Synchronicity killed the cat - avoid exposure to pattern recognition.
At BooleanVault we develop and offer solutions to improve security by segregation of Data. Our solutions and algorithms are based on a core principle we call Asymmetric Asynchronous Bit Segregation (A2BS)
The Tor Network can be said to operate under the assumption that there’s not a global adversary that’s paying attention to every single connection on the internet. But already early in 2015 MIT and Qatar Computing Research Institute exposed the Tor Network by identifying hidden servers of Tor with 88% accuracy. This poses a significant risk as the string of data packages transmitted can be exposed to traffic analysis and pattern recognition algorithms.
With A2BS we do not only segregate the information to it's boolean values and hence store or route data packages with no significance carrying information we also utilize asynchronicity to prevent traffic analysis and pattern recognition.
We do so by balancing the required timeliness of data packages with a relevant randomized transmission delay. For real time communication the randomized transmission window are deemed to be small, typically less than a few hundred milliseconds. For file sharing the randomized transmission window can be increased significantly and for some data types and applications the randomized transmission window, can be hours or even days or weeks.
The randomized transmission delay secures that adversaries which are sniffing on an individual client, a company network, transmission relays on the internet or on cloud service provider will not find any patterns nor relative time stamps created by routing or storage mechanisms.
If you are interested in hearing more about how we at BooleanVault uses Asymmetric Asynchronous Bit Segregation to help organizations create a secure and reliable storage and communication platform, feel free to contact us via www.booleanvault.com for an informal dialogue.