Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
If some one calls Peter and ask his view it would be funny. All balloon air would burst
For a company with no product. Great
Surwin will come on other subject to you. Yes SAIC did testing. Period.
BB is a bull Shit. 9 companies did testing. All failed.
I am not gone. Was away for two weeks. Acted as if, I was banned
VLDI is a lie on a lie on a lie
To do policy based encryption three items are key.
1 Time to switch.
2 How it handles voice and video
3 Certication to get security stacks integrated with Knox and iOS
Let's see how VLDI perform
For first, data performance was absyml. 6 seconds delay. Only a fool will use it
For second 0. BIG ZERO
For third no record of certification. How the hell one can develop and integrate with Knox etc. THERE IS NO WAY AROUND
Again BB washed up CFO can do miracles
Miracle 1 develop with no knowhow from Android or iOS stacks
Miracle 2 No team. BB CTO
And many more
BB is good in hiring hounds to promote. Have to give him credit for that
Do not take it for granted that I will not release the report
Last item. VLDI own's no encryption. No AES encryption support. No federal government will buy.
Scammer with paid associates
BB has nothing. 00000
I am off from this board.
I get suspended
Shameless people pushing with lies.
Shame on BB. He is a crook. He has no shame.
Have attached, Encryption notes that world is adopting. Later policy management using pseudo polynomial based methodology
VLDI does NOT DO ANY ENCRYPTION. THEY DO NOT SUPPORT AES. BIG 0
VLDI uses washed up old methadology for Policy management. THEY CAN NEVER SYNCH VOICE AND DATA. PLUS NO WAY MOBILE. They use binary splitting for choice of algorithms. 15 years old.
The Advanced Encryption Standard (AES) is the algorithm trusted as the standard by the U.S. Government and numerous organizations.
Although it is extremely efficient in 128-bit form, AES also uses keys of 192 and 256 bits for heavy duty encryption purposes.
AES is largely considered impervious to all attacks, with the exception of brute force, which attempts to decipher messages using all possible combinations in the 128, 192, or 256-bit cipher. Still, security experts believe that AES will eventually be hailed the de facto standard for encrypting data in the private sector.
The Future of Encryption
Cyber attacks are constantly evolving, so security specialists must stay busy in the lab concocting new schemes to keep them at bay. Expert observers are hopeful that a new method called Honey Encryption will deter hackers by serving up fake data for every incorrect guess of the key code. This unique approach not only slows attackers down, but potentially buries the correct key in a haystack of false hopes. Then there are emerging methods like quantum key distribution, which shares keys embedded in photons over fiber optic, that might have viability now and many years into the future as well.
------------------------------------------------------------------------
Purpose of a Key Management Policy
A key management policy (KMP) is a high-level set of rules that are established by an organization to describe the goals, responsibilities, and overall requirements for the management of cryptographic keying material used to protect private or critical facilities, processes, or information. These statements include authorization and protection objectives, and constraints that apply to the generation, distribution, accounting, storage, use, and destruction of keys. Key Management Policies are implemented by systems administrators through a combination of security mechanisms and procedures.
Varieties of security policies
There are several types of policies that are needed before a key management system (KMS) can be implemented and put into use. Different organizations may have different policies related to the security levels needed for their particular product or service. Policies can also vary within an organization for different applications and types of data. The KMS must be designed to handle and support the requirements of individual business units within each organization. The various types of policies can be very difficult to sort through and understand unless some form of simplification can be made.
Organizing policies in layers
To address the requirements, organizations often use a hierarchy of policies, in a layered fashion. The functions that oversee and control the actions of the policies in general are placed in the top level (or top layer). The top layer is usually the information-management level that provides the basic requirements and desired control actions for the lower levels. The lower and intermediate levels provide the details of the actual implementation and enforcement procedures for a particular type of security protection defined in an upper layer. So each layer in this hierarchy handles a particular subset of key management system functions and tasks related to security, and passes other specific requirements down to the next lower level, which is designed to handle them.
Assigning tasks for each policy layer
Each layer performs its set of functions and tasks in the form of “outputs” based on certain “inputs” related to the type of security provided. Each layer also interacts with the next higher policy level to make sure policy is in accordance with the overall requirements. Although this can vary between organizations, the layers (in terms of the tasks they handle) are typically arranged from top to bottom as: information management, data security, physical security, computer security, communications security, and cryptographic key security. For the purpose of this article, these multiple layers can be reduced to just three layers, as described below:
Functions of the top policy layer (Information Management)
The top policy layer (Information Management) sets the foundation for the overall management based on established set of standards, which include industry standards, legal requirements, and organizational goals regarding its needs for data protection. This policy usually sets the goals for assuring information security, and also establishes the types of authorization and management roles for a select group of people. The specifications provided in this layer are passed down to the next lower level (Information Security), and provides information on the protection levels needed for the various categories of sensitive data and information. This information includes specifications for the levels of confidentiality, integrity, availability, and source-authentication protections.
Functions of the second policy layer (Information Security)
The next lower level (Information Security), is designed to specify more details on the basic information received from the information management layer. Details are provided on the protection needed for the various kinds of threats, and how that protection should be implemented for each data type. This layer is provided with additional inputs to determine how and what information should be protected, which include a list of the potential threats to the security of the organization’s information, and the risks associated with the unauthorized disclosure, modification, and destruction or loss of the information. From these inputs, the information security layer can determine the degree of protection for the various categories of data, and rules for implementing this protection. This policy may also include the guidelines of a Data Security policy, which provides rules for protecting electronic information, governs the use of computers, applications, and communication networks. In relation to the cryptographic techniques that should be defined in the first two policy layers, outputs are provided to the next layer (KMS Security Policy) that defines the use and protection of the additional mechanisms that provide security protection for the cryptographic keys and associated metadata.
Functions of the third policy layer (KMS Security Policy)
The next lower level (KMS Security Policy), is created to establish and specify the details on protecting keys and metadata, which maintain confidentiality, integrity, availability, and source authentication throughout a key's life cycle. The KMS Security Policy should state the specific protections applied to each key type and its metadata, and the length of time that keys and metadata are to be retained based on the sensitivity of the data they protect. All cryptographic mechanisms and protocols that can be used by the KMS are specified by this policy. This policy must also be consistent with the higher level policies. It is often required that a Security Policy be encoded so that an automated system can enforce it. In this case, a KMS Security Policy would be converted to electronic format, so that a firmware program will enforce the policy requirements. Such systems may be able to check themselves for proper functioning, diagnose problems, report the problem, and even automatically correct the problem.
Other Related Security Policies
Sometimes other external policies are required for proper and secure operation of the key management systems. These should be included in the key management policy. These policies are layered just below the KMS Security Policy, and it directs their actions by providing inputs based on their assigned functions. These policies would also return outputs to the higher levels to verify their compliance with the system requirements. These external policies would also include inputs related to the more advanced technical factors, such as security standards and possible threats to data. An example of an external policy is a document stating how physical protection and access control is provided to assure protection of the key management system itself. The key management system could be designed and implemented to provide these features, or they could be provided by the facility in which the key management system is installed and operated.
Domain Security Policy
One of the more important policies layered below the KMS Security Policy is the Domain Security Policy. This policy provides the rules and restrictions that allow computers, networks, applications, and users in the same domain to exchange and process data, keys, and metadata with the given protection stated in the policy. If the domains of two entities are different, they can communicate only if certain conditions are satisfied. For example, if a certain subset of the provided protections satisfy both domain security policies, communication can take place between the two entities, but it is limited according to the equivalent portion of the policies.
Using a key management system designed for a market segment
Normally, a standard off-the-shelf key management system design will not have the capabilities or features in its design that would satisfy the requirements of all organizations. They are usually designed to support the market segment which the key management system is meant for. An organization looking to utilize a key management system should consider the capabilities and features documented by the designer of the key management system. These documents should be reviewed by the organization, and modified to develop a KMS Security Policy to suit the needs of the organization.
In airport. Last leg. VLDI uses 3rd party cryptography. VLDI has no encryption algorithm. PERIOD.
They make policy decision. Only for Windows. No mobile. Thy have no approval from mobile makers. They need their policy crap to be integrated with mobile stacks. Guess what. They have not even applied. To make a software to complement with another software and not knowing what it is is BS
Secure mestaging includes video and audio like WhatsApp. VLDI big 0 in video and audio.
US agencies need AES crytopgraphy. Big 0 to VLDI.
Ask BB for performance synch for data for Windows. Crap.
Wily yes it is not she. It is he. Typed fast.
Mon will release the report.
R
Back to San Diago Friday night. Will text more.
Ask BB does he know below person and did she contact SAIC. BB will become quite
Sidney Kahoonei
Background Information
Employment History
Executive Director
Validian Corporation
Managing Partner for Corporate and Government Solutions
The Dumbarton Group
Principal Partner
Helius Group LLC
Senior Executive
Science Applications International Corporation
In road back home Friday. Will detail more
1. Vldi says all algorithm 3rd party. Still do not support AES that many uses. Statement they cover 90 percent is false.
2. Do not support complimenting Knox for Android and iOS Crptography. They will not work with VLDI. No approval for them to release stacks to VLDI. Utter rubbish it works in mobile.
3. SAIC report they have to be careful. Do not ask if you do not want others to see.
4. To develop for mobile VLDI needs approval. They have none. No certification for any agencies. Putting the ball their partner wl approve is a crap.
5. Failed all performance test for Windows OS.
RAH
Heard from Jungle drums Russia and US in their joint cyber group would be adopting VLDI VP as global product. Special request from Putin. Wonderful day for VLDI. BB would get noble prize for developing such a product without having any knowledge. Next frontier to get North Koreans adopt it too.
Go VLDI Go.
I posted the results. BB can confirm. Our NDA ended June 30th. Failed every single time
Corrupted the data
No voice and video support
No AES support
No links to Android and iOS security stacks
BB is smart. BB talks wonder. BB made 20 M for himself. His downfall would be the greed. BB can only milk as much as he can. He deferred killing VLDI by 3 more months. Will move to Ghantet and take it public.his track record from Topaz shows he will milk as much as he can. Between Topaz and vldi he may 36 M. Not bad
Knox is NSA certified. Many secure agencies use AES. most of 26 algorithms that VP is supposed to support are junk. For mobile there is no option other than complementing Android or IOS security stacks. iOS has advanced sets. VLDI VP has O links. They are not in list for Google or Apple to provide links. Security for W OS is different from Android which is different from iOS. Cloud has its own complexity.
For any policy sync has to work, it has to be real time. Biggest issue is voice and video get distorted even with small time gap
World developers knows it. There is a balance between how much security provisioning versus speed to do it. Knox balances as any other tools. People can break if it has been set to do real time and loose some provisioning. It is not something new
VLDI VP has big ZERO in provisioning. Can never work with voice and video. For data huge delay and corrupted. No token brokers scheme for Cloud.
No interface to iOS cryptography. No interface to Knox. No support to AES
Designed by a washed up CFO and is becoming a painful joke.
Results will never LIE
They failed 18 out of 18 times.
VLDI VP Test results
Video links. No voice sync at all. Input video 1.8 Mb. Output corrupted at 7.3 Mb
Voice links. No sync at all
Data sync. 7 seconds to sync. Input size 520 Kb. Output corrupted at 14 plus Mb
The results for W OS
For Android, they have Knox a NSA certified. To modify or compliment VLDI VP needs Knox interface. To get interface info, company needs to be approved. VLDI has none
For iOS it is the same
For cloud one needs TA agent information. VLDI VP has 0
No support for AES
NUT SHELL. SPIN ON A SPIN
The below from iOS. A company needs approval from Apple to tinker it or supplement it. VLDI has none. More complex is when u send a data from iOS to Android or W OS. To add more is cloud. How do an application use cloud broker agents to save or redirect traffic. Painful joke is VLDI VP has all these without any certification or approval. Ofcourse they do not need since it is being designed by future genius BB
......
At a Glance FOR IOS
Some of the cryptographic services provided by iOS and OS X include:
Encryption and decryption (both general-purpose and special-purpose)
Key management using keychains
Cryptographically strong random number generation
Secure communication
Secure storage using FileVault and iOS File Protection
I never left any company. What you hear is another spin.
There is major difference between application developed for mobile versus application touching the security layer.
For the earlier, companies develops applications and get it notified and certified and submit to application stores
FOR THE LATER TOUCHING SECURITY LAYER, a company needs to register and certify. Than Google or iOS will provide security stacks interface. A MOBILE CANNOT HAVE TWO SECURITY STACKS RUNNING IN PARALLEL. VLDI DOES NOT HAVE ANYTHING FOR MOBILE. SPIN ON A SPIN. I WONDER IF THEY EVEN KNOW THE PROCESS.
THERE IS NOTHING LIKE LIBRARIES.
Two step Cyber universally followed. Encryption strength and policy data sync.
For the earlier AES is advanced and used by all Vital Companies/Agencies. What has been listed is old. Many of them do not even support mobile. Statement saying it supports 26 algorithms is FALSE. VLDI DOES NOT SUPPORT AES. VERY EASY TO GUESS WHY.
For the later there is no sync absolutely even for W OS. COMPLETELY NON REAL TIME AND CORRUPTS DATA. CAN NEVER BE USED IN REAL OR CLOUD.
VLDI LACKS
A. SUPPORT FOR AES
B. MANY OF THE ALGORITHMS ARE OLD AND DO NOT SUPPORT MOBILE OR SOPHISTICATED CLOUD
C. NOT EVEN THIRTY PERCENT TO ANDROID KNOX OR IOS BST
D. NO REAL TIME SYNCH
E. NO REGISTRATION TO GET SECURITY APPLICATION LINKS
THERE IS NO USE INTEGRATING VLDI TO THIRD PARTY APPLICATIONS BECAUSE STILL THEY HAVE TO ACCESS MOBILE SECURITY INFORMATION. IF THE THIRD PARTY APPLICATION DOES IT, WHAT IS THE USE OF VLDI. IT ONLY ADDS UP 7 SECONDS PARTIAL SYNCH. IT IS NOT LIKE ADDING LIBRARIES FOR TO INTEGRATE WITH MOBILE SECURITY STACKS.
MOBILE PHONES MAKERS WILL WASH THEIR HANDS OUT IF SOMEONE TRIES TO BREAK IN. THEY ARE OPEN TO GIVING INFORMATION TO INTEGRATE IF A COMPANY CERTIFIES AND REGISTERS WITH THEM
IN A NUT SHELL, ALL ARE SPIN ON A SPIN.
I am still happily employed as group lead for Cyber warfare in SDiego. No one kicked me out.
The cyber protection is two fold
The first is integrity of encryption algorithm. The most powerful is AES. Others are micky mouse. VP does not support AES like Android Knox.
The second is policy key synchronization. The challenge is how to synchronize transmit and receive end. More complex is if the transmit and receive ends are in different operating system. For example Android phone transmitting to iOS phone. To master this, a company needs to get approval for OS intricacies. VLDI is not even known by Google Apps department. How can VLDI do the Android links without having their security stack API. They do not since they are not even registered.
What they showed is water down method for W OS. Even than the syn did not happen. It took 7 seconds to get partial synch. Voice and data are real time. No one waits to hear a partial corrupted voice after 7 seconds
VLDI VP drawbacks are no support for AES, lack of synching real time for W OS, no links to security API for Android and iOS, since they are not even registered to get them
For BB to design next cyber proof system with 0 knowledge in AES, Security stacks API is a a painful joke
Do anyone now what these 26 algorithms are. We saw it. None belongs to VLDI . VLDI supposed to synch these algorithms in both side dynamically. Failed at every attempt. Corrupted the data. No way it can adopted to cloud. Spin from BB their designer
In data traffic, policy management between sender and reciever has to be synchroized. VLDI VP for more than 99 percent of time fails in synchronization. Data traffic gets corrupted. No point in saving or protecting a data if it leads to corrupting it.
I have seen VP. A crap. If they get 1 dollar revenue from known client is bottom line. Not shell companies
To apply for a patent, a company has to have something unique. IP. VLDI has none. Outsourced development is not IP. Recycled spaghetti code is not IP.
NO ONE HAS SEEN A WORKING VP. THAT IS A FACT. IF ANYONE SAYS OTHERWISE IS SPINNING STORIES.
VLDI SALES PERSON IS BB. IF ANYONE HAS TALKED TO A SALES PERSON OTHER THAN BB, SPINNING STORIES
You may not be right mate.
Their solution delays the traffic by 10 sec. It does not work smoothly. No one will use it.
It has solved no problems. Created problems.
Not sure how you got the good feel about VLDI
Given
NO ONE HAS SEEN THE PRODUCT EXCEPT VIA SAIC (WAS EXPOSED)
NO ONE HAS TALKED TO ANY VLDI SALES OR TECHNICAL STAFFS
NO 3RD PARTY COMMUNITY IS AWARE OF VLDI
RUN AND DESIGNED BY WASHED UP CFO
NO FACILITY TO GO TO
3RD RATED WEB SITE WITH CRAP DOCUMENTS
RECYCLED PRS
NO ANDROID OR IOS COMMUNITY APPROVAL
NO COMPANY MENTIONING VLDI
And Yet
PEOPLE TALK ABOUT MILLION END POINTS
SOME COMPANY IN STEALTH INTEGRATING VLDI
WASHEDUP CFO BB HAS DESIGNED NEXT CYBER CROWN JEWEL
Now BB has new words to add in his upcoming PRs
Jeez, we have to wait for VLDI VP for 5 more years
Safari web browser was done in four years. iPHONE was designed and developed in six years. Android OS from scratch was implemented in 5 years.
Guess what
VLDI for 15 years designed by washed up CFO with no product team
Has no credibility within Industry experts
Has no customers apart from BB shell
Has no raod map
Has no certification
Has no links to Google Androd and iOS license team
Can keep on going Mate.
Mate they do not have a working product. If their CTO is washed up CFO, what makes you assume he can design absolute cyber proof solution. BB is spinning stories to make money and have a great life. Heard he is planning to go to Spain for vacation and needs money. Washed up CEO/CFO/CLO/CTO sitting in home designing product and spinning stories.
It had several industry technology experts, capable development team, solid product development team, strong directors. Keep on going.
VLDI one man show. Washed up CFO as CTO, Product officer and only board member
Valuation counts when there is a REAL product. Working product to address niche market
VLDI has
NO PRODUCT
NO DEVELOPMENT TEAM
NO CTO
NO INDUSTRY EXPERTS
NO THIRD PARTY VALIDATION
NO APPROVAL FROM GOOGLE ANDROID AND APPLE
NO ONE HAS INTEGRATED
USELESS 3RD RATED WEB SITE WITH 4 YEARS MATERIAL
GARBAGE PRs WITH NO AUTHENCITY
NO SUPPORT TEAM
NO FACILITY
I CAN KEEP ON GOING
COMPARING VLDI TO ANYTHING ELSE IS USELESS. OTHERS HAD PRODUCTS. VLDI BIG ZERO ZERO ZERO
Mate, 29 more days to go
June is hear soon. BB master stroke to screw prople and bye to new venture to suck new people. Good luck
Washed up finance scam artist BB the CTO
BB never started any companies and sold. Scam bogus artist
VLDI no company no IP no people
BB swallowing 33 M in sales and administration money
BB starting shell companies to scam more
Washed up Chris part of the scam team
Got kicked out by SAIC
Lies in 10Q about trade shows
Enjoys resorts in others money
Tell me what is wrong in above.
No product, no IP, no certification, no people.
Scam of the biggest kind
Look out for June.
From VLDI web site. Data sheet. They do not have Linux server based. All servers for messaging are Linux based. They still say MS 2008. No mention of iOS.
From their site and their data sheet
System Requirements
ValidianTM Protect Server 3.1
• Windows Server 2003/2008 or Windows Small
Business Server 2003/2008
• 2 GB RAM
• 80 MB disk space
• Intel Pentium 4 or equivalent
• Static IP address and dedicated firewall port
ValidianTM Protect SDK 3.1
• Windows XP/Vista/7
• 1 GB RAM
• 40 MB disk space
• Intel Pentium 4 or equivalent
• Visual Studio 2005
ValidianTM Protect Runtime 3.1
• Windows XP/Vista/7, Windows Server 2003/2008
or Windows Small Business Server 2003/2008
• Android 4.0.3 and greater
• 512 MB RAM
• 20 MB disk space
• Intel Pentium 4 or equivalent
VLDI
Has no office
No board of directors
No check and balance
Paid and paying lot of money to pump them up
End game if no value added product is no result
BB applying lipstick to pig and hopes suckers buy in
He is gone July to milk another company
This could be valid if they have a real product. They do NOT.
Just like if one puts a lipstick to a pig it will not turn to a princess.
BB by adding a lie to a fraud cannot make it real
If any one prove me wrong I quit.
I said
No company
No BOD
No SDS partner
No SCS partner
No certifications
No big company discussion
Ganthet is BBs
Bum Chris is underdog
BB in Geneva
BB transfeared VLDI payed crap messaging to Ganthet
Future
BB will milk and spit VLDI
Go milk Gather
MATE ASK VLDI WHERE CAN I FIND IOS CERTIFICATION FROM APPLE AND ANDROID CERTIFICATION FROM GOOGLE
THEIR SITES SAYS THEY HAVE NEVER HEARD VALIDIAN
ONE CANNOT PLUCK A SOLUTION FROM THIN AIR WITHOUT FOLLOWING PROCESS.
Mate if one never had a product or success than there is no failure.
VLDI has no proven product or certification for ios and android and yet they lie that they have application working on them
Not even a brochure with third rated web site. No booard, management, staffs and yet we have to believe they have earth shtattering solution
There is NO FAILURE IF ONE DOES NOT HAVE A PROVEN PRODUCT OR A SUCCESS
MYTHS WILL NOT WORK FOR BB.
MATE YOU HAVE GOOD SENSE I' HUMOR.
I PUT IN CAPS. MAYBE SHOULD ADOPT " IF AND ELSE".
YOU HAVE GOOD HUMOR TOO. YOU CALLED ME DAVID TOO.
ONE WASHED UP CFO WHO SUNK MULTIPLE COMPANIES AND WITH NO BOARD AND NO IOS - ANDROID CERTIFICATION, NO GOVERNMENT CERTIFICATION WITH NO MANAGEMENT TEAM AND NO SUPPORT TEAM DEVELOPING 21ST CENTURY PRODUCT
AND
PLEASE AFTER MISLEADING 15 YEARS AND SWALLOWING 31 MILLION
AND
PLEASE PLEASE AFTER BUILDING CRAP MESSAGING VIA MACEDONIAN WITH VLDI FUNDING AND TRANSEFERRING TO GANTHET WITH 0 FOR VLDI SHAREHOLDERS
AND
PLEASE PLEASE TRYING TO MILK AND KILL VLDI AND MOVE OVER TO GANTHET TO MILK.
AND
PLEASE AND PLEASE WHAT IS YOUR TIE WITH BB IN MONETARY.
PLEASE AND PLEASE WE ARE NOT IDIOTS
Sorry to break your heart mate. There is no board. One man board. No management team. One man team
Mate you are right on
People are stupid to think
One needs Apple itune or Google playstore to certify applications for ios and android. They do not know washed up CFO BB does not need it
One needs Government testing lab to certify for interoperability. Again the public fools do not know washed up CFO BB calibre
One needs a support structure to support. How can public be so stupid. Washed up CFO BB has introduced 22nd century plan. What Support
One needs a company. BB what what. PR will milk money. Dilution will make money
Final words from washed up CFO
Thank you for 30 Million to pocker. Need 30 more. Get me
Paid by VLDI shareholders
Where is it now
Ganthet
Why
BB wants to milk VLDI and close it and milk Ganthet
Why
BB wants to make 30 extra million.
Why
BB wants to enjoy travel
Why
BB thinks public are suckers
I told three. He said three. He changed words after seeing my statement.
Original statement was to include two companies under NDA and name a small third one.
BB knows he cannot rattle any more stories.
Desperate people do desperate things