From Curious Hacker to Cybersecurity Pioneer
Carl Hendrix’s fascination with technology began early, when he discovered the thrill of using systems in ways their creators had not intended.
—I realized quickly that I was not interested in using technology the way people told me to. I wanted to see what else it could do.
In school, his relentless questioning, “why does it have to be that way?”, often clashed with the rigid expectations of teachers.
—I passed my classes, but only just, he says. I preferred to explore my own projects over attending lessons.
At university, this same curiosity became an asset. Studying psychology at Lund University, Carl developed a deep understanding of human behavior, insights that would later merge with his technical instincts.
By then, he had already been working in tech for years, starting as a support technician and later becoming a system administrator.
—Computers made sense to me, they are logical, predictable… until you start messing with them in the right way.
His security career took off when a friend recruited him to WM-data, where he worked on defense projects for the Swedish Military Intelligence and Security Service (MUST) and the Swedish Police Authority.
Later, as a consultant and OT security specialist at Tetra Pak, he saw first-hand how industries protect their most critical systems.
The Spark: Challenging the Status Quo
Throughout his career, Carl noticed the same pattern: password leaks were becoming more frequent, vulnerabilities were piling up, and the so-called “fixes” were essentially the same as they had been for decades.
—We have been patching the same holes since the 1950s. It is just longer passwords, more characters – an arms race we will never win.”
It struck him that the real problem was not the length of the password, but its static nature. A stolen hash, the stored, scrambled version of a password, was like a sitting duck. Given enough time, attackers could crack it.
Carl began experimenting with an audacious idea: what if authentication was dynamic? What if the stored value was never the same twice, and expired almost instantly? After countless late nights, he cracked the problem, creating a system where a static input would generate a different, verifiable output every single time.
That breakthrough became P55, later branded P55 Nexus.
Breaking the Cycle
In a traditional system, when you log in, the server compares your password’s hash to the stored hash. If someone steals that stored value, they can work backwards to find your password or use pre-computed “rainbow tables” to guess it in microseconds.
—With P55, by the time you’ve stolen the key, it’s already dead.
With Dynakey, the output is dynamic. It is valid for only a second and usable only once.
Even if someone gets hold of it, it is already expired. There is no point trying to crack it, because it will never be valid again. And because every output is different, even quantum computers, designed to break today’s encryption, would not have time to breach it before it changed.
From Core Innovation to Real-World Use
At the heart of Carl’s technology is something he calls the P55 Nexus. It is a core engine that can take any static input and transform it into a dynamic output, unique to its source.
—If you have got a billion IoT devices, you have got a billion unique algorithms. Break one, the rest are still safe.
From this core, Carl began building a family of solutions.
P55 Dynakey was aimed at servers and authentication systems.
P55 QR took the same concept into one-time-use QR codes for devices like drones and smart bikes.
P55 Watermark embedded the approach into data itself, enabling tamper-proof integrity and origin verification, something increasingly critical for AI training data.
These were not just theoretical products.
Innoviguard has begun piloting them in real environments: securing communication with drones, preventing theft in connected bicycles, protecting AI gateways, and embedding watermarks into Android applications, together with some interesting clients.
The Quantum Challenge — and the Answer
One of the most powerful aspects of P55 is its resistance to quantum threats.
In the near future, quantum computers will be able to break today’s encryption standards with ease. But because P55’s keys exist only for seconds, or even fractions of a second, there simply is not enough time to crack them. Certificates can be replaced in minutes, ensuring quantum machines never get a foothold.
—Give every atom in the universe a supercomputer and have them all try to break P55… the universe would overheat before they got close, he says with a big smile.
A Vision for Ubiquity
Innoviguard’s vision is for P55 technology to become embedded everywhere, in every system, every device, every connection where security matters.
The company is focusing on its core competence, which is licensing the technology so others can integrate it into their products, while spinning off specialized companies for niche applications like P55 QR.
The potential is vast.
—Early market estimates put the one-year opportunity at around $10 million, with three-year projections in the tens of billions, and a long-term market in the trillions, says Carl.
Beyond commercial markets, P55 has clear dual-use potential, protecting both civilian and defense systems.
Why Innoviguard? Why Now?
Carl thrives in spaces where others have decided “that’s impossible.” The cybersecurity industry has long accepted incremental improvements to outdated models, assuming what worked in the past would work in the future. Innoviguard is challenging that assumption head-on, offering a completely new paradigm: dynamic, verifiable keys that expire before they can be compromised.
—We do not just make systems harder to break; we make it pointless to even try.
P55 is not just another security upgrade.
It is a fundamental shift in how we establish digital trust, one that could secure the connected world for decades to come.


