Why Cloud Copies Are Inherently Insecure

With ordinary email the “send” action is deceptive. What actually happens is the message (+ attachments) are copied onto innumerable servers, stored in “the Cloud”, and then backed up and replicated / kept-forever. As a result, your data or your client’s data is unprotected and open to theft / copying / eavesdropping.

The problem with cloud  file sharing methods is even when they do employ encryption, they rely on insecure algorithms with the additional risk of exposed “central-server” copies of encryption keys, client data and user-accounts. Our Single-Copy-Send application avoids each of these troubling vulnerabilities, using a comprehensive set of anti-surveillance measures.

For email systems (& cloud file-sharing), at least six types of vulnerabilities are present:

  • Cloud provider access (back-door)
  • Transmission provider feed
  • Communications eavesdropping
  • Account hacking (front-door)
  • User impersonation
  • Physical device infiltration

Single Copy Send

When it comes to communications security, it is vital to understand “data security” is all about protecting copies.

For absolute security, Single Copy Send eliminates all third-party copies. Accordingly—of the six classes of vulnerability listed above, with Keymail protocol™  five of six  are rendered impossible. Therefore we have just one attack-vector left for the potential hacker—physical device infiltration. But this latter option is the most difficult to break into, requiring the attacker to traverse firewalls and virus checking software using highly sophisticated intrusion methods.

And for anyone who wished to avoid even this kind of attack, the entire Single Copy Send system can run from a USB Key/Thumb/Flash-drive—a world’s first—where files go directly from one USB Key to another. (Ingenious)

Threat Model

Today many organizations need to safeguard valuable digital products from commercial threats and spillage, or may even have legal requirements mandating the protection of client data. Our Single Copy Send application employs a comprehensive Threat Model as measured against these other companies:

table_1

Figure 1: KeyMail’s Protocol / Threat Model

Learn more about our Threat Model and receive a free InfoGraphic describing our scientific methods:

Nobody, not even us—will ever—or can possibly—hold copies of your private data, encryption keys and/or user details—even for a fraction of a second. Protecting digital information from the dangers of multiple-copies and sustained storage-related threats is the Holy Grail of data security, and this is why Single Copy Send is Absolute Security.