Global-WAN - The Swiss Neutral Data Haven
-
Upload
twd-industries-ag -
Category
Technology
-
view
653 -
download
0
description
Transcript of Global-WAN - The Swiss Neutral Data Haven
Global-WAN®
Swiss Data HavenThe Neutral Global Network
Built for “The Internet of Things”global-wan.ch
This document is aimed at helping people to understand the Global-WAN technology. Further information regarding the internals of TWD Industries AG's technology are available under a proper NDA, to selected partners.
2 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
3 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
4 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
5 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
6 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
7 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
8 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
9 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
10 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
11 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
12 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
The Problem“Nations have no friends, only interests”
John Kornblum
US Ambassador in Germany (2014)
13 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
US Vendors' Dilemma“How do you protect what you want to exploit?”
Scott Charney,
VP Trustworthy Computing, Microsoft
14 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
US Strategists' Dilemma“The Internet is the most transformative innovation since Gutenberg and the printing press, yet we're treating it as a war zone.”
Jason Healey
The Atlantic Council (US think-tank)
15 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
The Solution“To restore trust, there's no substitute to offering the real thing: forever unbreakable security.”
TWD Industries AG's Founder
16 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Global-WAN
Purpose & Distinctive ValueUnique, By-Design
17 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
“Securing Phone, Fax, Radio, Video Conferencing,
Web applications, unified communications, etc.
WITH FOREVER-UNBREAKABLE ENCRYPTION”.
For * Individuals (consulting, politics, lawyers)
* Enterprises (board, partners, R&D, branch)
* Governments (Army, Police, energy grid,
embassies, trading, etc.).
18 | Copyright © 2014 TWD Industries AG. All rights reserved.
PURPOSE
Global-WAN
19 | Copyright © 2014 TWD Industries AG. All rights reserved.
EASE OF USE
20 | Copyright © 2014 TWD Industries AG. All rights reserved.
Plug & Play and:
- Compatible with all HARDWARE
- Compatible with all SOFTWARE
- Compatible with all Operating Systems
(IBM, ORACLE, Apple, Microsoft, Linux...)
Global-WAN
Global-WAN
21 | Copyright © 2014 TWD Industries AG. All rights reserved.
FOREVER SAFE
22 | Copyright © 2014 TWD Industries AG. All rights reserved.
Security designed to last: - Proven as unbreakable forever
- Hides communication endpoints
- Hides the metadata used by spies
Complete security: no “what, who, when, where”.
Global-WAN
Global-WANBusiness Development
Investment Opportunities
23 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
To accelerate its Development,
TWD Industries AG invites
International Investors
24 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
“With the right acts of digital sabotage, attack aircraft will be grounded, infrastructure disrupted and communications severed, reducing the enemy to a state of raging, pre-modern impotence.”
The Economist
25 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
26 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
“There's a market failure in cyber-security, made worse by the trouble firms have in getting reliable information about the threats they face.”
The Economist, “Vulnerabilities - Zero-day game - Wielding a controversial cyber-weapon.”
27 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
28 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
“To avoid lurid headlines about car crashing, insulin overdoses and houses burning, tech firms will surely have to embrace higher [security] standards.”
The Economist
"The Internet of things (to be hacked)"
29 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
30 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
INVEST GLOBALLY
In Emerging Markets and Established Markets:
● USA (“the NSA has destroyed trust”)● EUROPE (badly needs resilience, growth)● AFRICA (new infrastructure, sovereignty)● ASIA (needs to foster independence)● LATIN-AMERICA (won't trust the USA)
31 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
INVEST IN NATIONS
Securing the CRITICAL INFRASTRUCTURE:
● Security (Army, Police, Finance, etc.)● Assets (Water Supply, Airports, etc.)● Energy (Pipelines, Nuclear Plants, etc.)● Networks (Internet, GSM, 3G/4G, etc.)● E-Admin (e-Votes, e-Medical, e-Fiscal)
32 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
INVEST IN PATENTS
Let Global-WAN
licence its
patents and
micro-chips
to secure all
these devices.
33 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
Architecture & ComponentsDesigned From Scratch
(can't trust existing products)
34 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
SOFTWARE COMPONENTS
G-WAN: A Server That Can be Trusted
Designed To Build A Secure Platform:
● Less Code, Less Bugs, Higher Efficiency● New Technologies (Parsing, Memory, etc.)● No Vulnerability Found Since 2009 Launch
Needed a Safe Server to release Secure Services.
35 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
Lorenz-Waterwheel
Designed to Scale
From [1-∞] CPU Cores.
Lock-Free, Wait-Free, Multi-Threaded and Event-Based.
36 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
Connections
MULTICORE SCALABILITY
37 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
MULTICORE SCALABILITY
UBIQUITOUS PLATFORM
G-WAN: Lightweight (200 KB) App. Server
Designed To Run Everywhere:
● Smartphones (Low-Consumption, Low-Latency)● Embedded (Control At The Lowest Level)● Servers (Web, SaaS, PaaS, Clouds)
With Scripts In 17 Programming Languages:
(asm, C/C++, C#, Java, Scala, Go, Javascript, Lua, Perl...)
38 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
VERSATILE PLATFORM
G-WAN: An Universal Stack
Open to Third-Parties:
● Applications (C/C++, C#, Java, Obj-C, Perl)● Middleware (HTTP/S, asynchronous scripts)● Database (Key-Value, SQLite, ORACLE)● Infrastructure (DNS, Email, Proxy, VPN, etc.)
39 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
ZERO CONFIGURATION
G-WAN: An Unobstrusive Stack
Why Configuration Files Are Bad:
● Confusing, User Errors, Buggy, Version Incompatibilities● Mostly Redundant with existing File System Information● Inadequate: Adaptive Options Are Much Safer / Efficient
Safer, Faster, Simpler, No User Lock-In, No Planned Obsolescence, Able to Run on Unattended Systems.
40 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
ORACLE OPEN-WORLD
41 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
ORACLE OPEN-WORLD
42 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
Making The Impossible Become Routine● G-WAN Accelerating ORACLE NoSQL● In A Social Gaming Demo Of 100 Millions Bots● All Moving In Real-Time (Heading, Speed, etc.)● Queried by 45,000 Persons Joining The Game● And Achieving A Whooping 1.2 Billion of TPS● ...On A Mere 6-Core Desktop Machine!
The Global-WAN ProjectDevelopment
Schedule
43 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
44 | Copyright © 2014 TWD Industries AG. All rights reserved.
Reaching The Harvesting Phase
3 years 2 years 5 plus years
Integration still dominating Exploitation gains speed Consolidation of
development processes is key
Minimize team churn and grow it only slowly
Focus on integration Only very few clients Gain experience in
automation Build a strong team
Integration becomes less important
Exploitation takes lead and grows significantly
Quality becomes key topic Long term employees
perform best
Information Integration
Information Exploitation
1) Ramp-up phase, 2008
2) Consolidation phase
3) Harvesting phase, 2014
Global-WAN
Productivity Standards
Favourably Comparing With The Next Best:
45 | Copyright © 2014 TWD Industries AG. All rights reserved.
Server Birth Files Blank Comment Code Total
Nginx 2002 256 35,131 4,308 94,369 133,808
G-WAN 2009 171 11,198 42,706 56,766 110,670
G-WAN was written in less than half the time, and offers many more features in half the code of Nginx. Further, G-WAN's source code has 10x more comments than Nginx's code.
Source Code Lines
Global-WAN
Why TrustLeap?The Need For Global-WAN
on both
Server and Client Sides
46 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
Unbreakable Security ● Future-Proof (i.e. QUANTUM Computers)● Mathematically Proven (Can Be Trusted By All)● Independent From Computing Power Used To Break It● No More Need To Enlarge Encryption Keys● No More Need To Change Encryption Algorithms● Also Unbreakable Two & Three-Factor Authentication● No Central Key Repository Needed (But Can Be Used)● Mobiles / Embedded: Very Low Overhead (CPU / RAM)
47 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
The Value Of TrustApplications
● Corporate Asset Protection (Patents, Talks, Databases)● Public Asset Protection (e-Votes, Medical Records, Legal)● International Negotiations (United Nations, Contracts)● Transaction / Archiving Certifications (Indisputable)● Defence (Impenetrable Communications, Drones, etc.)● Chips Would Be Ideally Used (Tampering, I.P. Protection)● Legitimacy to Impose a Licensing Monopole (Exclusivity)
48 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
Trust Starts With Identity
● Email (Data Protection, Negotiations, Board Talks)● Routers / Firewalls (How Safe Are Barriers If Broken?)● Transactions (Trading, Contracts, Non-Repudiation)● Storage (Confidentiality, Tamper-Proof, Full-Control)● Defence (Remote Presence / Control, Chain Of Orders)● I.P. Rights (What Worth Is A Proof That Can Be Spoofed?)● Legal (Customers / Lawyers / Regulators Security Chain)
49 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
TrustLeap
Worldwide Corporate HQ
TrustLeapParadiesli 17CH-8842 Unteriberg SZSwitzerland
Phone +41 (0)55 414 20 93Fax +41 (0)55 414 20 67
Email [email protected]
www.trustleap.com
About TrustLeap
TrustLeap, the security division of TWD Industries AG, protects digital assets with cryptanalytically unbreakable technology (safe against unlimited computing power as it is proven mathematically that no key leaks can be exploited). The TrustLeap secure platform leverages offers of enterprise, cloud, networking, digital media and financial services in global strategic markets.
TrustLeap lets partners and users form dynamic ecosystems where duly accredited strangers can safely trust each-other. Establishing widespread trust enables organizations to secure their infrastructure, raise the value of their offers and safely market their digital assets.
TrustLeap
50 | Copyright © 2014 TWD Industries AG. All rights reserved.