SUBROSA
-
Upload
richard-blech -
Category
Internet
-
view
150 -
download
1
Transcript of SUBROSA
Data Breaches is the Increasing ThreatIdentity Theft Resource CenterTotals for All Categories, 2014: # of Breaches: 761 # of Records: 83,176,279Source: http://www.idtheftcenter.org/
Data ENCRYPTION is the answerSecure Channels Patented Encryption will just do that.
Secure Channels patented encryption works even if a private cloud is hacked, because the only thing a hacker can see is useless bits and bytes without the set of encryption keys, pattern keys, scripts, and source code required to make any sense of it.
SUBROSASimple User Based Resource
Orientated Segmented Architecture
SUBROSA: “Under the Rose" and is used in English to denote secrecy or confidentiality, similar to the Chatham House Rule. The rose as a symbol of secrecy has an ancient history.
SUBROSA is a new paradigm for generating and utilizing complex keys based on a user's own understanding and selection of segments of resources (images, documents, audio clips, videos, etc.) that the user can easily identify thus the architecture being user based and resource oriented.
Before SUBROSA 1980s
technology Average hack
and crack time less than 5 minutes
Users can change for additional security
Need to remember any/all passwords
2007 technology Average hack
and crack time less than a few minutes
Users can NOT change due to print being unique
Once obtained users MUST abandon this option
The broken standard Biometrics…the myth
SUBROSANumbers, characters and/or prints are easily hacked; Imaginations are not…
Select pictures, objects, .wav files, etc.
Select 2+ in sequential order
Divide each object into as many as 64 individual elements, each with it’s own set of keys
Each element in all objects are now locked and encrypted and done so in RANDOM order making it nearly impossible to hack, let alone…CRACK
Welcome to
SUBROSA“The end of passwords” Next generation “object and element
based” data security and protection
A simple 4 image/object security blanket, with 150 random elements to include random multi-length keys per element in random order, yet ALL must be opened and unlocked in sequential order. Good luck!!!