What the computer industry and cloud computing vendors do NOT want you knowing.
For the last twenty years+ Apple and Microsoft have tried frantically to secure their computers, but still on a daily basis vulnerabilities are being discovered which allow access of your data to users without your permission.
This situation is not likely to change for many years to come, the fundamental building blocks of the Internet are inherently flawed, this is due to the underlying programming language used to construct systems and networks.
Every computer and almost all network devices used today are built using a language called ‘C’. Every program built with this underlying language has the potential to leave a door open for hackers.
Even the computer or mobile device you are reading this on is running many programs all which increase the chance you will be hacked, either now or in the future.
The security industry is playing a catch up game where hackers find back doors in computers and steal information until the security vendors catch up. The hackers are always ahead of the security industry.
This all equates to one outcome, no matter how secure you think you are, in thirty seconds from now you could be compromised by a back door the security vendors are unaware of.
There is only one clear conclusion from all of this…..
Your data is never safe. Whether it is confidential information vital to your business, occupation or your home personal files and priceless photos.
The computing industry has moved rapidly towards cloud computing. This is where your private data is held on internet based computers and transferred over a global public network, managed by anonymous individuals who have access all your personal files. If you back up your data in the cloud you are increasing its visibility to other people and organisations, this further extends your security risks and vulnerabilities.
CubeiTz does not use ANY of this underlying technology or any other types of technology that create vulnerabilities.
Does your cloud provider use any of these web technologies? The answer will invariably be ‘yes’. Over the last few years thousands of holes and weaknesses have been discovered in just these few web based technologies!
The more complex the solution the more vulnerabilities you are exposed too, the more vendor software between you and your data, the more at risk your data is at.
So why isn’t everything encrypted?
The answer to this is time and cost. Up until now adding encryption to existing technology was not a simple solution. Encryption is a very complex process and done correctly requires experienced programmers who understand cutting edge encryption technologies.
There are many forms of encryption each with advantages and disadvantages.
To generalise encryption is measured in ‘bits’ and additionally the type of encryption used has a significant outcome on its value.
Most companies and security vendors use the Advanced Encryption Standard formulas and encode data in either 128 or 256 bits. This for many years has been regarded as secure. However recently there have been concerns about how quick and how strong these encryption formulas are.
The industry is now looking at 1024 and even 2048 bits of encryption to secure their process. However the disadvantages of larger encryption keys is a significant decrease in the speed of encryption.
For example a music file encrypted with 128bits can be encrypted and decrypted in under a second. With a 2048bit encryption key this can take over 60 seconds. With multiple or large files, encryption becomes a hindrance to the computing experience.
Anything that frustrates users will eventually be dropped or avoided. This is why we need a technology which does not slow down data encryption, and in addition increases the bit strength from 256 to over 7000 times more secure at 1,000,000 bits.
The key underlying technology of CubeiTz encrypts all data using a one million bits of encryption key. These keys are delivered in a highly secure process to our customers. Secure data stored inside CubeiTz can never be decrypted without a user’s authentication. Every business or personal file you share has its own unique one million bits of encryption key.
Additionally, every business or personal file you share has its own unique one million bits of encryption key. This is over 7,500 times more encryption strength than your bank. Plus we are improving our technology on a weekly basis to ensure your data can never be seen by anyone who has access to your files or the vendors you chose in the cloud to store your data.
Everything is byte-level compiled on the server. The executable server is secure in its own virtual disk encrypted environment making it impossible to reverse engineer our source-code. This makes us far more secure because of the way it decrypts the data and communicates locally.
Written in a byte level compiled language and highly optimised for performance so it runs as fast as possible on the processor (lots of languages that go through several levels of interpretation before they are executed and have their own virtual environments which slows them down). The source code is compiled at the lowest possible place for maximum performance. In addition, the CubeiTz code has been compiled in an extremely efficient manner and the executable heavily encrypted so it cannot be viewed or tampered with. All the references internally to the executable are not visible, making it significantly more secure than other technology – ‘Security through Obscurity’.
Key element –
All data is AES encrypted on the disk, so any theft or loss of hardware would ensure any stored data is irretrievable. Our encryption methods would take many years to decrypt depending upon the level of processing power someone could assign to cracking it. This gives us the ability to supply and install CubeiTz as a local system running on an intranet. It does not have to be run as an open sql database that anyone could hack. If our data files were obtained/stolen and linked to an sql database, our data would not be accessible. We can supply something which is a lot more locked down in terms of a delivered solution to a customer.
Next key element – The framework.
The platform is designed to not just share files (this would just be another DropBox). The idea of the framework is to deliver application data and services via a consistent interface. CubeiTz is different to current data storage systems i.e. Google Drive, Dropbox, file servers, who just ensure your data is stored in the cloud and made easy to access via a PC/Tablet by mirroring it (which contain security risks in its own right).
The key thing behind CubeiTz is the architecture on which it is built and the technology that gives us the ability to add functionality as opposed to just adding data.
What it also does is break data and applications apart. If you buy a new application from the marketplace today you will install it, configure it and add its users. You then buy another product, add it to your server, add the database, add the users, (which has already been done with the previous product), but they remain completely separate, with separate databases, separate interfaces, separate training courses, separate costs, different user experiences, they don’t share data between themselves very well and each has its own vulnerabilities.
The CubeiTz platform has the ability to plug in applications within the framework. These applications are written within CubeiTz. What CubeiTz does in respect of applications is quite unique. It separates user access rights from applications. Instead of multiple set-ups for multiple products, a user set-up in CubeiTz has access rights inherited by the application which has been given the user. If a group of users are given access to an accounting package for example, instantly that account system internally has a database of users. If a booking system is then added to CubeiTz the database of users already exists to add or share with users. What we are doing in effect is building the concept of a ‘Portal’, and the Portal gives not only access rights to the data, but also gives access at an application level, and the application level rights for the users to whom it has been shared. So you can take a single user application, for example ‘Notes Cube’ and drop it into a shared portal, all the users subscribed to that portal will have (depending on their access rights) the ability to share information through that application. So the key part of our framework is not just sharing data, it gives you the ability to share multi user applications.
Applications will be created within the CubeiTz framework. This is to ensure existing applications do not introduce vulnerabilities, and are created to work within a web framework in the cloud. Software developers are currently trying to move everything into the cloud, but the technology running in the cloud is designed completely differently to that which runs locally.
Anything created in CubeiTz will be designed to run in the cloud. A key point is the application framework ensures all applications will be resaleable as a cloud service.
A key point is server setup. The CubeiTz interface can run on a dedicated server, while other applications run on dedicated servers to support that application. This makes CubeiTz truly scaleable ensuring users can run any number of applications.
The future plans are to have a ‘CubeiTz’ shop from where users can purchase applications. Eventually the API will be opened to allow open-source application development which can be sold via the CubeiTz Marketplace.
The encryption key –
It is said breaking a DigiCert 2048-bit SSL certificate would take about 4.3 billion times longer (using the same standard desktop processing) than doing it for a 1024-bit key. It is therefore estimated, that standard desktop computing power would take 4,294,967,296 x 1.5 million years to break a DigiCert 2048-bit SSL certificate. Or, in other words, a little over 6.4 quadrillion years.
CubeiTz data guard:
Business – Corporate use
Corporate users have complete security by installing CubeiTz so it runs on their own internal network.
This allows complete management and access of users.
A company can manage employee access and could revoke a key at the flick of a switch, instantly rendering any stored data useless to that person.
1 – Key server – This servers role is to supply new users and existing users logging in with their 1 million bits of encryption key.
2 – Web management server – This server has to run on the same machine as server 1 and is responsible for creating license keys for the logged on users.
3 – Instant messaging server – This server is responsible for the IM communication messages, it also contains your contact lists.
4 – Data server – This server is where shared files are stored, files here are stored with a shared encryption key.
With these 4 services running internally a company can manage their own security end to end, and no data would ever need to leave their network. However, they could expose the servers to private networks to allow home users to connect in and work.