Advanced Community Grid Base Encryption Tool named after Edward Snowden, designed to protect privacy

as Hong Kong, free and peaceful city has become victim of military grade internet hacking, and all major internet backbones are being compromised. a group of Hong Kong programmers announce a evolutionary encryption system to protect personal privacy
 
HONG KONG - June 14, 2013 - PRLog -- Hong Kong, HK - a group of local programmers would like to announce an ultra-secure encryption solution named after Edward Snowden today: this solution is designed to safely guard Internet users' privacy under the assumption that all network backbones are being hacked.

Edward Snowden has risked his life to reveal the criminality (1) in Hong Kong, he wants all the Internet users to know that they are under surveillance. Does he simply want to prompt his own fame? Does he simply want the users to hear the news and forget the impact in the next day?

(remark 1: the term cirminality is quoted from his newspaper interview)

Internet is evitable to our daily lives today. Most of the Internet communication tools, such as Gmail, Outlooks, iOS, Facebook and so on, are originally developed in the overseas. Most network traffic pass through the Internet backbones were claimed as already hacked. If all of our activities on these platforms are under surveillance, that means we are being watched day by day like criminal suspects.

The use of public key and private key in encryption has been promoted more than a decade as a way to protect us on the Internet. However, the United States has a legal restriction for this technology. All the exportable encryption products must NOT have a key length longer than 768 bits, keeping them to be decrypt-able by some faster computers.

according to Shamir & Tromer's estimate, Kaliski (2003) , data encrypted by RSA key size 1024bits only have a data life time up to year 2010. It is unable to tell if the SSL certificates used in e-commerce and the HTTPS connection used in e-banking are still be safe anymore. Even worse, most of the computer operation systems and the respective software are classified as goods exported from the States. For example, all mobile applications are firstly uploaded to apps stores in US before you can download them. So you will never find a more secure tool from the application stores!

What are the impacts of surveillance?
Think about these: if you are discussing a huge profitable deal with your potential customer; however, the important business information is stolen and sold to other firms, you can anticipate the consequence. If you intend to apply patent for your products and inventions, but the design can be cloned once your office is connected to the Internet. All your effort will be gone!

We cannot discard all the Internet services and go back to the primitive life style. Definitely we have to find solutions to tackle the surveillance:

If we only need to communicate between a few friends, we can create our own cryptography keys. However, this method is not workable in large scale. When you need to communicate with hundreds or thousands of people, it will be impossible to meet everyone face-to-face, exchange the keys without using the hacked backbones.

In order to achieve excellent security and usability, a new complex encryption platform named after the bravery is born as E.S. Encrypt:
1. It does not collect personal information as your door lock never asks you about it. As long as every party hold a E.S. Encrypt hardware, they can always encrypt and decrypt messages locally.
2. A customizable decryption limit is added to every message. No decryption service is provided after the limit is reached. The message will never be recoverable as if it has been self-destroyed.
3. In addition, a secondary password and regional limitation can be added;
4. Or an access control list can be added if the users had communicated before. Yet, unlike social networks, the anonymous devices list will only be stored locally.
5. A feedback system is provided solely to the sender so as to track if the message is read, and the numbers of failure attempts are made; senders are able to track the possible hacking activities.
6. It will be manufactured and exported from Hong Kong, the free port chosen by Edward Snowden, as the region has no export limitation on encryption technology. The platform uses 8192bits key as a basic standard, plus an optional 65536 bits key for a slower but in-crack-able protection.

In order to build such complex system, and safe guard it from all sort of terrorist grade or military grade attacks, a big fund raising pre-order/group purchase campaign is launched globally. All funds will be used for hardware manufacturing, system developments and enhancements.

In order to frequently change keys on device and also provide unique keys for every encryption, the platform invites users to donate their CPU hours to form a community grid computer. With such self-growing ability, the encrypted files are highly resistible to brute-force attacks from super computers.

Please visit:
http://www.indiegogo.com/projects/437003
to support them
End
Source: » Follow
Email:***@163.com
Tags:Edward Snowden, Encryption, 8192bits, Hong Kong, Community Grid
Industry:Security, Technology
Location:Hong Kong - Hong Kong Island - Hong Kong
Subject:Projects
Account Email Address Verified     Account Phone Number Verified     Disclaimer     Report Abuse
WaveSpread Technology Limited News
Trending
Most Viewed
Daily News



Like PRLog?
9K2K1K
Click to Share