As more and more groups look to use information extracted from the internet about individuals, the phrase "Individual Autonomy" will have ever deeper meaning. At present the information the IMF is proposing to use in the setting of credit scores is freely available thanks to data mining at all levels of an individual's virtual life. From browsing histories to online purchases, from online gaming to tweets on twitter, all of these experiences are mined to their maximum for information about the individuals involved. And all of this is done with no control by the individual who's data is being mined much less any knowledge that it even occurs.
NEWS: CYPHYX technology could have protected America from Cyber Attack
CYPHYX has a solution to this problem, one that we use ourselves for products that are critical in protecting sensitive data, messages, and access. Using two of our patented technologies we are able to both secure the update to ensure it remains free of tampering as well as secure the update process to ensure update being applied is legitimate and verified prior to the installation in real-time.
Who do you Trust with your Data?
At present every time you browse the internet your actions, the sites you visit, the products you buy, the activities you participate in online, almost every you do is tracked, logged, and processed for value. As people become ever more aware of this fact of their virtual lives they will take ever greater action to stop it especially as it begins to affect their normal lives outside the internet. This is why CYPHYX has a primary goal of giving control back to the individual. We call it "Individual Autonomy", but really it is how things always should have been. Between Government and the Big Tech companies, there really hasn't been much protection for the individual, until now. CYPHYX plans to change that and give control back to the individual.
For really secure communications, you then need to share a new key each time you want to communicate information that is supposed to be secret. The use of a new key each time is considered to be equivalent to using what cryptographers call a one-time pad. A one-time pad harkens back to the days when an actual encryption key was distributed on paper and a unique sheet of paper was used each time. Because each key is used only once, cracking such encryption is difficult.
Wayne Rash, eWeek article, "Why Quantum-Resistant Encryption Needs Quantum Key Distribution for Real Security"
12870 Trade Way Four
Suite 107 #665
Bonita Springs, Fl. 34135
Email. info@cyphyx.com