Burgeoning Personal Privacy Market

1 BatphoneA bat phone, in business jargon, is a private telephone number that is handled at a higher priority than a public line.


Project XIII uses AES Keys for data encrption.
The service, Project XIII, doesn’t know what you are moving around.
We can only see the meta data; not the actual data itself.
After three days the Data Flow Hub (typically server) will delete the data. So not only is the data encrypted on the Data Flow Hub but it is removed.
The Data Flow Hub does not keep the AES Key. It never has access to it.
There is no way to mine the data to figure out what you’re posting, messaging, taking pictures of, etc. That being said there’s a couple of weak spots:
When the AES Keys are exchanged they are encrypted by a system key.
This weakness will be resolved by issuing user RSA Keys and encrypting that transaction with the RSA Key.
The other weakness is each device. If you leave a phone somewhere or someone steals your computer they have access to the data left on it.
We really can’t do anything about that.
So please be careful with your devices and remember that you are in possession of someone elses data and act accordingly.


Bat Phones

Posted 28 Feb 2014
New crop of “secure” “bat phones” are hitting the burgeoning personal privacy market.


Personal VPN


Protect your personal information in public WiFi hotspots

PRIVATE WiFi is VPN software that encrypts
all your Internet communications.




Want Worldwide PEACE and Prosperity. We are the solution we have been searching for... Free People on Earth will solve our crisis and create an era of Creativity. Be Aware; Be Creative; Be Active; Be Free; and then Share it. LOVE & Wholeness AMOR y Paz

Tagged with: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Posted in Freedom-Expressed
One comment on “Burgeoning Personal Privacy Market
  1. RonMamita says:

    Many People Predicted Cryptos over the Internet

    Surprisingly, economist Milton Friedman was one of them…


Please Contribute a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 395 other subscribers
The Worldwide Awakening
Peaceful Awareness & Knowledge Based TransitionSeptember 11, 2017
Exercise freedom and creativity for all Earth’s inhabitants to explore ready breakthroughs in Self Organizing Communities, economics, and technology. This is a D.I.Y. project
State Sponsored Terror
The Big Day ReportMarch 30, 2018
Institutions of crime Big days have come, gone, and come again (Manipulations: Market Exchanges crash, wars, government Elections, and Taxation). Search for what is hidden and for what is not spoken. What secrets are hidden in Antarctica? Be Aware of the next big Day for fraudulent institutions.
Peace Today

Peace Today

RonMamita’s Blog
March 2014
All posts here
Audio coming soon!
%d bloggers like this: