"information hygiene and security issues in the instant communication networks.", vadim...

12
Decentralized automated encryption VADIM ANDRYAN CEO/CTO

Upload: hackit-ukraine

Post on 23-Jan-2018

85 views

Category:

Internet


0 download

TRANSCRIPT

Page 1: "Information hygiene and security issues in the instant communication networks.", Vadim Andryan

Decentralized automated encryption

VADIM ANDRYANCEO/CTO

Page 2: "Information hygiene and security issues in the instant communication networks.", Vadim Andryan

CYBER - SECURITY CHALLENGES

Page 3: "Information hygiene and security issues in the instant communication networks.", Vadim Andryan

END – to – END Encryption

(WhatsApp, Snapchat,

Telegram)

“Man in the middle“ attack is still

possible at the Service Provider side

Leaking information to third

parties will not be possible

Unauthorized interceptions are

prevented

THE PERSPECTIVE

Vulnerable insecure local data

storage

THIRD

PARTIES

ALICE‘s PUBLIC KEYBOB‘s PUBLIC KEY

„Man in the Middle“attack on server side

END – to – END encrypted data exchange

PRIVATE KEY PRIVATE KEY

Page 4: "Information hygiene and security issues in the instant communication networks.", Vadim Andryan

Crypviser Network

The world first communcation

Network based on Blockhain

technologies

Decentralized PEER – to

PEER

authentication model

Disruptive unified encrypted

communication platform

THE SOLUTION

Solving the biggest issue of

The assymetric public key

encryption

THIRD

PARTIES

„Man in the Middle“attack on server side

END – to – END encrypted data exchange

PEER – to – PEER PUBLIC KEY EXCHANGE

Unique public key authentication

algorithms

PRIVATE KEY PRIVATE KEY

MAN IN THE MIDDLE ATTACK

chain chain

chain

chain

chain

chain

chainchain

chain

Page 5: "Information hygiene and security issues in the instant communication networks.", Vadim Andryan

Crypviser Automated Encryption

Decentralized keys distribution

Reliable and secure

infrastructure

INDUSTRIAL BLOCKCHAIN

CSMP ENCRYPTED CHANNEL

TEXT/VOICE AND

MEDIA/DATA

EXCHANGE

Open source

Automated Authentication

Page 6: "Information hygiene and security issues in the instant communication networks.", Vadim Andryan

SECURITY CORE

Innovative security core provides

protection at all levels

OS independent protected (encrypted)

storage and local security features

APP-LEVEL

Server

side

Network Level

Local layer

PEER – to - PEER data exchange (when possible)

NO TRACKING

NO TRACING

NO META DATA RECORDS

SERVICE PROVIDER SIDE

All kinds of data exchange (chats,

voice/audio streams, photo/video and file

sharing, etc.) are END – to – END encrypted

by using the most secure, reliable and

modern cryptographic algorithms and

technologies

NETWORK LEVEL

Page 7: "Information hygiene and security issues in the instant communication networks.", Vadim Andryan

CSMP - Crypviser Secure Protocol

Integrated unique PEER – to –

PEER authentication

mechanism based on

BLOCKCHAIN to prevent

“IDENTITY THEFT”

Strong authentication

❑ Elliptic – Curve Cryptography

❑ Stream symmetric cipher

SALSA20/20

❑ SHA3 – 512 HASH

Reliable technologies

Developed by the most secure, reliable

and modern cryptographic protocols and

technologies to be approved as

“MILITARY LEVEL” by international and

EU standards

Unbeatable security

The extra fast stream ciphers and

authentication algorithms

Extremely fast

Integrated smart attacks detection

system to prevent the most dangerous

interception attempts

Intelligent Intrusion Detection

CRYPTOGRAPHIC MODEL

Page 8: "Information hygiene and security issues in the instant communication networks.", Vadim Andryan

Voice and Video callsUnlimited Full HD voice and

video calls

Instant messaging Encrypted instant messaging

Group callsSecure encrypted group calls

(voice conferences)

File and Photo/

Video sharingSecure and encrypted

photo/video file exchange

without size restriction

Auto-destruction timerAutomatic data destruction

mechanism after the defined time

Local security features A rich set of local security features,

such as block chat, hide chat, backup

and much more…

Page 9: "Information hygiene and security issues in the instant communication networks.", Vadim Andryan

Secure Sync

The world’s first secure

multi - device

synchronization in

encrypted mode

Multi-device support

The first secure network

with Multi-device support

that enables you to run the

same Crypviser Account on

different devices

Intelligent Intrusion

Detection

Allows timely detection and

prevention from the most

dangerous third party

interception attack attempts

Two-level

Authentication

Manual and automated

authentication in PEER to

PEER mode to prevent

all kinds of MiTM attacks

ESSENTIAL ADVANTAGES

Page 10: "Information hygiene and security issues in the instant communication networks.", Vadim Andryan

the currency of privacy

❖ Blockchain authentication token

❖ The most secure crypto wallet

❖ Fast and secure transactions

❖ Reliable investments

CVCoin

Page 11: "Information hygiene and security issues in the instant communication networks.", Vadim Andryan

❖No central authority

❖You own your keys

BUY, TRADE, EXCHANGE

❖Decentralized trading

❖Fast and secure P2P

transaction

CVCOIN on the most secure decentralized exchange

https://openledger.io

www.facebook.com/cvcoin

www.twitter.com/cvc_ico

Page 12: "Information hygiene and security issues in the instant communication networks.", Vadim Andryan

…is not an alternative

it’s better…

The first decentralized

encrypted communication

platform for B2C and B2B

https://crypviser.network

www.facebook.com/crypviser

www.twitter.com/crypviser

Contact us: [email protected]