logo-03

Data Security

WHEN ENCRYPTION IS NOT ENOUGH

SOLUTION

What do we provide?

An end-to-end encrypted email and data service. Using “two and three factor authentication’ for specific customers’ requirements. Our solution is a headless one, where our servers relocate daily. All data is encrypted and spliced into tiny fragments across multiple countries. No one country holds useable fragments of data. If there is an unstable government or subpoena issued, only a tiny piece of encrypted data exists and we move the location in an instant without disruption. Using our own technologies and techniques all metadata is stripped from emails.
  • Security comes first amongst everything
  • Unique offshore splintered data solution
  • All Metadata stripped bare using our technologies and techniques
  • A system that is designed by Security Experts and hackers
  • A secure system that we would use for our own data
  • A system that is security tested around the clock by penetration testers.
  • End to End Encryption of email and data
  • Multi vendor Defence in Depth
  • Security Cleared Staff
  • HSM and PKI Key Management
  • Off U.S soil or Ally soil
  • DDOS Protection and no Public Access

Video on how it works:

SECURITY

This solution is for serious security minded customers only, where encrypted on/offshore solutions such as Hushmail, Protonmail and other Scandinavian offshore solutions do not offer enough protection; where an instance of Roundcube on a single Linux platform doesn’t cut it for you. Many encrypted email providers provide the precise software, algorithms and keys used in a solution to make you feel at ease. Best practice is security by obscurity. However rest assured the security appliances and algorithms used are far greater than that of any government’s requirements for their agencies. We don’t do penetration tests once a year for a compliance tick in the box. We do penetration test the systems around the clock. When one cycle has finished we begin another, with over 24 penetration tests done annually. All our systems are monitored 24 X 7 by us, no external groups, no 3rd party access. We provide the following technologies to protect your data.

 

Metadata Strip

Metadata Strip

  • Multi-vendor Host based Detection
  • Multi-vendor Network Intrusion Prevention Systems
  • HSM tamper proof PKI Key Management
  • Distributed Denial of Service Protection
  • Physical monitoring of all the equipment in caged environments
  • Tempest Acoustic Cryptanalysis protection
  • Our Mail server is not accessible to the public
  • Multiple out of country key custodians
  • No Data is ever in one country, Fragments are backed up only
  • Network RAID, bit torrent concepts and best practice security
  • 24X7 in house SOC monitoring of all environments
  • Anonymous email accounts without user verification

PRODUCTS

The Cautious

For the cautious user: The Cautious© was designed by Security Experts, Hackers and ex government security architects, and is the first of its kind in the world. We send you a Secure Clientless USB key that holds your private certificate to securely access the website after you enter in your secure pin. No one from the general public can access the site without it. From there you can send and receive email encrypted emails and upload data. All data is encrypted end to end and spliced around the world never in the one location. The solution is like Hydra, cut a head off and another grows back, your data is safe, encrypted and only accessible by you. This is our entry level solution and will suit the cautious user.

 

  • Security comes first amongst everything
  • Unique offshore splintered data solution
  • A system that is designed by Security Experts and hackers
  • Owned by us, monitored by us, patched by us no external parties allowed
  • A secure system that we would use for our own data
  • A system that is security tested around the clock by penetration testers
  • End-to-End Encryption of email and data
  • Multi vendor Defence in Depth
  • Multiple Key Custodians
  • HSM PKI Key Management
  • Off U.S soil or Ally soil
  • Acoustic Cryptanalysis protection
  • Anonymous Email Accounts
  • Data is never in one country
  • Physical monitoring of the equipment in caged environments

The Paranoid

For the paranoid user: The Paranoid © was designed for the Paranoid who don’t even trust their own computer. There could be key loggers, malware, or NSA rootkits. We send you a Hardware encrypted Iron Key Microsoft Windows 8 to go device preloaded which you boot up off. Your private certificate is also installed in the hardware encrypt module. You type in your passphrase and you access the website encrypted, just like The Cautious © All your data is encrypted end to end and fragmented around the world.

 

This is for users who don’t even trust there own Operating System. Carbyne Fiber will provide you with a 256 bit AES USB bootable Microsoft Windows 8 device Using IronKeys’ reputation for Hardware security and Windows ease of use is perfect for the paranoid user. These devices will be preloaded Windows 8 desktop include your private key to access our email/web servers with end to end encryption and Hardware encryption for your keys. Just plug in the usb stick into any computer and boot off the device after inserting in your custom passphrase. When you have finished simply unplug the stick and put in your pocket. Perfect for the whistle-blower or journalist who wants to send classified information and cant wait to go to an Internet Café or McDonalds Wi-Fi.

 

  • Security comes first amongst everything
  • Unique offshore splintered data solution
  • A system that is designed by Security Experts and hackers
  • Owned by us, monitored by us, patched by us no external parties allowed
  • A secure system that we would use for our own data
  • A system that is security tested around the clock by penetration testers
  • End to End Encryption of email and data
  • Multi vendor Defence in Depth
  • Multiple out of country key custodians
  • HSM PKI Key Management
  • Off U.S soil or Ally soil
  • Acoustic Cryptanalysis protection
  • Anonymous Email Accounts
  • Data is never in one country, onsite backups are only fragment backups
  • Physical monitoring of the equipment in caged environments

The Tin Foil

For the Tin foil user: The Tin Foil © was designed for the Tin Foil hat wearer who doesn’t even trust their own computer. Who doesn’t even trust Microsoft and doesn’t even trust their own input device i.e. a hardware key logger capturing your authentication passphrase. The Tinfoil user believes their could be key loggers, malware, or the NSA have installed a rootkit or backdoored Windows 8. We send you a Hardware encrypted Linux bootable USB token with its own pin coder keyboard preloaded with a secure open source Linux which you boot up off, Your HSM PKI private certificate is also installed onto the crypto module. You type in your passphrase using the external pin coder and you access the services like in The Cautious© or The Paranoid© All your data is encrypted end to end and fragmented around the world.

 

I don’t trust my pc, I don’t trust Microsoft Windows, and someone may have put a hardware keylogger on my keyboard cable. Well then the Tin Foil is perfect for you. This device is preloaded with a secure Linux. Requires a pin code entry to boot off the device. On the 256 AES Hardware encrypted USB stick is your HSM certificate key to access the Carbyne Fibers mail servers. The Linux is completely open source and you can customize the OS with your favorite apps. Not recommended we lock it down for a reason.

 

  • Security comes first amongst everything
  • Unique offshore splintered data solution
  • A system that is designed by Security Experts and hackers
  • Owned by us, monitored by us, patched by us no external parties allowed
  • A secure system that we would use for our own data
  • A system that is security tested around the clock by penetration testers
  • End-to-End Encryption of email and data
  • Multi vendor Defence in Depth
  • Security Cleared Staff
  • HSM PKI Key Management
  • Off U.S soil or Ally soil
  • Acoustic Cryptanalysis protection
  • Anonymous Email Accounts
  • Data is never in one country, backups are only fragment backups
  • Physical monitoring of the equipment in caged environments

The Snowden

For the ultimate security: The Snowden © was designed for the Ultimate Shadow. We use the Tin Foil concept with a twist. There is no public access. Using the USB Linux Hardware encryption key which you boot up off, you VPN in to our facilities, segregated from the our other products. No servers are publicly available and you use our splintered private networks for email or data storage using three factor authentication. Anyone causing mischief, side step attacks, port scanning is dumped immediately forever from the gateway.

“I want a 256 AES Hardware encrypted key with external Pin code, USB bootable to Open Source Linux with a private key. Maybe my PC has a keylogger on it, or the NSA changed my BIOS when I went out for a pizza”
Yep no problems

“But I don’t want any web based solution, I want it like I’m at work where I have to VPN first with two or three factor authentication then access private servers completely separate from your other solutions with no public access on the web or advertised location.” Yes we can do that

“I want Multi Vendor Firewalls/Web/Email scanning Appliances and I want an tamper proof HSM creating the keys. Ooo, and I want that cool stuff where you splinter the data around the world never in one place so if Pakistan falls over as a country or get subpoenaed my stuff doesn’t fall into enemy hands. And I want you guys to continually pentest not a PCIDSS once a year tick box pentest.

Yes. We are like you that’s why we built this. We are whack jobs, but you were always right, you were being watched.

 

  • Security comes first above everything
  • Unique offshore splintered data solution
  • A system that is designed by Security Experts and hackers
  • Owned by us, monitored by us, patched by us no external parties allowed
  • A secure system that we would use for our own data
  • A system that is security tested around the clock by penetration testers
  • End to End Encryption of email and data
  • Multi vendor Defence in Depth
  • Security Cleared Staff
  • HSM PKI Key Management
  • Off U.S soil or Allie soil
  • Three factor authentication, Linux Bootable OS, external pin code, Private VPN
  • Anonymous Email Accounts
  • Data is never in one country, only fragment backups
  • Physical monitoring of the equipment in caged environments

PRICES

The Cautious

  • $150
  • $150 per annum
  • $50 Registration token
  • Buy Now

The Paranoid

  • $150
  • $150 per annum
  • $300 Registration token
  • Buy Now

The Tinfoil

  • $150
  • $150 per annum
  • $300 Reg & Equip
  • Buy Now

The Snowden

  • $240
  • $240 per annum
  • $700 Reg & Equip
  • Buy Now

ABOUT

A ‘two factor’, end-to-end encrypted email and data solution. Using encrypted splintering techniques using a combination of a private Bittorent and network RAID, developed and mastered for past 10 years. The data is spread out over multiple worldwide locations never resting in one jurisdiction. The inventors are Security Experts and Professional hackers with over 20 years’ experience each. The experts are the owners.

THE FIRM

The company’s name originates from ‘Carbyne’ the strongest substance on earth and the fiber represents optical fibre.
The company’s logo represents the ‘PRISM program’. Hydra is a Greek mythical creature with multiple heads, if one is cut off another grows back in its place. Carbyne Fiber’s unique security design ensures there is no one encrypted data location. If one geographic site is subpoenaed or shutdown it grows back instantly in another location around the world.

WHO WE ARE

We are a group of Penetration testing companies and security experts who design secure systems around the world and attempt to break into others. Yes, we designed systems with government taps. Why are we doing this? Edward Snowden and Julian Assange had the courage to risk their liberty to come out into the public and release information about the American Government’s ‘PRISM program’ and other snooping methods. It is in their legacy we built a robust system, with end-to-end encryption, not just off U.S shore but scattered around the world in tiny encrypted dedicated block fragments. We have studied and used the Hushmails, Lavabits solutions and others like it in the U.S, Switzerland, Norway and Sweden which we applaud. But we got together as a united group and said “Where would we store our data?”
The astounding answer was a computer without a network card sitting in the middle of a locked room.
We knew then it was time to build an online solution, with our expertise, defence in-depth, government experience and internal telecommunications knowledge.

WHAT WE HAVE BUILT

We have built an end-to-end encrypted email and data ‘two factor’, splintered around the world solution. No encrypted data rests ever in the one jurisdiction. Instead, it sits encrypted and fragmented around the world and immune from government interference. Using techniques mastered over the past 10 years writing fragmented encrypted data simultaneously to over 10 secure locations under our control around the world, never in the one location. When you access your encrypted data it’s a bit like a private bittorent – your data is pieced backed together and presented back to you. If a geo-location is unstable we simply move it without disruption and without all your encrypted data falling into anyone’s hands. Even when the data is put back together and presented back to you, the location head site rotates, to ensure no central country weak spot.

CONTACT

Email us direct to: 1@1001001.vg