Tag Archives: Data vault

Moments of clarity

It happens, we all have them and at times we do not know how it interacts with reality. For me it started yesterday. I was at first thinking No Ware, No where, Know Wear, Know What and so on, like a train, phonetic phrases. This took me back to a moment in the 80’s when I came across the idea for a phonetic virus. A virus that when played on a PC it does nothing, when on played on an Apple with a RISC processor it stops processes and other elements. Nothing destructive, merely disruptive. I never brought it into play for the reason that I had a job and I was too busy for anything else but work. So in that setting my mind starting mulling a few things over.

Local awareness
The setting is that there is no real way to keep things safe, pretty much any cloud system can be transgressed upon. I got there by the MSNBC article ‘U.S. Marshals Service suffers ‘major’ security breach that compromises sensitive information, senior law enforcement officials say’, nothing really new, Solarwinds brought that to the surface, the April 2021 events brought that to the surface and that was not the first event, more has happened that overthrows the statements regarding ‘Data at rest’ and ‘Data in motion’. The data vault programs on the iPad merely heightens the issue to a much higher and a much more visible event. We need programs that reserve memory on mobiles and make sure that it is local only, the idea to put it ‘safely’ in the cloud is a joke that is much bigger than the Titanic.

QR codes
Then I moved towards replacing the QR codes. There is nothing wrong with the QR code, it is an awesome invention, but there is a geriatric need. Many of these people are not good with their phone camera’s, and at times the use of such a code could have larger ramifications.

I came up with an idea. 4 blocks of 12 characters consisting of either A, C, D, E, G, H, K, L, M, P, S, T, U, W, X, Z, even with camera on an angle, there is every chance to repair the image and code. The 16 letters could represent a hexadecimal code, the 4 number groups separating the blocks could have all kind of uses and the hash in the middle is a check number keeping it all in balance and offer some kind of stage to repair the unclear image of such a code.

My initial use was to encrypt medication so that an image could help doctors when needed, but its use is much larger as I am imagining it. 

These elements are connected, but not essentially so. I was brainstorming on the use of different approaches to keep usage of data private. The approach could become larger, but that is what we all think of our ideas. Will it work? I cannot tell, there is a direct market to keep private for everyone, these so called providers come up with an idea and then place it in the cloud where EVERYONE can get a hand on it. There is a need to change things and others are seeing that stage evolve right now. 

 But it was an idea I have no real intentions to pursue and as such it made for a nice story on my blog. So have at it and have a great day

Leave a comment

Filed under IT, Science

Wanna be rich?

This is a setting that is not for me, I am not a programmer, I do know my limits. I had a need and on the iPad (first generation), I had a data vault, it worked perfectly, but not anymore, now that I have a 4th generation iPad Air, I found the funny side of Apple apps (it is an actual joke). When investigating the new apps, I found well over two dozen other ones, yet they are all copies of one another, all giving us pics of sexy ladies and the owner of the app (most likely a man), that person needs to keep the images of his neighbours daughter a secret. Most of them all having the same idea, none of them acting on business principles. 

You see, an actual data vault have 2 elements, the first is the iPad, that is the vault that needs to hold the data, the provider (any laptop) needs to synch and there the issue starts well over 50% relies on a camera roll, the rest on other means (all equally useless), then there are a few apps that require a monthly fee, none of them get it, all of them in the naughty picture mode, yet there is a whole range of consultants that need an actual vault.

As you see in the image, there is a USB stick (or network location) that the computer or laptop can access. That links to the iPad. Yet there is no good link and the links that are offered, so far none of them properly work. And there the foot becomes even more uncomfortable. You see, it is not merely images, the folder needs to contain JPG, PDF, MP3, MP4, MOV, XLS, DOC (optionally), es well as TXT files. Consultants come in many forms and directions, from accountants and actors through to X-ray Technologist, they all have projects that need to be kept ‘hidden’ only shown to a chosen few. It can be any sort of project, but the people (like me) do not trust anyone and there can be no copies out in the open, so we need a data vault, we need to load USB sticks (or network directories) and there is no trust in the cloud (not with well over 90% of cloud transgressions). 

And none of these data vaults seem to understand that, so there is not one app, there needs to be two apps, one on the computer, one on the iPad, the computer links to the iPad and that is the setting of an actual data vault, the app makers that act on cool are missing millions in revenue, I would happily pay the $10 for that and hundreds of thousands of consultants as well. Consider the tens of thousands of real estate agents who settle the deals for dozens of houses and apartments going well into the tens of millions of dollars. New York at any given time have well over 4,000 places and most of them are set to ‘Price on request’ and a few other restrictions, and those estate dealers are merely one in a very long line of consultants that have an actual data vault need. Customer and client details that they need to keep hidden, so that a stolen iPad leaves the thief with nothing. 

That is the app that is needed and no one figured that in Apple land, so who else is missing parts in all this? Oh, and I know that there are other tablets, but most of us all use iPad.

Leave a comment

Filed under IT, Science

The speed of rumours

Yes, we have all heard of the speed of sound and the speed of light, yet have you heard of the speed of rumours? In this, I was amazed at how quick it actually is. On the 14th of November, I wrote ‘Outdated?’ (At https://lawlordtobe.com/2020/11/14/outdated/), and now, less than 9 days later we see the Guardian give us “State-sponsored hackers from China, Russia, Iran and North Korea are engaged in concerted attempts to steal coronavirus vaccine secrets in what security experts describe as “an intellectual property war”” and those are merely the ones they are willing to name, yet the larger stage is that ANY and ALL IP is under duress, if ownership can be reregistered, as such I see the need for a clear data vault, without it I am keeping my IP on the one system that never connects to the internet, is never networking and is never handed out of hands. It is (for now) safe. And all these so called data vaults in the Apple app store can reconsider what they are, because as I see it they are many vaults, but not really a data vault, what a surprise. 

So as we take notice of “The cyber struggle involves western intelligence agencies, including Britain’s National Cyber Security Centre, who say they are committed to protecting “our most critical assets”. But they discuss only a fraction of their work in public”, I merely wonder what our side is up to, with the US as broke as it is, with the media filtering what people are allowed to know, the issue is not who can we trust, but is there anyone left to trust? I know that this is not the way we tend to feel on Monday morning, but when will we feel ready? Even as the news is limiting the scope through “Adam Meyers, senior vice-president at the IT security specialists Crowdstrike, said countries including Russia and China had been engaged in hacking western companies and agencies “for the past 20 years””, I tried to bring you up to speed with with Hollywood and how easy they find it to reassign ownership, there are a few cases out there, and how protected were the original creators, Do you think that 5G IP is any safer? Do you think that given a chance, corporations are even hesitating to claim millions, of not billions? I cannot guarantee that Huawei would keep its word, yet would Amazon or IBM? Google has a larger disadvantage, this gets out and as such they would get a brain drain the size that could snowball into the greatest loss they ever faced. But the settings out there are not in favour of the average inventor and for some of us time is running out, making it public domain is all we might have, in that field the cheapest maker gets the largest slice and when that is out, they get hired for a nice fee and it is what comes next that gets the money rolling. It might be the only option for some. So when we are told “western governments remain reluctant to point the finger of blame in all cases of hacking attacks for fear of diplomatic repercussions, with the UK, for example, particularly cautious about accusing China”, I am wondering what the reluctance is, I am speculating that it is not merely governments, it is the large corporations directing some key people in those governments. The Financial Times gives us (at https://www.ft.com/content/26903a94-3617-11ea-ac3c-f68c10993b04) ‘Americans are wrong to paint China as an intellectual property thief’, as well as “Now that the US has reached the top of the ladder of tech supremacy, it wants to kick it away”. In all this, we take notice of “the US made the claim that China’s IP theft violated “public morals” prevailing in US society, while noting that such behaviour “may not offend China’s sense of public morals”. That allegation is both wrong and offensive. IP violations bring about civil, administrative and even criminal penalties in China, as well as in the US. China cherishes a culture of fair competition and respect for innovation. “To steal a book is an elegant offence,” has long been misread as a permissive aphorism peculiar to Chinese culture”, yet the setting is larger, when you do the Google searches on IP theft by the US you find none, only mentions of China stealing from the US and they tend to be opinion pieces and allegations, a lot of them absent of any level of evidence. It does not add up, there is no mention of the scripts that were ‘reacquired’ other events that I know happened do not get a mention, the setting is too unbalanced, and I do not trust any equation that unbalanced. Yet the article is failing in one respect, it does not show the imbalance that iterators versus innovator bring and that is important, Huawei is only the first of I reckon a dozen that can conquer others a dozen times over. It is the larger setting we face, because we face it now as the underdog, 30 years ago the lines were blurry, now we see that China has telecom, cars, motorcycles, an d many more, it is now the world’s leading manufacturer of chemical fertilisers, cement, and steel. A stage that remains growing in a time when the US and the EU are in a stage of mounting debts, a system of deranged stupidity and we are all idly sitting by, whilst the captains of balance sheets are setting another tone and in this we all get slammed, Some might say we are getting hammered, yet in the UK they will think we are merely getting drunk. Yet the Wirecard issues which is costing some $2,200,000,000 is merely the beginning of a larger stage and soon the players need whatever IP they can get, just to keep their heads above the water. And in all this thousands of inventors are trying to keep whatever they had secure, all whilst app stores are looking at data vaults and think it is to keep pictures safe by transferring them via a camera roll, yes really inventive move!

So what is being done (nation by nation) to keep IP safe? With 70% of the cloud getting hacked, I do not think that will be the place to keep them, but that is merely my idea.

Have a fun Monday!

Leave a comment

Filed under IT, Law, Media, Politics, Science