A bat phone, in business jargon, is a private telephone number that is handled at a higher priority than a public line.
Project XIII uses AES Keys for data encrption.
The service, Project XIII, doesn’t know what you are moving around.
We can only see the meta data; not the actual data itself.
After three days the Data Flow Hub (typically server) will delete the data. So not only is the data encrypted on the Data Flow Hub but it is removed.
The Data Flow Hub does not keep the AES Key. It never has access to it.
There is no way to mine the data to figure out what you’re posting, messaging, taking pictures of, etc. That being said there’s a couple of weak spots:
When the AES Keys are exchanged they are encrypted by a system key.
This weakness will be resolved by issuing user RSA Keys and encrypting that transaction with the RSA Key.
The other weakness is each device. If you leave a phone somewhere or someone steals your computer they have access to the data left on it.
We really can’t do anything about that.
So please be careful with your devices and remember that you are in possession of someone elses data and act accordingly.
.
Bat Phones
Posted 28 Feb 2014
New crop of “secure” “bat phones” are hitting the burgeoning personal privacy market.
.
Personal VPN
Protect your personal information in public WiFi hotspots
PRIVATE WiFi is VPN software that encrypts
all your Internet communications.
.
RELATED:
Project XIII is now available for the iPhone in addition to the Windows phone!
https://www.privatewifi.com/
_________________________________________________
Many People Predicted Cryptos over the Internet
Surprisingly, economist Milton Friedman was one of them…
LikeLike