Singapore, April 10th, 2012
Singapore-based Rune Information Security Corporation Pte. Ltd. is pleased to announce the availability of its Deadbolt encryption solution designed to make data theft through e-mail and messaging intercept a thing of the past for both Macintosh and Windows users.
Simply put, Rune has designed Deadbolt implementing both standards based OpenPGP and optional, one-time pad for e-mail, messaging, and data. The ‘pad’ alludes to the unbreakable and random Vernam cipher or one-time pad invented in 1917. The Vernam cipher is unbreakable because it produces completely random cipher-text that secures data so that even the most powerful super computers can’t break the encryption when it is used properly. During World War II, spies used a paper ‘pad’ that had the randomly generated text to encode and decode their messages. The only way to break the code and read the message was to actually be in possession of the pad. With Deadbolt, this proven form of data security guarantees that your recipient who has the ‘pad/key’ is the only one who can unlock and read your e-mail and attachments.
E-mail is especially vulnerable because it is the communications choice for business and individuals, and therefore targeted by governments, corporations and private investigators. With the release of many commercial off-the-shelf intercept tools, eavesdropping that was once only available to attackers with significant means, like governments is now within the reach of anyone with a bit of tech savvy and will.
Deadbolt keeps organizational and personal e-mail, messages, and files private through standards based OpenPGP and AES and when data security is paramount the Vernam cipher configuration is also available. Rune’s development team coupled a FIPS 140-2 approved software library (NSS) with one-time pad enabling exceptionally strong encryption and compliance with industry standards and regulations.
“Deadbolt is designed to easily protect information against all who want to steal or watch your data,” says Lance Gaines, President-CTO of Rune Information Security Corporation. “We can’t stop them from getting access to your system but we do stop them from being able to read sensitive data and information at rest or in motion. If running in the Vernam or one-time pad configuration Deadbolt removes information from the continual ‘crypto arms race’ of ever increasing key lengths; whatever you secure today will be just as secure 1000 years from now.”
When in Vernam configuration the Vema Cipher technology platform guarantees that as your data traverses from your computer through the World Wide Web, through various servers, phone companies, cable and satellite systems, no governments or hackers can intercept and decipher your private messages. Your secrets, both commercial and personal, stay secret. Deadbolt is truly portable and simply attaches to your Mac or PC and secures any type of data with only three clicks or less. It even secures Facebook, Skype, Gmail and LinkedIn messages. You select it, Deadbolt secures it.
“Rune created a data security product that is uniquely easy to use, and when used correctly, with the appropriate policies, unbreakable,” Gaines continues. “Numerous articles, like ‘The Surveillance Catalog’ appearing in publications like the Wall Street Journal highlight that intercept and hacking tools are now easily and readily available to the masses. Further, daily articles like the ‘Long-Term Nortel Breach’ highlights that a data centric approach needs to be taken to information security. Whether you’re an enterprise executive, a banker trying to maintain financial security, a high-net-worth individual, working with sensitive corporate or personal data, Deadbolt will make sure your secrets stay secret. Deadbolt in Vernam configuration is not targeted at the average consumer, instead it is crypto for those that need to protect sensitive/critical information and secrets.”
Deadbolt is “data centric” and protects information as it moves across network and geographic boundaries and in the ‘cloud’. Once encrypted, your information is just as safe on your laptop as it is running through international telecommunications and data networks, and it is designed to be deployed in small to medium size user groups, across any type of SME, or large corporation.