There has certainly been a lot of dust kicked up about the control of the change of TLD’s and who babysits the root.zone file. In the swirling dust maybe there are some glimpses of IP address allocation too. That fact that there is a lot of swirling dust in the midst of claims that ‘it’s no big deal’ suggest just the opposite is true.
So what would be the end goal of this ‘no big deal’? How about ‘Cyber Curtains’ around the USA and other Surveillance State countries? This act could turn the Internet into a tool for government just as Mainstream Media is today. However plausible or even provable this might be it seems as an act of desperation that is too little too late for its planners.
With the change of URL and updating of the website content the end of the development/test era under the old URL website is here and gone. With the new URL and look at nsabuster.com the signal is sent that the store is open. Interactions with investors should culminate in funding soon and with that PR and marketing campaigns can begin.
With two products available now, the SDC Private Email (PEM) and the SDC Private Messenger (PM), and a third, the SDC Private Email Server (PEMS) on the drawing board, the stage is set to take the lead in secure Interact communications applications. The PEMS builds upon the Point to Point technology of the PM and the Key Management technology of the PEM to combine together the basis of a new Internet secure email transport protocol being designed from the ground up.
Today marks the revealing of an underway project to complement the SDC Private Email (PEM). Currently PEM operates with traditional Internet protocols such as POP, IMAP and SMTP. The original email system was never designed to be secure and the add-on measures haven’t really produced a secure, private and untraceable email system, nor can it.
It has been said if you don’t learn from history you are bound to repeat it. While I am a firm believer that evil was decisively defeated 2,000 years there are many that history shows that didn’t get the memo. Lest we are overcome by the persistent evil, of the forgetful, by doing nothing the endless task is to continue the battle with what we are given.
With the SDC Private Email (PEM) and Messenger (PM) products both generally available on the website replete with user and functional overview docs it suddenly seemed to me a point or line in sand had been crossed. There is a seemingly endless stream of articles about the NSA, FBI, DEA and now police agencies engaged in the unlawful bulk collection of honest citizens information and data.
This unlawful behavior is of course defended with the lame excuse that the 300 million need to be saved from the lone gunman. Of course Surveillance of the honest citizens can’t save anyone nor has it. And this is the point at which I realized that all instant messengers and email should be as competent security wise as the PEM and PM.
It has been a long time since I started researching and studying Internet communications, encryption, key management etc. and then building and testing many prototypes of challenging functional areas including processes that had to be ‘discovered’. Then in 2009 I was able to start designing and coding the SDC Private Messenger. (PM) This of course brought all of the usual software development challenges to work to slow progress down.
The PM has a unique server less Peer to Peer architecture that was designed to not only serve as the basis for P2P secure chatting but also things such as P2P secure voice chatting and even P2P secure video chatting.
Now that the SDC Private Email BETA 1 test is over and all the lessons learned incorporated into the release branch of code what remains for SDC Private Email (PE) is to finish regression testing, user docs, copyright registrations etc. before RTM.
Today marks a milestone day in the development of the SDC Private Email (PEM). A BETA version is available from the website to evaluate the robustness of the Key Management system in PEM. To be a secure email client rather than just another email client the one thing that is needed is Key Management for the end users and the applications admin functions. Accordingly, there are some traditional email functions not provided in this version but BETA testers can of course email securely.
The Key Management workflows to create/enter new keys, establish Key Relationships with each desired contact will highlight what it takes to be actually secure in your personal Internet communications. What it also reveals conversely is how insecure you may have been up to now. The one who controls the keys owns the data. If you have no keys then your data belongs to the world of the Internet.
It is not a secret even, if not really published, that I have been following the ‘Henry Ford I built my horseless carriage in my garage’ business model to develop the Private Messenger and almost finished Private Email. Although in this day and age of mega-conglomerate corporations such a thing might seems as antiquated as the horseless carriage itself.
Perhaps such a status may have even become some imaginary badge of honor over time and to many I appeared as a reclusive developer of advanced secure personal Internet communications software. Be that as it may I did reach out and even actually met with some potential investors along the way.