WRFX Is Presenting: https://www.punchzee.com/
More than just a punchlist app
Manage and track your construction operations professionally and efficiently with Punchzee. AND
OUR TECHNOLOGY GIVES PRIVACY AND SECURITY BACK TO THE PEOPLE
We design our software with our user's best interest in mind. Our data storage and communications services will never collect and store any of your private information and when used correctly, will be virtually impenetrable. Our technology helps to secure all communications in many different fields and industries and even in your personal life.
In the digital world children might easily be exposed to explicit content or contacted by strangers. Spending too much time on the smartphone instead of doing homework, playing with friends oudoors and having regular bedtimes can have negative impacts on the childs development. Children might also become a victim to cyberbullying, or thoughtlessly participate in cyberbullying themselves.
Mick Davis | CEO of WRFX
Mr. Davis is a highly respected senior veteran of the cybersecurity industry with a background in both commercial and military software and security. After 9-11, Mr. Davis returned to part-time military service to bring solutions to meet high value intelligence and diplomatic mission objectives in information operations and signal processing encryption and concluded his Intelligence Community career after a 3-year tour as a Senior Advisor at USCYBERCOM at Fort George G. Meade, Maryland, and with the Defense Intelligence Agency in Washington, D.C. Mr. Davis' recent experience includes Chief of Asymmetric Engagements at Celsus Advisory Group and Senior Security Researcher at Cyber Fidelis, Inc. Mr. Davis has also served as a Director to the Board of the American Cable Television Association and has been a guest security expert at various industry conferences and on news stations to include FOX.
Lauri Tunnela | Co-Founder & Chief Technology Officer
Lauri is an IT professional and enthusiast who holds a bachelor's degree in engineering and has over 10 years of experience in the IT industry. He masters everything from cyber security, embedded hardware design and C programming, to HTML5 based web development, mobile app development or even UX designing. Lauri believes that information security should always come first.
Johannes Maliranta | Co-Founder & Chief Design Officer
Johannes is an IT engineer with over 8 years of extensive experience in digital design. He designs mobile apps, websites and other digital services where usability and user experience come first.
The Parano Protocol
What is different about the Parano Protocol?
The Parano Protocol uses a combination of four different well known asymmetric algorithms used in a very deliberate technique to leverage existing computational resilience. Novel use of those algorithms introduces a continuous and variable key generation process creating a multi-dimensional computational challenge to resist computational brute force attacks. The maturity and stability of the asymmetric encryption’s schemes in themselves are highly efficient and resilient with their small and reasonable key size when used alone. When combined to provide an ephemeral key wrapping function that continuously ratchets during the message phase, the entire message payload becomes a tremendously secure transmission with an inherent anti-cryptanalysis mechanism.
PPQE – 2018 (Post Quantum-Computing Encryption)
The Parano Protocol is a combination of four existing mature asymmetric algorithms used in a very deliberate way to bring existing computational resilience to affect while introducing variable complexity in key exchange to create a multi-dimensional computational problem to resist brute force attacks.
The well-known asymmetric encryption’s schemes in themselves are highly efficient and resilient relevant their reasonable key size when used alone, however, when combined to provide an ephemeral key wrapping function that ratchets during the message phase, the entire encryption package becomes a tremendously strong protocol with a built-in anti-cryptanalysis mechanism.
The diagram shown here is a simplified example of a single iteration with the encryption portion of the process.
Each iteration in the message exchange uses key meta data from the previous package to derive the next package encryption function making the data stream encrypted and the stream key dynamic.
This is a more robust approach to securing a data exchange than using one or two locks and sets of keys. Simply put, when using a static linear congruential generator to derive the cryptographic register shifting or alphanumeric substitutions if you break the foundational master key or session exchange keys, you can decrypt any message that was used with that master key. With Parano, key usage is fluid and highly serialized and dependent on previous key iterations making the cryptographic register shifting dynamic.
*****05/17/18 per TA: ******
PROMO VIDEO with MICK DAVIS MULTIPLE NOTES PAYABLE (aka TOXIC DEBT)
the first 5 minutes are the best
PERIODIC PUMP-N-DUMP PROMOTIONS
UNDERWAY for WRFX
as SHOWN on LATEST FINANCIAL NEW WARNING ON OTC !!!!! A CURRENT PICTURE OF RON PITCOCK..
He is now LIVING IN TEXAS. He hasn't been in CO for a few years
Investment from National Capital Region Cleared Defense Contractor to Facilitate Development of Post Quantum Computing-Resistant Encryption Integration Solutions
|LOS ANGELES, May 29, 2018 -- Paranotek, LLC a wholly owned subsidiary of WorldFlix, Inc. (OTC: WRFX), today announced a financial investment from an undisclosed cleared defense contractor to develop a series of Application Programming Interfaces (API) to its patent pending Post Quantum-Computing Resistant Encryption Protocol, called Parano™ to license to big data integrators in the lucrative United States Government big data market. During a trip to the Washington DC area last week, Paranotek CEO Mick Davis and members of his security solutions team met with a number of cleared defense contractors serving the United States Defense Information Systems Agency (DISA), Department of Homeland Security (DHS), Department of Defense (DoD) and the US Intelligence Community (IC) as well as a senior technical representative from the United States Naval Air Systems Command (NAVAIR). Mr. Davis stated, “honoring the strict confidentiality of these partners, the trip was very productive, and we are pleased to have receive a targeted investment from one of these partner cleared defense contractors to develop a series of Parano™ Software Development Kits (SDK) to facilitate the security of their big data and FedRAMP cloud integration solutions”. In addition to the API investment news, Davis said, “Paranotek is formulating the contract and technical details to license Parano™ to a world-class aerospace data information system company including co-developing a revenue generating app for one of their aviation related products”. Mick and his team were encouraged to pursue a coveted Cooperative Research and Development Agreement (CRADA) within a joint agency agreement between the US Navy and Defense Advanced Research Projects Agency (DARPA) to address a number of security topics to advance data integrity and security within the global aviation community. |