How to Hide Your Pr0n

Like it or not, in the modern world, data is King. Some may argue that data is the single most valuable asset of any individual or enterprise. The right kind of data can make you a millionaire or give your company a huge advantage over the competition. It’s the thing that the Blackhats are trying to get and the thing that the Whitehats are trying to protect. Today, entire criminal organizations thrive off of the theft of our data. Exposure of the wrong kind of data has sent major corporations out-of-business and given individuals years of credit nightmares. Anything that valuable needs to be protected. Over the years, a vast number of different solutions have been created to attempt to safeguard our data. Some served their purpose while others failed miserably. None of them can tell you with a straight face that they can protect 100% of your data 100% of the time. Even recently one of the largest players in the data protection space had a breach of their own which comprised the integrity of a solution many of us have been using for years to protect our corporate networks. If a $17B/yr company can’t protect their most valuable assets, how can you, as an individual, even have a snowballs chance in hell at protecting yours? In this presentation, we unveil a new proof-of-concept tool that combines the confidentiality of encryption, the integrity of message hashing, the availability of a distributed architecture, and the stealth of steganography into a single cohesive application. This new use of these mature technologies creates a secure environment for your data, and easy retrieval, without the liability of keeping it on your personal system. This unique approach to data storage can help you keep the data you value the most from falling into the wrong hands.

Presented by