Close Your Doors
And decide who can get in.
There's a market failure in cyber-security, made worse by the trouble firms have in getting reliable information about the threats they face.
1 What is TrustLeap Global-WAN?
Global-WAN creates post-quantum impenetrable private Clouds to connect Internet and LAN users. These Global-WAN Clouds protect unsafe public wired and wireless networks and the critical infrastructure.
2 Can you give some examples of Global-WAN use in the real life?
Global-WAN prevents clients & servers from being attacked or hacked in public (airport, train, hotel, conference) and private (home, LAN, datacenter) places. Web and email servers are even protected by-design against DoS attacks like the ones that caused Internet blackouts for the six US largest banks, and the NYSE and NASDAQ in September 2012.
3 What if my computers were backdoored before I started using Global-WAN?
With Global-WAN, backdoors and their operators can't talk to each other – unless these operators use Global-WAN and you have explicitly created a rule to let them talk to you. Global-WAN lets you decide.
4 Why are the software and hardware vulnerabilities dangerous?
These are open doors to your private data, your bank account, your databases, your patents, your customer and partner lists. And some exploit these security breaches to sell your data or to use them against you.
5 Why did you create Global-WAN?
We all need a really neutral ecosystem – and this need has become a vital necessity with the new wave of "The Internet of Things" (houses, clothes, accessories, medical devices, drones, connected cars, etc.).
6 why Global-WAN was born in Switzerland?
Switzerland has a long tradition of tolerance and intermediation. This nation has learned to practice three official languages and has nevertheless kept its identity. There are few such places available.
7 How Global-WAN is different from TOR, a proxy, a VPN, SSL/TLS, SSH or IPSec?
Created with a DARPA grant, TOR, funded by the US Navy (Cyber Command), relies on obsolete security standards. In contrast, Global-WAN's impenetrable and modular design prevents internal and external attacks.
8 why doubt of the widely praised security industry trusted SSL, IPSec and AES strength?
Despite their conformity with the standards the most advanced security tools can no longer protect enterprises and the critical infrastructure. And these problems will be spiraling out of control with the "Internet of Things".
9 Why did you make "post-quantum" unbreakable security so affordable?
Interoperability generates unsuspected constraints: even Swiss fighter aircrafts rely on foreign radio communication devices. Global-WAN allows everybody to secure data without changing the tools already in use.
10 How can you guarantee that Global-WAN will be there in 5 or 10 years?
Founded in 1998, TWD had to design Global-WAN in 2007 to continue operating. Many among the world, facing similar needs, will join forces. A neutral Internet is desirable to everyone on the Planet.
11 Can you prove that you are not spying on Global-WAN users?
This is trivial to demonstrate: (a) users generate their keys, (b) data do not travel through proxies or corporate data-centers, and (c) anyone facing TrustLeap-secured data won't ever be able to read it.
12 Why don't you open-source Global-WAN?
We have had to write Global-WAN from scratch to avoid using technologies potentially having already been compromised. Security breaches can either be generated by negligence or maliciousness.
13 Aren't inviolable communications potentially helping criminals?
The obsolete standards (AES, SSL, IPSec, SSH) let criminals bypass protections to steal and sabotage. Global-WAN prevents criminals from exploiting the security breaches now present everywhere.
14 Is Global-WAN available worldwide?
We hope this will be the case soon. We are working with policy authorities and technology partners to lower the cost of the Global-WAN technology to make it possible to deploy it in every device.
No one shall be subjected to arbitrary or unlawful interference with his privacy, family, home or correspondence, nor to unlawful attacks on his honor and reputation. Everyone has the right to the protection of the law against such interference or attacks.