Skip to the content

Tracking your Virtual Life to set your Credit Score, Internationally

As more and more groups look to use information extracted from the internet about individuals, the phrase "Individual Autonomy" will have ever deeper meaning.  At present the information the IMF is proposing to use in the setting of credit scores is freely available thanks to data mining at all levels of an individual's virtual life.  From browsing histories to online purchases, from online gaming to tweets on twitter, all of these experiences are mined to their maximum for information about the individuals involved.  And all of this is done with no control by the individual who's data is being mined much less any knowledge that it even occurs.

Since CYPHYX has as its motto that very phrase, "Individual Autonomy", we are working to create the necessary products that will empower individuals, whether person or company, to control their information about their virtual lives.  Protecting data is only one aspect with many other tools in the works to protect many other online activities.

Your Credit Score Should Be Based on Your Web History, IMF Says

With more services than ever collecting your data, it's easy to start asking why anyone should care about most of it. This is why. Because people start having ideas like this. In a new for the International Monetary Fund, four researchers presented their findings from a working paper that examines the current relationship between finance and tech as well as its potential future.

About the author



CYPHYX is a dynamic company with cutting-edge products that will solve problems or needs.  

For really secure communications, you then need to share a new key each time you want to communicate information that is supposed to be secret. The use of a new key each time is considered to be equivalent to using what cryptographers call a one-time pad. A one-time pad harkens back to the days when an actual encryption key was distributed on paper and a unique sheet of paper was used each time. Because each key is used only once, cracking such encryption is difficult.

Wayne Rash, eWeek article, "Why Quantum-Resistant Encryption Needs Quantum Key Distribution for Real Security"


12870 Trade Way Four
Suite 107  #665
Bonita Springs, Fl. 34135