Whitenoise is a globally patented Identity Management capability developed by Whitenoise Laboratories (Canada) Inc . It is ideal for providing all network security controls with a single key including: perfect identity, secure network access, continuous dynamic authentication, authorization, signature, repudiation, inherent intrusion detection and automatic revocation.
One distributed key creates an infinite number of one-time-pads!
Richard H. L. Marshall, Esq., the former Director of Global Cyber Security for the U.S. Department of Homeland Security is the CEO of Whitenoise Laboratories Canada Inc. Mr. Marshall is globally recognized as one of the leading thought experts on cyber security policy and international cyber security law.
Do 20 minutes of due diligence on these innovative and revolutionary cyber security sciences and prove their efficacy to yourself:
What is historical and unique about a Whitenoise key?
Executive Overview - 2 minute read -
How does DIVA work?
This is the intellectual property that takes an exponential Whitenoise key, exploits the exponential length of the key to deploy it as a one-time-pad (unbreakable), and explains why it is resistant to all known attacks. 3 minute video.
How is a Whitenoise key created?
How can just a few hundred bytes of key structure information create a key stream greater than 100 billion bytes long? Why is there virtually no processing overhead? Why is it so fast and strong? 3 minute video.
Make a Whitenoise key yourself. Prove it to yourself and test it!
You just saw how a Whitenoise key is created. Now do it yourself!
10 minutes to install, create a key, and do AES style speed and key randomness testing.
This is EASY enough for any executive. At minimum, you just need to pass pass this link to your security lead. They know what a one-time-pad means. Privacy and security is our collective responsibility - and this will give you a distinct differentiator and competitive advantage over your business competitors. Besides doing the right thing, it is good business.
Take a moment and pass this link to your security lead and 10 colleagues that are as concerned about Privacy and Security as we all are. They can be proving great security science to themselves in minutes:
Download the Whitenoise key generation and speed tester. 1 minute to download and install.
There is no appreciable overhead added to your networks and applications for unbreakable security. Do a fast test - after you create a key or use a key to encrypt a file, try to compress it with PKZip or 7Zip. It will not compress because it is perfectly random.
Streaming, Digital Rights Management and high volume Big Data contexts; and secure data storage!
Testing - just 20 minutes more for the extras.
For those interested in streaming applications, multi-media, video technologies and high volume, high data real-time applications please review the following materials and test it out and prove it to yourself now! You can play doubly encrypted data without any noticeable latency to the end user and be able to completely secure all your content and assign provenance.
The global entertainment industry has been in a conundrum about how to protect intellectual property and how to control the use of THEIR content.
The following links show how to fix the entire problem in one or two product cycles globally using a chip deployment (same chip as used for Side Channel attack resistance) or a firmware upgrade. The entire entertainment industry can be morphed into a virtual "bricks and mortar framework" returning us to the times where a complete CD cost a few dollars, concert tickets return to $20, artists get paid, entertainment industry makes money hand over fist, and apologists justifying the theft of artistic intellectual property are reigned in. It is simple.
The solution is explained at the tail end of the above paper. It explains the simple logical solution to plugging the "analog hole." This is the context where encrypted media needs to be decrypted to be played, and when the signal is decrypted it is available for capture and copying.
You can rapidly test the encrypted streaming utility in 20 more well spent minutes.
Download an encrypted media file about the British Columbia Institute of Technology. http://www.wnlabs.com/downloads/BCIT_VIDEO.AVI.wnm.zip
Install the streaming demo software application. Copy it to a USB flash drive key and then follow installation instructions. Install the application and the codec for MicroSoft media player. The reason that you are installing the application from a USB drive is so that during testing you can remove the key and see that they media will not play without the correct key. The media that you are testing and playing is encrypted with Whitenoise.
Take your testing one step further!
Install the Hard Disk Drive Encryptor - 2 minutes
This application facilitates the automate storage of work data etc. without any change whatsoever in user behavior. Data is stored encrypted in a unique virtual container automatically.
Save the media file you just tested to a virtual container in the Hard Disk Drive application. This file is now DOUBLY ENCRYPTED. Play the media file and you will see that even with two decryption steps that the media file plays without any perceptible latency!
Share these links with your security programming lead and 10 other persons that are as concerned about balancing between Privacy and Security as we are.
Find more information for due diligence, studies, videos, demos etc. at www.wnlabs.com or on the following Linked In site.
For technical questions, more presentations, demonstrations, videos, downloads, security and performance analyses and more please visit Linked In:
Or write directly to Andre Brisson, founder of Whitenoise Laboratoties Canada Inc. with any questions or problems you need solved:
As we have for years, we continue to challenge any government, institution, universities, labs, and hackers to break a Whitenoise key.
A Whitenoise key HAS NEVER BEEN BROKEN: http://wnlabs.com/news/challengeDEFCON.php
Learn why they cannot break a Whitenoise key: Read and download a short executive overview of Whitenoise technologies.
DIVA and Whitenoise work seamlessly with public key systems to fix their fatal flaws creating a two channel multi-authentication-factor framework. A hacker needs to break two different systems, one of them dynamic (DIVA), simultaneously.
In addition to our licenses for developers, and general commercial purposes, there are two kinds of additional licensing opportunities:
We can provide licenses for government-only-use, often in perptuity, for a flat fixed fee. These licenses do not encumber us from working with other governments and do not allow those governments to restric our exclusive marketing rights into the commercial markets of those countries.
We can also provide licenses for the commercial use of the technology for random number generation for telecommunications, banking, e-commerce, quantum computing etc..
Prominent global computer services are said to be considering discontinuing the use of the NIST approved deterministic random number generator (RNG) . The lack of randomness of this RNG is creating unnecessary security vulnerabilities. Whitenoise is the most random deterministic random number generator (RNG) ever created.
Understanding truths is more important than ever now in 2013, as it is generally accepted that government agencies in many countries can break any existing cryptographic algorithm other than Whitenoise. They are not only doing this with traditional cryptanalytic techniques and mathematical short cuts but also with the ability to steal keys clandestinely. Unfortunately they are now able to break any encrypted data (cipher text) without keys, just using the sheer computational power and speeds available in today's computers and brute force on the data you wrongly believe to be secure. Previously relied upon encryption algorithms simply do not produce random enough encrypted data.
We are faced with the stark reality that unless Whitenoise and DIVA are deployed that there is not a single secure public network on earth.
We believe everyone should have security and privacy at a reasonable cost.