governments 2
  • 3. Add a second layer of security Using a biological process  Folding data into proteins; accessed only by the respective user  Offsets any potential damage that would derive from a breach  Vital data unusable for unauthorized actors How are we going to change this? 3 private and state-sponsored cyber crime protecting your intellectual property
  • 4. original message Folding Process Computational alogrithmc Using a protein database 4 «Il nostro progetto si chiama biography e mira a sviluppare un nuovo approccio crittografico utilizzando la struttura terziaria delle proteine come vettore dell’informazione» Mind blowing: The possible combination of a 64 characters Bio-Graphy message are more than the total amount of atoms in the entire universe.
  • 5. Quaternary protein structure Possible applications:  message, database and identification Application of Method 5 c c Main field of application:  Folder and file encryption (e.g. blueprints)
  • 6. Governmetal Agencies Military / Defense Medium and LargeCorporations  Implementation for securing medical data or credit card information Key Customers 6 Licensing process to companies Sell unique database to particular customers Maintainance of software Revenue Generation Creating and Capturing Value
  • 7. Market and its Barriers to Entry Creation of basis for encryption needs HPC ... rental is expensive; alternative mvp database can be generated within monthsHPC: High Performance Computing: Google Cloud TPU from $24/h or $136k/year Depending strongly on performance of our process (trust) ... ho w to achive reputation/ trust in competitive market? 7 High Start-up cost Brand Recognition Encryption Software Market Expected growth: ~16% CAGR Expected market size: estimate 1: $2.5 bn in 2021 estimate 2: $16.5 bn in 2024
  • 8. Competitive Advantage Computational demand to hack Common PC not able to conduct unfolding of proteins, raising the bar for adversary actors Superiority in # combinations 20n combinations of folding a protein are possible  Just a short plaintext of 60 characters has as many possible combinations as the advanced encryption standard AES (256-bit) n = number of characters in a plaintext n = 33.000 can be reached over direct competition – encryption standards (AESand RSA) 8 Did you know? Accessing only parts of an encrypted information is not possible with the current encryption standards.
  • 9. 9 Financial Projections for 2020 Sources of funding:  Academic fundings  Generated revenue through trials Projected: 25.000 €  Private investment (Partnership) (depending on investment model) Arrising costs: Acquisition of licenses: Rosetta license for Beta version ~ 5.000€ Additional Staff:  software developers: 24.960 € Marketing & Sales:  cost related to travel expenses, participation to fairs and website: 22.000 € Patents – if deemed necessary:  EU patent 7.320 € / International patent 9.150 € Base for final software product Road to 2020 including Beta software and creation of partnership
  • 10. Timeline and Expert support Feedback and Support from… Prof.M.Vendruscolo (UniversityofCambridge) 10 Prof.Colombo UniversityofPavia ComputationalBiochemestry Prof. F. Forneris UniversityofPavia StrucutralBiology „Èun‘idea tanto rischiosa quanto originale. Por questo avrà successo“ MVP protein base with Rosetta mid Q2 2020 Prof. F. Roli (University of Cagliari) Testing of database and matching end Q2 2020 Partner search and negotiations Q4 2020 Own, indepen- dent database Q4 2021
  • 11. Meet the team 11 Alessia Pisano Lorenzo Rossi Michele Mascherpa Roberto Tinelli Maximilian Kullmann Christian Knoll Phone: +39 389 980 5965 Mail: Biological.Criptography@gmail.com linkedIn: https://linkedin.com/company/bio-graphy