COPY PROTECTION ANTI-THEFT

 

COPY PROTECTION ANTI-THEFT FOR YOUR APPLICATIONS

 

The Personal Virtual Drive Encryption Engine can protect your valuable applications when sold for laptops, desktop computers, removable hard drives or mobile devices. It is very secure and requires no formal training. This is a personal and not a networked application.

Your application is encrypted for each device with a unique encryption generated by two unique device related MAC#s or Unique Identifiers (UID) and a generic Whitenoise Identity Management key that is far greater than 25,000 bits in strength. Your application resides in an encrypted state in its own virtual container.

The Virtual Disk Encryption Engine (VDEE) allows you to secure all your applications on personal devices with unbreakable, 25,000 bit plus, one-time-pad encryption.

Nobody has ever broken Whitenoise - not any government, not Anonymous, not universities, not Black Hat and not Defcon. They go silent when you say "demonstrate any claims to the contrary".

When your application is installed it is protected from hackers and would-be thieves.

A virtual container is created and your applications are automatically saved with strong encryption. There is NO change in device use. There is no integration with any other device applications.

Your intellectual property is secure when it is run from its own unique container. Only the portions in use at any given moment are in an unencrypted state in memory. The application is never completely decrypted.

Regardless, your application is specific to a device and can only be used with that device. A copy won't work.

This application is so fast it can play doubly encrypted media without perceptible latency.

 

VDEE

VDEE creates your unique, private, unbreakable, one-time-pad key.

A Whitenoise key is comprised of a variable number of prime number length subkeys that are populated with random data. Each corresponding bit is XOr'd between subkeys to create a deterministic but random key. Only the subkey structure and offsets need to be saved to recreate this key. There are different case specific means of creating unique, unbreakable keys far greater than 25,000 bits in strength.

How are the keys created for the Virtual Drive Encryption Engine (VDEE)?

The first step of the procedure is the stripping of a MAC #, a machine component identifier, that is unique for every component.

This MAC number, which is a hexadecimal value, is then arbitrarily parsed into two values that are non-perfect square values. These two values will then serve as the seed values for the Whitenoise encryption process.

These two values replace the seed values used as the first step of the generic Whitenoise process that utilizes random, non-perfect square values generated from a random number generator on a computer or device.

The rest of the Whitenoise process proceeds along Whitenoise specifications and the resultant key template is stored on the machine where the program is being installed.

During install of an application or files, the application is installed in an encrypted fashion utilizing seeds derived from the target machines MAC# or other identifiers.

This process results in the application being installed on a specific machine with a specific and unique iteration of Whitenoise. Should a hacker copy the application for install on another computer or device, it will be unusable since it is encrypted for a specific machine. Any subsequent machines will have different MAC#s and therefore will not be able to generate the appropriate key need to decrypt the application during use.

At no point are keys in this specific process ever transferred.

This means that any remote hacking cannot get any information that may be opened or played on another device.

 

Let us know how we may help you or answer your questions.

Home