“When encryption is not enough”
15th July 2014
Carbyne Fiber announced today that all of its initial products The Cautious, The Paranoid, The Tin Foil and The Snowden will be ready for purchase on the 1st September 2014. A Kick Starter campaign has been launched to raise funds for the pre purchase of hardware tokens for all the products. https://www.kickstarter.com/projects/785660235/carbyne-fiber
Who are we
We are a group of Penetration testing companies and security experts who design government systems around the world and attempt to break into others. Yes, we designed systems with government taps. Why are we doing this? Edward Snowden and Julian Assange had the courage to risk their liberty to come out into the public and release information about the American Government PRISM program and other underhanded methods. It is in their legacy we built a robust system with end to end encryption not just off U.S shore but scattered around the world in tiny encrypted dedicated block fragments. We have studied and used the Hushmails, Lavabits solutions and others like it in the U.S, Switzerland, Norway and Sweden which we applaud. But we got together as a united group and said “Where would we store our data”?
The astounding answer was a computer without a network card and completely isolated.
We knew then it was time to build an online solution, with our expertise, defense in-depth, government experience and internal telecommunications knowledge.
What we have built
We have built an end to end encrypted email and data two factor, splintered around the world solution. No encrypted data rests ever in the one jurisdiction. Instead it sits encrypted and fragmented around the world, immune from government interference. Using techniques mastered over the past 10 years writing fragmented encrypted data simultaneously to over 10 secure locations under our control around the world never in the one location. When you access your encrypted data it’s a bit like a private bittorent your data is pieced backed together and presented back to you. If a geolocation is unstable we simply move it without disruption and without all your encrypted data falling into anyone’s hands. Even when the data is put back together and presented back to you the location head site rotates, to ensure no central country weak spot. We are a headless company like Hydra the mythical creature to prevent unnecessary attention. The security best practice solution is dedicated and owned by us with some of the features below
• Multi-tiered, multi-vendor firewalls and routing
• Multi-vendor Anti-Virus, Anti-Spam
• Multi-vendor Intrusion Prevention systems
• Multi-vendor Host based Detection
• HSM tamper proof Key Management
• Distributed Denial of Service Protection
• DNS DDOS protection
• Headless entry environment, server endpoints rotated daily
• Physical monitoring of the equipment in caged environments
• Tempest Acoustic Cryptanalysis protection
• PKI splintered Infrastructure with more than 5 Key Custodians
• Private Networks
• Security Cleared Staff who are equal company shareholders
• No Data is ever in one country, no entire one location backups. Fragments are backed up only
• Anonymous email accounts without user verification. Like numbered Swiss bank accounts
All products require a hardware token/device before you can even see the website. It is not accessible to anyone without it. This keeps out the masses from brute forcing user/password combinations and one time passwords.
The Cautious - For the cautious user. The Cautious© was designed by Security Experts, Hackers and ex government security architects and is the first of its kind in the world. We send you a Secure Clientless USB key that holds your private certificate to securely access the website after you enter in your secure pin. No one from the public can access the site without it. From there you can send and receive email encrypted emails.
The Paranoid – For the paranoid user. The Paranoid © was designed for the Paranoid who doesn’t even trust their own computer. There could be key loggers, malware, or the NSA have accessed your BIOS. We send you a Hardware encrypted Iron Key Windows to go device preloaded with a locked version of Windows which you boot up off, Your private certificate is also installed. You type in your passphrase and you access the services as above in The Cautious © All your data is encrypted end to end and fragmented around the world.
The Tin Foil - For the Tin foil hat user. The Tin Foil © was designed for the Tin Foil hat wearer who doesn’t even trust their own computer, who doesn’t even trust Microsoft and doesn’t even trust there input device i.e. a hardware key logger. There could be key loggers, malware, or the NSA have accessed your BIOS or backdoored Windows 8. We send you a Hardware encrypted Linux bootable USB token with its own pin coder keyboard preloaded with a secure open source which you boot up off, Your private certificate is also installed. You type in your passphrase and you access the services as above in The Cautious © All your data is encrypted end to end and fragmented around the world.
The Snowden – For the ultimate security. The Snowden © was designed for the Ultimate Shadow. We use the Tin Foil concept with a twist. There is no public access. Using the USB Linux Hardware encryption key which you boot up off, you VPN in to our facilities with 3 factor authentication segregated from our other secure products. No servers are publicly available and you use our splintered private networks for email or data storage.