Experience Ambient Trust
Use the workspace below naturally. Type, click, scroll - GrayPass silently captures your behavioral patterns and computes a continuous trust score.
How GrayPass works
GrayPass passively observes how you interact with any application. Every person types with a unique rhythm: characteristic dwell times, flight times between keys, correction cadences. These timing patterns form a behavioral fingerprint.
Pointer movements are equally distinctive. The micro-jitter from your hand tremor (8-12 Hz), your ballistic-to-corrective movement ratio, overshoot patterns, and click coupling timing are all personal signatures that are extremely difficult to replicate.
Scroll behavior varies between trackpad and mouse users. Inertia decay curves, burst timing, and direction-change patterns create another identity dimension.
Interaction rhythm captures how you think through a UI: pause durations, tab-switching cadence, the tempo of switching between typing and clicking. This higher-order signal reflects cognitive patterns, not just motor control.
All these signals combine into a continuous trust score. When the behavioral signature matches the enrolled user, trust stays high. When an attacker hijacks the session, uses remote access tools, or someone else sits down at the keyboard, the signature diverges and trust drops within seconds.
The key insight: GrayPass never sees what you type, what you browse, or what is on screen. It only observes timing statistics and movement dynamics. Privacy is enforced by architecture, not by policy.