In a pair of remarkably similar attacks, Princeton and Harvard employees were socially engineered, granting access to DBs with PII on hundreds of thousands of alumni, donors, students, faculty, parents, and staff (November 10+18, 2025). One employee in each case was tricked into granting full access to Alumni/Development records. Names, emails, phones, addresses, fundraising/biographical data across unrelated groups. Full scope unknown, probes ongoing. Zsub fixes this. No more "one employee hands out a password and opens the floodgates." - No password to give out, can require multiple attestations with verifications to get credentialed. - Even if granted, fraudulent access contained: attestations tied to specific uses and expire automatically via rotation, blocking pivots to other data. Actually zero trust, just like Bitcoin. Not your keys, not your network. Read our white paper.