Do you believe humans have a right to protect and control their personal information wherever it exists?


CYVA Research is a cybersecurity innovation and strategic research and development firm. Our focus is developing game-changing privacy and security technologies and strategies for our clients.

Our mission is to provide people the capabilities to protect and control their personal information wherever it exists; and according to their terms and conditions derive value (monetize) and/or benefit (discounts) from the trustworthy use of their information assets. 

We call this Human Digital Liberty.

Learn More

Human Digital Liberty™

Platforms & Services 

Learn More

Personal Information Agent™ (PIA™)

Capabilities


Lock/Unlock at Will

Lock/Unlock your PIA™, your PIA-based personal information anytime, anywhere. Enforce your right to control your personal information wherever it exists.

Watch Prototype Video

Audit at Will

Audit the use of your PIA-based identity and information assets. Know the who, what, where, when and why of any use of your personal information (medical, location, pictures, identity attributes).

Watch Prototype Video

Change Your Privacy, Security, and Liberty Policies at Will

At your discretion, change your governing privacy, security and liberty policies. In this example the PIA owner-operator is setting their Metered Time policy to 20 seconds. After the 20 seconds countdown completes the PIA erases. Optionally, the PIA recipient can request more time.

Watch Prototype Video

Erase at Will

Erase your PIA-based personal information anytime, anywhere. Enforce your right to control your personal information wherever it exists.

Watch Prototype Video

Control Your Identity Precision

Control exactly what about yourself do you wish to make available. Do you want to be anonymous and use your own chosen nickname or a handle such as BargainHunter2400 for this situation? You decide your level of identity precision: anonymous, pseudonymous or fully identified. You decide which identity is appropriate given your concerns, your choices for privacy, security and liberty.

Watch Prototype Video

Derive Value (monetize) and/or Benefit (discounts)

According to your terms and conditions derive value (monetize) and/or benefit (discounts) from the trustworthy use of your information.

Social media, mobile advertising, search engine and other tech giants make billions off our personal information.

I believe it is time for change. It is time to take control of the collection and monetization of our personal information assets.

If merchants want a piece of our data, time and attention to their ads, they need to pay us. They need to talk to our agent, our Personal Information Agent.

Never sell your information, license it and always maintain control.

Distinct advantages for merchants are that these agent (CTA2) to agent (MTA2) relationships are direct, trustworthy - privacy and security respectful, highly adaptable, precisely focused and provide immediate feedback on what works and does not.

These agent-based information-for-value and/or benefit ads are B2C market driven, not set by ad agencies or the search or mobile ad firms.

As shown merchants can include video clips and negotiate terms directly with their customers.

Watch Prototype Video

Prototype Video

Security +

Self-Protecting, Self-Govering Mobile Identity Agent.

Today our information is weak, vulnerable, easy prey. This is by design.

Big Tech promotes and maintains a weak-primitive data paradigm as it serves their goals of maximum profits and control.

What if data was re-engineered, designed to be under our control (post-decryption), self-protecting, self-governing?

For 85 years U.S. auto manufactures built cars without safety belts. Thousands died. The government had to force manufactures to make safety belts standard equipment.

Today there is no end in sight to cybercrime, cyber terrorism. Our data has no safety belts.

As a result of this willful negligence, millions of people are being harmed (identity theft, credit card fraud, medical identity theft, stalking, harassment,...) and businesses losing billions. And these are some of the consequences of weak, vulnerable, easy prey data objects that were never designed to be under our control, self-protecting, self-governing.

Security Rule #1: Trust no one. Especially do not trust any individual or organization that does not respect our right to protect and directly control our personal information wherever it exits.

Privacy

Owner-Operator Controlled Digital Identity: Your Personal Information Agent (PIA)  enforces your right of informational self-determination, your right to control your information wherever it exists.

Privacy is not an absolute right. The right of an individual to control their personal information, the information regarding you as a person has limits. Context: the who, what, where, when and why and guiding principles of equal justice under law, due process, sanctity of life, historical judicial opinions, enterprise architecture, software and system frameworks, systems engineering models, domain taxonomies, data dictionaries and enforcement technologies and systems are essential to understanding, describing and addressing privacy (informational self-determination), data protection rights and responsibilities.

There exists an abundance of privacy principles defined and enumerated in various documents such as the OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, General Data Protection Regulation (GDPR), GDPR Right to be Forgotten, California Consumer Privacy Act (CCPA), HIPAA Privacy Rule, and others as we grapple to address what to do about security, privacy and liberty.

Today there is a massive imblance and inequity of power over who owns and controls our personal information.

= Liberty

We are augmenting humans, amplifying our abilities to protect and control our personal information, our human digital existence. We are equiping liberty minded people worldwide to fight against tyrants, those who do not respect our unalienable rights, our foundational values and principles declared in our U.S. Constitution.

Tyrants have long engaged in spying on their citizens, conducting unlawful surveillance, censorship, intimidation, persecution, and oppression. Today crony Big Tech and corrupt Big Governments (.e.g., the swamp, the communists, the facists) want a weak, vulnerable, easy prey population that they can enslave, exploit, manipulate, control and slaughter at will.

Is is essential to liberty that we, the people, be equiped to fight for liberty in a hostile and rigged cyber world, to do what is right (ethics-driven) and mutually respect our shared Human Digital Dignity, our shared rights and responsibilities to protect one another, to respect the sanctity of all human life.


Security - Privacy = - Liberty


[Anti-Liberty Surveillance State]

If you value your security and liberty never surrender your rights, your capability to protect and control your personal information wherever it exists. People are beginning to realize the lie, the false tradeoff in giving up privacy for security.

We have long known the neccesity of self-protection in a hostile physical world, the right to bear arms, to be secure in our person, home, papers and effects. Cyberspace is no exception. And presently, our information is weak, vulnerable, easy prey. This is by design.

Information can be used for us (good) and against us (evil). It is critical to understand and know as fact, that our present human digital existence, our personal information is largely out of our control. We are purposely denied authoritative direct control over our personal information, and therefore are perilously unable to prevent having our information used against us (evil). This is by design.

We are all subject to always-on surveillance. Companies are tracking our location, recording our behavior in an expanding network of smartphones, cars, homes, appliances, TVs, AI face recognition capable video camera systems. Our environment, public and private, is systematically being infused with spytech.

Super profiles have and continue to be built and shared across a sea of data brokers, our modern day data slave traders/human digital traffickers who profit from our personal information in advertising schemes, making billions in revenue, while negligently exposing us all to a never ending onslaught of cyber crime and cyber terrorism.

Crony Big Tech and corrupt Big Government maintain this status-quo of maximum control by themselves over our personal information. This is by design.


Learn More

Security - Privacy = - Liberty [Anti-Liberty Surveillance State]

If you value your liberty never surrender your rights to protect and control your personal information wherever it exists. People are beginning to realize the lie, the false tradeoff in giving up privacy for security.

We have long known the neccesity of self-protection in a hostile physical world, the right to bear arms, to be secure in our person, home, papers and effects. Cyberspace is no exception. And presently, our information is weak, vulnerable, easy prey. This is by design.

Information can be used for us (good) and against us (evil). It is critical to understand and know that our present human digital existence, our personal information is largely out of our control. We are purposely denied authoritative direct control over our personal information, and therefore are perilously unable to prevent having our information used against us (evil). This is by design.

We are all subject to always-on surveillance, tracking our location, recording our behavior in an expanding network of smartphones, cars, homes, appliances and offices filled with embedded IoT devices and spyware. Super profiles have and continue to be built and shared across a sea of data brokers, our modern day data slave traders/human digital traffickers who profit from our personal information in advertising schemes, making billions in revenue, while negligently exposing us all to cyber criminals and cyber terrorist.

Crony Big Tech and corrupt Big Gov maintain this status-quo of maximum control by themselves over our personal information. This is by design.


Learn More

Our Architecture Guiding Principles

Human Digital Dignity

We all have a human physical and spiritual existence, and now a digital existence. I believe human beings were created in God's image and as image bearers we have a sacred God given dignity. Life is sacred, life is precious. Life is to be valued, respected and protected.

Today we have a human digital existence that bears our likeness and therefore is also sacred, precious, to be valued, respected and protected.

However, our human digital person like so many people in our past and present have suffered, and are suffering a new kind of indignity, a humiliation. Our human digital person, our personal information is being captured, chained, branded, declared property and put to work, a new kind of slavery – human digital slavery.

CYVA is building, architecting a new kind of data object (SW/HW) that protects and enforces respect for our human digital person, our human digital dignity.

Human Digital Integrity

Never seperate a person's data, their personal information from their security, privacy and liberty rules, their policies, terms and conditions governing any collection or use of the person's human digital person, their information.

A person's governing choices, their policy detailing who, what, where, when and why should anyone and/or thing (machine: IoT device) be able to collect and use that individual's personal information should not be seperated from their data, their information assets.

These rules should be assigned to and bound to our personal information objects (pictures, identity details, medical information, financial information, location information, our messages,...) traveling with our data, always protecting, always enforcing our rules, our security, privacy and liberty choices.

It is our design to maintain and protect the bodily integrity of our human digital person, assign and bind our personally chosen governing policies, our security, privacy and liberty rules to our data. This design is to disrupt human digital trafficking, to help protect us from the violence of those who steal our data, who kidnap our human digital person for profit and power.