As more and more groups look to use information extracted from the internet about individuals, the phrase "Individual Autonomy" will have ever deeper meaning. At present the information the IMF is proposing to use in the setting of credit scores is freely available thanks to data mining at all levels of an individual's virtual life. From browsing histories to online purchases, from online gaming to tweets on twitter, all of these experiences are mined to their maximum for information about the individuals involved. And all of this is done with no control by the individual who's data is being mined much less any knowledge that it even occurs.
NEWS: CYPHYX technology could have protected America from Cyber Attack
CYPHYX has a solution to this problem, one that we use ourselves for products that are critical in protecting sensitive data, messages, and access. Using two of our patented technologies we are able to both secure the update to ensure it remains free of tampering as well as secure the update process to ensure update being applied is legitimate and verified prior to the installation in real-time.
Who do you Trust with your Data?
At present every time you browse the internet your actions, the sites you visit, the products you buy, the activities you participate in online, almost every you do is tracked, logged, and processed for value. As people become ever more aware of this fact of their virtual lives they will take ever greater action to stop it especially as it begins to affect their normal lives outside the internet. This is why CYPHYX has a primary goal of giving control back to the individual. We call it "Individual Autonomy", but really it is how things always should have been. Between Government and the Big Tech companies, there really hasn't been much protection for the individual, until now. CYPHYX plans to change that and give control back to the individual.
NEWS: CYPHYX is featured in a New York Daily News Editorial
Vote for security: Give a promising tool to protect voter databases a fair shot
Whether it's the Russians or the Chinese or domestic hackers or even the Martians, we don't want anyone fooling with our elections. Every reasonable measure should be taken to safeguard the vote. So why has a company called CYPHYX, which offers a promising registered-voter database integrity tool, gotten the runaround from partisan New York elections officials?
NEWS: CYPHYX has received a commitment from Niagara County to perform a Pilot project
Niagara county in the State of New York has signed a letter of intent for CYPHYX to perform a no-risk, no-cost pilot of SQrazorLoc. This is an excellent opportunity for CYPHYX to showcase our product and show how it functions transparently with the counties existing applications while securing the databases from being hacked.
NEWS: CYPHYX is pleased to announce the release of SQrazorLoc version 1
SQrazorLoc version 1 is a major accomplishment for CYPHYX and shows our commitment to developing new products to meet the demands of the market that are not currently met by existing products.
NEWS: CYPHYX attended the NYSECA Winter Conference
CYPHYX management attended the New York State Election Commissioners Association Winter Conference that was held in Albany New York on January 6th thru the 9th.
For really secure communications, you then need to share a new key each time you want to communicate information that is supposed to be secret. The use of a new key each time is considered to be equivalent to using what cryptographers call a one-time pad. A one-time pad harkens back to the days when an actual encryption key was distributed on paper and a unique sheet of paper was used each time. Because each key is used only once, cracking such encryption is difficult.Wayne Rash, eWeek article, "Why Quantum-Resistant Encryption Needs Quantum Key Distribution for Real Security"