Bit Segregation as a counter measure to CISA

Bit Segregation as a counter measure to CISA

According to the Motherboard US lawmakers in December have snuck  a version of the Cyber security Information Sharing  Act, referred to as CISA, into a Budget bill that is guaranteed to become law. The version of CISA have been stripped down for all its significant privacy protection clauses.

According to Motherboard the version of CISA in the budget bill allows "cyber security threat" information to be shared directly with the NSA and the department of defense, specifically removes a provision that banned the government from using the information for "surveillance" activities, and allows the government to use the information it gleans to prosecute any type of criminal activity, not just "cyber" crimes. also, the new version does not require personal information unrelated to "cyber threats" to be scrubbed before it's shared with government agencies.

For Organizations storing data on centers governed by US laws this means means a farewell to privacy. One can hope that those government bodies mentioned above will treat information carefully, however history has shown that said agencies tend to loose their information to whistle blowers, and if these guys can access data for the greater good, one can only assume that it is also happening for other purposes.

End-to-end encryption where you are the sole holder of the key are one option, for what does an encryption do if you entrust the key to the service provider who are under US jurisdiction. Even encryption might be vulnerable to brute force, when NSA put its collective computer power behind, so what are alternatives?

At BooleanVault we believe that Segregation of Data at bit level is the future and one way to encounter the intrusion of privacy through surveillance or direct hacking.  Utilizing Asymmetric Asynchronous Bit Segregation (A2BS) we only store a string of single bits each from a different byte. as the byte is the bearer of the information significance accessing a single bit out of context is literately just a one or a zero. Keep a single bit of every byte out of the reach of the authorities, Cyber criminals or nosy administrators while at the same time not disclosing the number of storage locations nor the relative position of the individual bit string your data  is virtually impossible to access, except by you.

The underlying A2BS principles and our proprietary algorithms work both in relation to storage and transmission of data, so if you have concerns about your privacy or just care about how your organization can communicate and store data securely in the cloud feel free to contact us via www.booleanvault.com for an informal dialogue on how we might assist you.

要查看或添加评论,请登录

Mikael Nielsen的更多文章

社区洞察

其他会员也浏览了