Joining Together to Improve Our Privacy
As we hear in the news every day, our sensitive data is not secure. For instance, in 2015 alone hackers were able to steal medical data of more than 100 million Americans. Yet at the same time, in the normal course of our daily lives, we need to share confidential information.
Using the patented SEED Protocol, we can together build a secure foundation for the future of our hyper-connected world. The Secure Exchange of Encrypted Data [SEED] Protocol delivers unprecedented security, portability and control.
We believe our privacy should not be expensive, thus we are seeking support from the Kickstarter community to keep our pricing affordable for all. And you take advantage of Kickstarter-only prices -- 20% lower than they will ever be again.
Part technology product, part social movement, our solution puts the individual in control of the information about them. A groundswell of support from empowered individuals will advance the privacy agenda.
Demonstration of V-1
The SEED Protocol application automates the entire process, making it easy to encrypt, store and share your sensitive data. Check out our brief demonstration video:
How It Works
For those wanting to learn more about the patented SEED Protocol's inner workings, watch our short "How It Works" video.
Your confidential data remains encrypted with your individualized lock as it moves across organizations, applications and devices. You control the keys, deciding who has access and monitoring their use. Individualized encryption creates an insurmountable cracking hurdle. Plus, even the IT staff cannot access your data.
We will use Kickstarter funding to:
- Develop end-user applications for additional platforms such as OSx and Android
- Create the mobile key vault to back-up your keys
- Continue refining the core software
Tom Reid, Lead Inventor, will continue his work on the project without compensation from the Kickstarter funding.
Consumer Profiling: Another Strong Case for SEED
How bad has consumer profiling become? Watch our short video to find out (or to confirm what you already suspected)!
The SEED Protocol provides the mechanism for us to control the information collected about us from retail purchases, Internet browsing, and so many other activities during which we are tracked.
Right now in the U.S. we lack the legal rights to demand control over our consumer data. The E.U. has moved much closer to this goal. Only consumer power can advance the agenda and drive the regulatory process. Let's demand the change we need to take back our privacy.
Gaining Competitive Advantage
Health care providers and research consortia using the SEED Protocol gain the trust of patients contributing their confidential health data. Legal and professional businesses that adopt the SEED Protocol will offer their clients and customers the ultimate in security and control. Software companies that become SEED-certified will deliver behind-the-scenes protection.
Key Master: The prototype encryption computer features a quad-core Intel processor, 8 GB of RAM and a 128 GB SSD. The considerable processing power of the Key Master delivers high performance services for a group of people in a home or small business. In the production version we will eliminate unnecessary ports.
Encryption: We currently use the standard RSA asymmetric encryption library with 2,048-bit keys. The Protocol can support any standard asymmetric encryption library, e.g. elliptical curve.
Registry: The Registry software runs on Amazon EC2 providing high performance from anywhere in the world.
Cloud Lockbox: In version 1, we use Amazon S3 Standard to store the encrypted files. This robust service offers 99.9% availability and 99.999999999% durability of your files due to cross-region replication.
Risks and challenges
All software development projects face unforeseen complexities. The SEED Protocol benefits from three key advantages. First, we already have a working prototype meaning that the fundamental technical feasibility has already been established. Second, the leadership team brings decades of experience in software development, cybersecurity and protocols. Third, we have a "deep bench" of additional technical talent to tap as needed for specific aspects of the development.
We will no doubt experience setbacks and surprises, but our timeline includes provisions for the unexpected. Our CEO, Tom Reid, has a long history of leading projects to successful, on-time and on-budget completion.Learn about accountability on Kickstarter
- (28 days)