National Security

Theft of Our Data

It's pretty easy to put together a litany of instances in which the national security of the United States has been compromised by hackers, many of them nation-state sponsored.

In all of the above, U.S. government information was the primary target.

 

China routinely steals U.S. technology, either by hacking or by opening the vast Chinese market to firms in return for "voluntary" transfer of corporate secrets. Theft from our high tech companies erodes our nation's competitive edge, and therefore constitutes a national security problem.

Extreme Encryption

Extreme Encryption was described in the November 2017 patent application as "a method and system of synchronous encryption to render computer files and messages impervious to pattern recognition and brute force attacks". It is designed to ensure the greatest possible privacy for our national data. The design brings to fruition seven goals listed on the home page. Here they are again:

  1. Destroy all meaningful patterns in data.
  2. Resist brute force attacks. Make attacks difficult with CYBERIAN™ products, render brute force attacks impossible ("computationally infeasible") with Extreme Encryption.
  3. Blindfold the hacker.
  4. Maximize efficiency of encryption and decryption.
  5. Add research capability (search and text data mining) to encrypted content.
  6. Achieve full scalability in the light of the quantum computing threat.
  7. Be socially responsible. Balance the needs of privacy and national security.

 

Unlike the CYBERIAN™ and CYBERIAN™ TIGER products, there are no free trials of Extreme Encryption. As a matter of social responsibility Marpex Inc. chooses to make Extreme Encryption available only to U.S. government agencies and to organizations either sponsored by a government agency or carrying out contracts on the government's behalf.

Cyberian Tiger