PROTOCOL TO BALANCE
PRIVACY / PUBLIC SAFETY NEEDS

SENDER

HAS ON HAND:
ACTIONS:

PRYVIT SOFTWARE ON SENDER'S DEVICE

ACTIONS:
  • Shreds files and/or message and/or random byte segments
  • Encrypts every shred
  • Creates formula to reconstitute files / message
  • Cloaks formula
FOR STORAGE:
FOR SENDING:

SHRED HOSTS (each of multiple hosts)

ACTIONS, AUTOMATED:
  • Receives and stores incoming shred heaps
  • Challenges and validates incoming requests for specific heaps
  • Sends specific heaps to intended recipient(s)
ACTIONS, PERIODIC:
  • Review retention policy guidelines
  • Purge heaps no longer of potential interest (?)
  • Responds to orders from FISA-like court

FORMULA MIDDLEMAN

ACTIONS, AUTOMATED:
  • Stores, protects, updates core registration data
  • Receives and stores incoming formula files
  • Uncloaks formula per registration data of sender
  • Recloaks formula per registration data of each receiver
  • Transmits recloaked formula to each receiver
  • Gathers metadata - from, to, how much, when?
ACTIONS, PERIODIC:
  • Review retention policy guidelines
  • Purge formulae no longer of potential interest (?)
  • Responds to orders from FISA-like court

PRYVIT SOFTWARE ON INTENDED RECEIVER'S DEVICE

ACTIONS, AUTOMATED, BY PRYVIT SOFTWARE:

INTENDED RECEIVER(S)

HAS ON HAND:
ACTIONS BY RECEIVER
  • Read message, use and/or store files

PUBLIC SAFETY AGENCIES

ACTIONS
  • Conduct ongoing investigations
  • Gather intelligence by other means
  • When suspicions warrant, submit surveillance request to FISA-like court
  • Act as intended recipient for court-ordered data releases
  • Scrutinize such messages and files for additional intelligence

FISA-LIKE COURT

ACTIONS
  • Evaluate and rule on requests from public safety agencies
  • Authorize focused releases of metadata
  • Authorize focused releases of content
  • Interact with Congress as appropriate

Home page

Problem 1: Balance between citizens' needs for privacy and the nation's needs for terrorist surveillance;

Problem 2: Defense against cyber attack by foreign state-sponsored intruders

Problem 3: Secure transmission of computer data