Home > Boards > US Listed > Computers - Networks > Vertical Computer Systems Inc. (VCSY)

Yes, it is true.

Public Reply | Private Reply | Keep | Last ReadPost New MsgReplies (1) | Next 10 | Previous | Next
RLHMAN Member Profile
 
Followed By 4
Posts 597
Boards Moderated 0
Alias Born 11/28/09
160x600 placeholder
RLHMAN   Monday, 12/31/18 03:50:28 PM
Re: RLHMAN post# 1431
Post # of 1495 
Yes, it is true.

The encryption mechanism has been in the product for probably 2 years now. Initial releases had it turned off because it was causing issues that needed to be resolved. I remember very clearly Luiz and Harold explaining that they were encrypting the data and then wrapping that in another encryption layer. Harold referred to it as a box within a box. I didn't fully understand it at the time because I am not an encryption expert, but when they used the phrase "standard dynamic key encryption" in the PR, light bulbs went off and I did some research. The following description on the Dencrypt site matched what I had been told:

Dynamic Encryption provides extra protection, as not only the encryption keys but also the configuration of the crypto system change for each data transfer. The inner encryption algorithm (e.g. AES-256 or national algorithm) is wrapped by an outer Dynamic Encryption algorithm. When the data transfer is complete, the encryption algorithm is discarded, which leaves no way of introducing master keys for data inspection.

I can only presume that they got a license to use it or they in some other way found a way to legally use the concept. This is good news for the product because it would make it very difficult to hack. When you send an encrypted message today say on a website that supports HTTPS or TLS (which has replaced SSL), the data is encrypted as a single stream of data. What this technology does is to take that encrypted data stream, chunk it up into smaller pieces and encrypt each piece, each with their own key. A hacker may be able to decrypt a segment but they would then need the key to decrypt what's inside. To be able to decrypt every piece and then reassemble the stream and decrypt that would require a ton of processing power and a LOT of time, if it's even possible to do with today's technology. Perhaps quantum computers might be able to do it, but they are quite a ways off.

Look, I know people here think I am pissing in their Cheerios, but as I said in the earlier posts, this is a positive event. I am cautious because Richard has given shareholders 20 years worth of reasons to be cautious. I have always been impressed with the technology and with Luiz and Harold. They're both very smart. The problem with VCSY has always been leadership or lack thereof. Let's see what gets released on the 7th. Even if it's not perfect, they will have finally crossed the Rubicon and the full capsule will have been released, which is what Richard has stated in the FAQ is what they are waiting for to open a marketing campaign.

A very happy New Year to all of you!


Public Reply | Private Reply | Keep | Last ReadPost New MsgReplies (1) | Next 10 | Previous | Next
Follow Board Follow Board Keyboard Shortcuts Report TOS Violation
X
Current Price
Change
Volume
Detailed Quote - Discussion Board
Intraday Chart
+/- to Watchlist