LEARN MORE
SUPPORT OUR FUNDING CAMPAIGN
OUR PERSONAL INFORMATION IS WEAK, VULNERABLE, EASY PREY. THIS IS BY DESIGN.
There has been a war raging for years over who owns and controls personal information and we are the losers. By design, our personal information is weak, vulnerable, easy prey.
Crony big business and corrupt big government have and continue to work together to maintain the status quo: a business model and strategy of maximum control and exploitation of personal information.
CYVA Research argues for the re-engineering, the redesign of primitive data objects, our compute fabric at an atomic level, creating a new class of self-protecting, self-governing mobile information objects.
This new class of self-protecting, self-governing objects (HW/SW) are designed to augment humans, providing us the capabilities to protect and control our digital identity and information assets wherever they exist.
CYVA's Self-Determining Digital Persona is built according the firm's guiding architecture principles: Human Digital Dignity™, Human Digital Integrity™, Human Digital Liberty™.
We believe in unalienable human rights and the mutual responsibility to respect and protect those rights in both the physical world and digital world: cyberspace.
Today, we are realizing that we are Human Digital Persons, people with a digital existence. Our unalienable rights to life, liberty and prosperity are under assault in this manmade catastrophe called cyberspace, that, by design, is hostile to privacy, security and liberty.
I believe there are millions of people today who now realize just how precarious our digital existence is, how vulnerable we all are in this rigged-for-enslavement, rigged-for-tyranny world called cyberspace, and are motivated to act, to fight for their Human Digital Liberty.
CYBERSECURITY CATASTROPHE: NO END IN SIGHT, ENTIRELY MANMADE
It is essential to understand that the unending and escalating cybersecurity catastrophe we are experiencing is entirely manmade.
Presently there is no end in sight to data breaches, cybercrime, and cyber-attacks by criminals and our enemies.
Target (November 2013, 145 million records),
Yahoo (2013 3 billion records, not determined until 2017),
eBay (2014 145 million records)
JP Morgan Chase (2014, 83 million records),
Anthem (2015, 80 million records),
United States Office of Personnel Management (OPM) (2014-2015, 21.5 million highly sensitive SF 86 files)
Myspace (May 2016, 360 million records),
LinkedIn (May 2016, 100 million records),
Equifax (2017, 143 million records),
Uber (October 2016 57 million records, concealed from regulators until November 2017).
Data Records Lost or Stolen Since 2013 (Global) 9,727,967,988.
Records breached in the Year 2017 (Global) 2,600,968,280.
With the advent of cyberspace as an operational domain of war, criminals and our enemies have skillfully exploited our present weak, vulnerable, easy prey state of being digital.
All of us are being surveilled online, profiles being built and shared across a sea of players who expose us to harm.
Special Operations Forces (SOF) and their families have and continue to be hunted online. They are priority targets for our enemies.
Presently, civilians and warriors have little if any control over their human digital existence, their digital identity and information assets.
This includes Social Security numbers, cellphone numbers, home and work addresses, e-mail addresses, IP addresses, photos, real-time location data, names of spouses and children, text messages, chat, web searches, blood type, medications, biometrics, finger prints, facial scans, videos.
PRIMITIVE DATA TYPES (DATA OBJECTS) CANNOT PROTECT OR GOVERN THEMSELVES
Core to our manmade cybersecurity catastrophe is the fact that primitive data types (data objects) were never designed to be secure, to be self-protecting, self-governing.
Common primitive data types include:
integers (62, 1000, -37)
booleans ('true' 'false')
characters ('x' '$' '2')
floating-point numbers (21.003, -500.89)
alphanumeric strings (‘today is Friday’).
Primitive data types (data objects) and file formats such as JASON and XML files, these basic, atomic building blocks of information systems cannot protect or govern themselves. This is by design.
In other words, the Data Object is the most fundamental flaw in our critical information technology fabric. As a result, our information is weak, vulnerable, easy prey.
This is a fundamental flaw and continues to put us all at risk and in particular Special Operations Forces (SOF) Warriors and their families who are being hunted by our adversaries.
NEED TO GO BEYOND ENCRYPTION
Encryption is valuable, but we need to go beyond encryption.
Encrypting primitive data is not enough as the explosion in Ransomware has demonstrated: encryption being used against us.
Encrypted message:
0DD8CC1D95853D9F6CF9149810EE100C267881337E66199682B8BB19A410D87ECA3AE298F64B62AD7C3457FF3C1E10A9
If you encrypt a data file, share that encrypted file and later provide the recipient the decryption key, do you have any control over the decrypted file?
No. You have zero control.
Plain Text: "Meet me at location jubilee at 1300 hours."
The recipient can do whatever they want (operations: read, update, send) with the decrypted data. We need to go beyond encryption as its purpose is to hide/distort the meaning of, scramble data, not Control the Operations performed on the data.
Our approach of self-protecting mobile information objects combines the ‘scramble data’ utility of encryption with an individual's ever protecting, and present rules of information access and use; you control the processing as your processing rules are always present. Note these are your rules not some unknown administrator or business/government entity that says you have to trust us.
So after an encapsulated agent-based information object is decrypted the owner-operator (you) remains in operational control (read, display, update, exchange, delete, lock down,…) of the information. An individual can change a governing policy or remotely lock-down any deployed Personal Information Agents at will (see prototype demo video). Security rules are pre-set and can operate autonomously or semi-autonomously.
SOLUTION ARCHITECTURE
CYVA Research has designed a new class of self-protecting, self-governing mobile information objects, a Self-Determining Digital Persona™ that enforces privacy and empowers the right of people to be secure and free in their human-digital existence. These technologies are being built in accordance with our guiding architecture principles: Human Digital Dignity™, Human Digital Integrity™, Human Digital Liberty™.
We all should respect Human Digital Dignity™ - we have a human digital existence and the right of informational self-determination - Human Digital Liberty™, the right of people to be secure in their human-digital existence and the liberty to control and derive value and/or benefit from the trustworthy use of their digital identity and information assets according to their terms and conditions. It is a fundamental design objective to build systems that support and affirm Human Digital Dignity and the rights-responsibilities of privacy: informational self-determination.
Human Digital Integrity™: never separate a person’s data from their policies, and the capability for a person or authorized custodian to enforce governance over the use of their Human-Digital Identity wherever they exist.
Today we artificially separate policy from data. Our design, our architectural principle is to never separate a person’s rules, their security and privacy choices from their data; a person’s rules, their policy travels with their data.
Consumer privacy and security rules, and auditing are always on, always enforcing consumer privacy-security choices, recording the who, what, where, when, why details of data processing. This capability provides data controllers a verifiable means to prove and satisfy certain long standing data protection principles and evolving data protection regulations (e.g., General Data Protection Regulation (GDPR), OECD Privacy Guidelines, HIPAA/HITECH, California Consumer Privacy Act (CCPA)).
UNSAFE AT ANY SPEED: THE DESIGNED IN DANGERS OF THE AMERICAN AUTOMOBILE
DESIGNED-IN DANGER OF DATA REPURPOSING
INDUSTRY STUCK IN PRIMITIVE DUMB DATA PARADIGM
Our industry is stuck in and perpetuates a primitive/dumb data paradigm.
We are blinded and constrained by this idea of protecting an object that was never designed to protect itself, that was never designed to govern itself.
Perpetuating primitive/dumb data is essential to the status quo and a business model and strategy of maximum control and exploitation of personal information by crony big business (greed-driven) and corrupt big government (power-driven).
SECURITY RULE #1: TRUST NO ONE
Security Rule #1: Trust No One
Especially do not trust any individual or organization that does not respect and protect our human right to control our personal information wherever it exists.
Data can be used for us (good) and against us (evil).
Today our data is weak, vulnerable, easy prey.
This is by design.
HUMAN RIGHT OF PRIVACY: INFORMATIONAL SELF-DETERMINATION IS NOT AN ABSOLUTE RIGHT
The human right of privacy: informational self-determination is not an absolute right. Our right to control our personal information is essential to liberty and security, but it is not an absolute right, namely it is not true in all situations.
Example: Criminal Record
"When someone is convicted of a crime in a United States courtroom, it is a public event. The record of the conviction is a public record, and anyone can go to a court clerk's office and search the files for records of conviction for a certain person" (exception: judge sealed, expunged conviction).
Source: nolo.com
WARRIOR I AM
Why fight those who believe and behave like the Nazis, the Transatlantic slave traders and tyrants who sought to enslave, subjugate and annihilate people they asserted were sub-human, not worthy of life and liberty?
I believe there are millions of people today who now realize just how precarious our digital existence is, how vulnerable we all are in this rigged-for-enslavement, rigged-for-tyranny world called cyberspace, and are motived to act.
Like those who fought evil in the past, they will fight to secure Human Digital Liberty for themselves and others they love and cherish.
Consider, the only rights you have are those you fight for.
Warrior I am.
Take control of your personal information, abolish the Data Slave Trade and the Anti-Liberty Police State.
Secure the benefits of Human Digital Liberty, your right to protect and control your personal information wherever it exists; and derive value and/or benefit from the trustworthy use of your information assets in accordance to your directly enforceable terms and conditions.
JOIN THE HUMAN DIGITAL LIBERTY MOVEMENT
TAKE CONTROL OF YOUR
PERSONAL INFORMATION