Data packets relayed across the Internet are susceptible to interception. The safest assumption is that, whatever you send, there is somebody out there who may choose to intercept the packets and reconstruct the full content. Unencrypted messages might as well be written on billboards; they are that public.

As for encrypted transmissions, the effort that eavesdroppers and hackers will put into cryptanalysis is a straight function of the perceived value of your information. In other words, the higher the electronic intelligence (ELINT) relevance to the hacking enterprise, the more resources they will pour into decrypting your content.


Step one is to miniaturize the quantity of truly sensitive information to be transmitted. Pryvit destroys patterns through shredding batches of files, randomly subjecting the tiny fragments through an assortment of algorithms, and binding the manipulated fragments in random sequence in shred heaps. The security problem shifts from the shred collections to the small formula (recipe for reconstituting). Key point: Pattern detection is much more difficult in smaller transmissions. The formula for each Pryvit-encrypted batch is typically under two percent of the size of the original body of files.

To ensure safe transmission of the formula, we use either an existing encryption method OR layered cloaking (the "Pryvit protocol") that raises the computational requirement for hacking out of sight.

home page

Problem 1: Balance between citizens' needs for privacy and the nation's needs for terrorist surveillance;

Problem 2: Defense against cyber attack by foreign state-sponsored intruders