Why Cloud Copies Are Inherently Insecure
With ordinary email the “send” action is deceptive. What actually happens is the message (+ attachments) are copied onto innumerable servers, stored in “the Cloud”, and then backed up and replicated / kept-forever. As a result, your data or your client’s data is unprotected and open to theft / copying / eavesdropping.
The problem with cloud file sharing methods is even when they do employ encryption, they rely on insecure algorithms with the additional risk of exposed “central-server” copies of encryption keys, client data and user-accounts. Our Single-Copy-Send application avoids each of these troubling vulnerabilities, using a comprehensive set of anti-surveillance measures.
For email systems (& cloud file-sharing), at least six types of vulnerabilities are present:
- Cloud provider access (back-door)
- Transmission provider feed
- Communications eavesdropping
- Account hacking (front-door)
- User impersonation
- Physical device infiltration
Single Copy Send
When it comes to communications security, it is vital to understand “data security” is all about protecting copies.
For absolute security, Single Copy Send eliminates all third-party copies. Accordingly—of the six classes of vulnerability listed above, with Keymail protocol™ five of six are rendered impossible. Therefore we have just one attack-vector left for the potential hacker—physical device infiltration. But this latter option is the most difficult to break into, requiring the attacker to traverse firewalls and virus checking software using highly sophisticated intrusion methods.
And for anyone who wished to avoid even this kind of attack, the entire Single Copy Send system can run from a USB Key/Thumb/Flash-drive—a world’s first—where files go directly from one USB Key to another. (Ingenious)
Today many organizations need to safeguard valuable digital products from commercial threats and spillage, or may even have legal requirements mandating the protection of client data. Our Single Copy Send application employs a comprehensive Threat Model as measured against these other companies:
Figure 1: KeyMail’s Protocol / Threat Model
Learn more about our Threat Model and receive a free InfoGraphic describing our scientific methods:
Nobody, not even us—will ever—or can possibly—hold copies of your private data, encryption keys and/or user details—even for a fraction of a second. Protecting digital information from the dangers of multiple-copies and sustained storage-related threats is the Holy Grail of data security, and this is why Single Copy Send is Absolute Security.