top of page

Trust Nothing Always Verify

ARE TODAY'S COMMUNICATIONS SYSTEMS SECURE?

... SOMETIMES

BUT ARE THEY PRIVATE?

... ALMOST NEVER

IMPLICIT VS. EXPLICIT
TRUSTED SYSTEMS

THE PROBLEM WITH IMPLICIT TRUST

Communication in this example could be audio, video, screen sharing, messaging etc. 

Encryption Method

Encryption Problem

All systems that use implicit trust in their operating models can be compromised using inexpensive surveillance and downloadable tools. Communication encryption DOES NOT need to be compromised to be breached. In this sense, end-to-end encryption (E2EE) creates a false sense of privacy.

A simple "real world" example of implicit trust commonly used by many popular systems today is joining an online meeting with a pre-shared password and internet link. You are trusting that the person joining is authorized to attend. 

A more complex example is how you know the person you are talking to is the intended contact if you do not know them - again, this is a form of implicit trust.

Even worse, a software program mimics a person with AI techniques. Again, implicit trust because it sounds or looks like the person, but you don't know with 100% certainty!

We solve this with Zero Trust Communications and Zero Trust Networking. These types of systems are designed with explicit trust and use cryptography for the authentication of users and their devices in addition to the encryption of data.

WHY EXPLICIT TRUST IS ALWAYS BETTER?

War Room employs cryptography as a security measure to authenticate users and their devices before any communication can take place. The system utilizes an explicit trust model, which does not trust any entity by default, rather it verifies the cryptography every time to guarantee the privacy and security of the user's data.

StickFigures2.png

ATTACKING FINANCIAL INCENTIVES

War Room is designed to destroy the attacker's economic incentive due to TVM (time value of money) and diminishing returns on a criminal network labor pool (security hackers).

Every meeting or phone call spawns another dynamic Zero Trust Network, and when it's over, that ZTN is gone, leaving nothing to surveil or attack. 

Our approach removes financial incentives for attackers to continue their attacks, and most move on to easier targets. 

bottom of page