Femtech hardware startup Elvie inks strategic partnership with UK’s NHS

Elvie, a femtech hardware startup whose first product is a sleek smart pelvic floor exerciser, has inked a strategic partnership with the UK’s National Health Service that will make the device available nationwide through the country’s free-at-the-point-of-use healthcare service so at no direct cost to the patient. It’s a major win for the startup that was […]

Elvie, a femtech hardware startup whose first product is a sleek smart pelvic floor exerciser, has inked a strategic partnership with the UK’s National Health Service that will make the device available nationwide through the country’s free-at-the-point-of-use healthcare service so at no direct cost to the patient.

It’s a major win for the startup that was co-founded in 2013 by CEO Tania Boler and Jawbone founder, Alexander Asseily, with the aim of building smart technology that focuses on women’s issues — an overlooked and underserved category in the gadget space.

Boler’s background before starting Elvie (née Chiaro) including working for the U.N. on global sex education curriculums. But her interest in pelvic floor health, and the inspiration for starting Elvie, began after she had a baby herself and found there was more support for women in France than the U.K. when it came to taking care of their bodies after giving birth.

With the NHS partnership, which is the startup’s first national reimbursement partnership (and therefore, as a spokeswoman puts it, has “the potential to be transformative” for the still young company), Elvie is emphasizing the opportunity for its connected tech to help reduce symptoms of urinary incontinence, including those suffered by new mums or in cases of stress-related urinary incontinence.

The Elvie kegel trainer is designed to make pelvic floor exercising fun and easy for women, with real-time feedback delivered via an app that also gamifies the activity, guiding users through exercises intended to strengthen their pelvic floor and thus help reduce urinary incontinence symptoms. The device can also alert users when they are contracting incorrectly.

Elvie cites research suggesting the NHS spends £233M annually on incontinence, claiming also that around a third of women and up to 70% of expectant and new mums currently suffer from urinary incontinence. In 70 per cent of stress urinary incontinence cases it suggests symptoms can be reduced or eliminated via pelvic floor muscle training.

And while there’s no absolute need for any device to perform the necessary muscle contractions to strengthen the pelvic floor, the challenge the Elvie Trainer is intended to help with is it can be difficult for women to know they are performing the exercises correctly or effectively.

Elvie cites a 2004 study that suggests around a third of women can’t exercise their pelvic floor correctly with written or verbal instruction alone. Whereas it says that biofeedback devices (generally, rather than the Elvie Trainer specifically) have been proven to increase success rates of pelvic floor training programmes by 10% — which it says other studies have suggested can lower surgery rates by 50% and reduce treatment costs by £424 per patient head within the first year.

“Until now, biofeedback pelvic floor training devices have only been available through the NHS for at-home use on loan from the patient’s hospital, with patient allocation dependent upon demand. Elvie Trainer will be the first at-home biofeedback device available on the NHS for patients to keep, which will support long-term motivation,” it adds.

Commenting in a statement, Clare Pacey, a specialist women’s health physiotherapist at Kings College Hospital, said: “I am delighted that Elvie Trainer is now available via the NHS. Apart from the fact that it is a sleek, discreet and beautiful product, the app is simple to use and immediate visual feedback directly to your phone screen can be extremely rewarding and motivating. It helps to make pelvic floor rehabilitation fun, which is essential in order to be maintained.”

Elvie is not disclosing commercial details of the NHS partnership but a spokeswoman told us the main objective for this strategic partnership is to broaden access to Elvie Trainer, adding: “The wholesale pricing reflects that.”

Discussing the structure of the supply arrangement, she said Elvie is working with Eurosurgical as its delivery partner — a distributor she said has “decades of experience supplying products to the NHS”.

“The approach will vary by Trust, regarding whether a unit is ordered for a particular patient or whether a small stock will be held so a unit may be provided to a patient within the session in which the need is established. This process will be monitored and reviewed to determine the most efficient and economic distribution method for the NHS Supply Chain,” she added.

The quantum meltdown of encryption

Shlomi Dolev Contributor Shlomi Dolev is the Chair Professor and founder of the Computer Science department of Ben-Gurion University of the Negev. He is the author of Self-Stabilization. Shlomi also is a cybersecurity entrepreneur and the co-founder and chief scientist of Secret Double Octopus. More posts by this contributor The quantum computing apocalypse is imminent […]

The world stands at the cusp of one of the greatest breakthroughs in information technology. Huge leaps forward in all fields of computer science, from data analysis to machine learning, will result from this breakthrough. But like all of man’s technological achievements, from the combustion engine to nuclear power, harnessing quantum comes with potential dangers as well. Quantum computers have created a slew of unforeseen vulnerabilities in the very infrastructure that keeps the digital sphere safe.

The underlying assumption behind nearly all encryption ciphers used today is that their complexity precludes any attempt by hackers to break them, as it would take years for even our most advanced conventional computers to do so. But quantum computing will change all of that.

Quantum computers promise to bring computational power leaps and bounds ahead of our most advanced machines. Recently, scientists at Google began testing their cutting edge 72 qubit quantum computer. The researchers expect to demonstrate with this machine quantum supremacy, or the ability to perform a calculation impossible with traditional computers.

Chink in the Armor

Today’s standard encryption techniques are based on what’s called Public Key Infrastructure or PKI, a set of protocols brought to the world of information technology in the 1970’s. PKI works by generating a complex cipher through random numbers that only the intended recipient of a given message, the one in possession of the private key, can decode.

As a system of encoding data, PKI was sound and reliable. But in order to implement it as a method to be used in the real world, there was still one question that needed to be answered: how could individuals confirm the identity of a party reaching out and making a request to communicate? This vulnerability left the door open for cybercriminals to impersonate legitimate servers, or worse, insert themselves into a conversation between users and intercept communications between them, in what’s known as a Man-in-the-Middle (MITM) attack.

The industry produced a solution to this authentication problem in the form of digital certificates, electronic documents the contents of which can prove senders are actually who they claim to be. The submission of certificates at the initiation of a session allows the parties to know who it is they are about to communicate with. Today, trusted third party companies called Certificate Authorities, or CAs, create and provide these documents that are relied upon by everyone from private users to the biggest names in tech.

The problem is that certificates themselves rely on public-key cryptographic functions for their reliability, which, in the not too distant future, will be vulnerable to attack by quantum machines. Altered certificates could then be used by cyber criminals to fake their identities, completely undermining certificates as a method of authentication.

Intel’s 17-qubit superconducting test chip for quantum computing has unique features for improved connectivity and better electrical and thermo-mechanical performance. (Credit: Intel Corporation)

 

Decentralizing the Threat

This isn’t the first time we’ve had to get creative when it comes to encryption.

When Bitcoin creator Satoshi Nakamoto, whose true identity is still unknown, revealed his revolutionary idea in a 2008 white paper, he also introduced the beginnings of a unique peer-to-peer authentication system that today we call blockchain. The brilliantly innovative blockchain system at its core is an open ledger that records transactions between two parties in a permanent way without needing third-party authentication. Blockchain provided the global record-keeping network that has kept Nakamoto’s digital currency safe from fraudsters. Blockchain is based on the concept of decentralization, spreading the authentication process across a large body of users. No single piece of data can be altered without the alteration of all other blocks, which would require the collusion of the majority of the entire network.

For years, blockchain and Bitcoin remained one and the same. About five years ago, innovators in the industry began to realize that blockchain could be used for more than just securing cryptocurrency. Altering the original system designed for Bitcoin could produce programs to be applied in a wide range of industries, from healthcare, to insurance, to political elections. Gradually, new decentralized systems began to emerge such as those of Ripple and Litecoin. In 2015, one of the original contributors to the Bitcoin codebase Vitalik Buterin released his Ethereum project also based on blockchain. What these new platforms added to the picture was the ability to record new types of data in addition to currency exchanges, such as loans and contractual agreements.

The advantages of the blockchain concept quickly became apparent. By 2017, nearly fifteen percent of all financial institutions in the world were using blockchain to secure aspects of their operations. The number of industries incorporating decentralized systems continues to grow.

Digital security key concept background with binary data code

Saving PKI

The best solution for protecting encryption from our ever-growing processing power is integrating decentralization into Public Key Infrastructure.

What this means essentially, is that instead of keeping digital certificates in one centralized location, which makes them vulnerable to being hacked and tampered with, they would be spread out in a world-wide ledger, one fundamentally impervious to alteration. A hacker attempting to modify certificates would be unable to pull off such a fraud, as it would mean changing data stored on enumerable diversified blocks spread out across the cyber sphere.

Decentralization has already been proven as a highly effective way of protecting recorded data from tampering. Similarly, using a blockchain-type system to replace the single entity Certificate Authority, can keep our digital certificates much safer. It is in fact one of the only foreseeable solutions to keep the quantum revolution from undermining the foundation of PKI.