"information hygiene and security issues in the instant communication networks.", vadim...
TRANSCRIPT
![Page 1: "Information hygiene and security issues in the instant communication networks.", Vadim Andryan](https://reader031.vdocuments.us/reader031/viewer/2022022415/5a67192e7f8b9a453d8b461b/html5/thumbnails/1.jpg)
Decentralized automated encryption
VADIM ANDRYANCEO/CTO
![Page 2: "Information hygiene and security issues in the instant communication networks.", Vadim Andryan](https://reader031.vdocuments.us/reader031/viewer/2022022415/5a67192e7f8b9a453d8b461b/html5/thumbnails/2.jpg)
CYBER - SECURITY CHALLENGES
![Page 3: "Information hygiene and security issues in the instant communication networks.", Vadim Andryan](https://reader031.vdocuments.us/reader031/viewer/2022022415/5a67192e7f8b9a453d8b461b/html5/thumbnails/3.jpg)
END – to – END Encryption
(WhatsApp, Snapchat,
Telegram)
“Man in the middle“ attack is still
possible at the Service Provider side
Leaking information to third
parties will not be possible
Unauthorized interceptions are
prevented
THE PERSPECTIVE
Vulnerable insecure local data
storage
THIRD
PARTIES
ALICE‘s PUBLIC KEYBOB‘s PUBLIC KEY
„Man in the Middle“attack on server side
END – to – END encrypted data exchange
PRIVATE KEY PRIVATE KEY
![Page 4: "Information hygiene and security issues in the instant communication networks.", Vadim Andryan](https://reader031.vdocuments.us/reader031/viewer/2022022415/5a67192e7f8b9a453d8b461b/html5/thumbnails/4.jpg)
Crypviser Network
The world first communcation
Network based on Blockhain
technologies
Decentralized PEER – to
PEER
authentication model
Disruptive unified encrypted
communication platform
THE SOLUTION
Solving the biggest issue of
The assymetric public key
encryption
THIRD
PARTIES
„Man in the Middle“attack on server side
END – to – END encrypted data exchange
PEER – to – PEER PUBLIC KEY EXCHANGE
Unique public key authentication
algorithms
PRIVATE KEY PRIVATE KEY
MAN IN THE MIDDLE ATTACK
chain chain
chain
chain
chain
chain
chainchain
chain
![Page 5: "Information hygiene and security issues in the instant communication networks.", Vadim Andryan](https://reader031.vdocuments.us/reader031/viewer/2022022415/5a67192e7f8b9a453d8b461b/html5/thumbnails/5.jpg)
Crypviser Automated Encryption
Decentralized keys distribution
Reliable and secure
infrastructure
INDUSTRIAL BLOCKCHAIN
CSMP ENCRYPTED CHANNEL
TEXT/VOICE AND
MEDIA/DATA
EXCHANGE
Open source
Automated Authentication
![Page 6: "Information hygiene and security issues in the instant communication networks.", Vadim Andryan](https://reader031.vdocuments.us/reader031/viewer/2022022415/5a67192e7f8b9a453d8b461b/html5/thumbnails/6.jpg)
SECURITY CORE
Innovative security core provides
protection at all levels
OS independent protected (encrypted)
storage and local security features
APP-LEVEL
Server
side
Network Level
Local layer
PEER – to - PEER data exchange (when possible)
NO TRACKING
NO TRACING
NO META DATA RECORDS
SERVICE PROVIDER SIDE
All kinds of data exchange (chats,
voice/audio streams, photo/video and file
sharing, etc.) are END – to – END encrypted
by using the most secure, reliable and
modern cryptographic algorithms and
technologies
NETWORK LEVEL
![Page 7: "Information hygiene and security issues in the instant communication networks.", Vadim Andryan](https://reader031.vdocuments.us/reader031/viewer/2022022415/5a67192e7f8b9a453d8b461b/html5/thumbnails/7.jpg)
CSMP - Crypviser Secure Protocol
Integrated unique PEER – to –
PEER authentication
mechanism based on
BLOCKCHAIN to prevent
“IDENTITY THEFT”
Strong authentication
❑ Elliptic – Curve Cryptography
❑ Stream symmetric cipher
SALSA20/20
❑ SHA3 – 512 HASH
Reliable technologies
Developed by the most secure, reliable
and modern cryptographic protocols and
technologies to be approved as
“MILITARY LEVEL” by international and
EU standards
Unbeatable security
The extra fast stream ciphers and
authentication algorithms
Extremely fast
Integrated smart attacks detection
system to prevent the most dangerous
interception attempts
Intelligent Intrusion Detection
CRYPTOGRAPHIC MODEL
![Page 8: "Information hygiene and security issues in the instant communication networks.", Vadim Andryan](https://reader031.vdocuments.us/reader031/viewer/2022022415/5a67192e7f8b9a453d8b461b/html5/thumbnails/8.jpg)
Voice and Video callsUnlimited Full HD voice and
video calls
Instant messaging Encrypted instant messaging
Group callsSecure encrypted group calls
(voice conferences)
File and Photo/
Video sharingSecure and encrypted
photo/video file exchange
without size restriction
Auto-destruction timerAutomatic data destruction
mechanism after the defined time
Local security features A rich set of local security features,
such as block chat, hide chat, backup
and much more…
![Page 9: "Information hygiene and security issues in the instant communication networks.", Vadim Andryan](https://reader031.vdocuments.us/reader031/viewer/2022022415/5a67192e7f8b9a453d8b461b/html5/thumbnails/9.jpg)
Secure Sync
The world’s first secure
multi - device
synchronization in
encrypted mode
Multi-device support
The first secure network
with Multi-device support
that enables you to run the
same Crypviser Account on
different devices
Intelligent Intrusion
Detection
Allows timely detection and
prevention from the most
dangerous third party
interception attack attempts
Two-level
Authentication
Manual and automated
authentication in PEER to
PEER mode to prevent
all kinds of MiTM attacks
ESSENTIAL ADVANTAGES
![Page 10: "Information hygiene and security issues in the instant communication networks.", Vadim Andryan](https://reader031.vdocuments.us/reader031/viewer/2022022415/5a67192e7f8b9a453d8b461b/html5/thumbnails/10.jpg)
the currency of privacy
❖ Blockchain authentication token
❖ The most secure crypto wallet
❖ Fast and secure transactions
❖ Reliable investments
CVCoin
![Page 11: "Information hygiene and security issues in the instant communication networks.", Vadim Andryan](https://reader031.vdocuments.us/reader031/viewer/2022022415/5a67192e7f8b9a453d8b461b/html5/thumbnails/11.jpg)
❖No central authority
❖You own your keys
BUY, TRADE, EXCHANGE
❖Decentralized trading
❖Fast and secure P2P
transaction
CVCOIN on the most secure decentralized exchange
https://openledger.io
www.facebook.com/cvcoin
www.twitter.com/cvc_ico
![Page 12: "Information hygiene and security issues in the instant communication networks.", Vadim Andryan](https://reader031.vdocuments.us/reader031/viewer/2022022415/5a67192e7f8b9a453d8b461b/html5/thumbnails/12.jpg)
…is not an alternative
it’s better…
The first decentralized
encrypted communication
platform for B2C and B2B
https://crypviser.network
www.facebook.com/crypviser
www.twitter.com/crypviser
Contact us: [email protected]