Simple, Secure & Anonymous.
Despite increasingly robust solutions from software giants in the antivirus space and the collaborative efforts of Internet security players - including government and private initiatives - no effort has succeeded in creating an impenetrable layer of security between a web browser and a computer or corporate network. Why? Incremental virus software improvements are not the solution.
The only way to protect a machine or network from Internet-borne criminal mischief is to physically block its exposure to the Internet. How can a machine be physically blocked from the Internet and still be online?
Webcloak™ is a small USB device with a distinctive form factor containing a technical architecture that shifts the paradigm in web security by creating the most impenetrable barrier between a client machine and the Web. Featuring a game changing combination of hardware, encryption and "secure access" software, Webcloak™ provides a physical shield that allows users to safely browse the Web while being protected from viruses, data theft or identity theft - it essentially makes you invisible. With an incomparable configuration of hardware and software, Webcloak™ not only protects your computer from Internet threats, but also protects you from hostile applications on the host computer - the product simply stops any incoming access to the host machine. Webcloak™ does not install any software on your computer, you simply plug it in and the protection begins. No need to restart your computer, Webcloak™ works without rebooting! When you shutdown Webcloak™ there is no trace of it or your Internet activity left behind.
Webcloak™ Protects You Against:
Also protects you from:
- "SideJacking" - Wi-Fi Session Hijacking
- Network Traffic Sniffing
- DNS Spoofing
- Key-loggers and Screen Scrapers
- "Man in the Middle" Attacks
- Site Visit Tracking Code
- Cryptolocker and All Other Ransomware
- All Viruses and Exploits
What Makes Webcloak™ Unique?
WebCloak creates the most impenetrable barrier between you and the web. It’s our mission to provide a completely safe, secure and anonymous online experience. In order to do so, we took a step back to view the whole picture: what currently exists in the realm of internet security, what are people doing, what works, what doesn’t work and what’s missing? Where are the holes? Where are the vulnerabilities? Most solutions focus on monitoring, detection and mitigation, meaning you’ve already been compromised, how can you minimize the damage? You have the wound, how can you stop the bleeding? Our goal is to make sure you never reach that point. Webcloak™ uses a ground-up, combination of hardware, encrypted hardware virtualization and a game changing encrypted communications system coupled with a custom cloud enabled Internet desktop operating system. You may have seen products on the market that claim to protect you while using the Internet by using encrypted thumb drives and "portable browsers" or bootable thumb drives and dubious free anonymity software. These products offer limited to no protection and can be difficult to use, all while providing a false sense of security which makes you more vulnerable.
How Does Webcloak™ Work?
The device encases an "Internet desktop" running a secure virtual operating system. By plugging Webcloak™ into your computer, it forms a "machine within the machine". Unlike conventional web browsing, with Webcloak™ the Web is not able to identify or access your computer in any way, shape or form. Webcloak™ protects information as it travels to and from the Internet using our SafeChannel message encryption system. All data is encrypted using a customized version of Advanced Encryption Standard (AES) 256-bit encryption which is rated by the National Security Agency (NSA) as "Top Secret" level encryption, their highest rating. With Webcloak™ do your banking and make online purchasing without fear of data theft, virus infection or vandalism.
Step 1: Plug Webcloak™ Into Your Computer
STEP 2: Login
STEP 3: System is Secured
STEP 4: SafeWeb Desktop
SafeWeb includes a customized browser that uses our encrypted communications system, along with additional security features, to create a safe, secure and anonymous browsing environment. All of your Internet activity is encrypted as it passes through the host machine to the Internet. Your location and identity is masked by a secure proxy system. SafeWeb also includes your “Internet desktop” that provides access to our secure Internet applications – browse, chat and much more. New secure applications will become available to you as we add them to SafeCloud, our secure cloud environment.
SafeVault is your secure, encrypted drag and drop file store that allows you to keep your most important files with you wherever you go, securely using top secret level encryption. Simply select files and drag them onto the Webcloak™ application. You can also browse and search for files and folders, extract, rename and delete files on the Webcloak™ device. SafeVault provides access to our SafeCloud secure cloud storage environment. Any files or folders that are created in the SafeCloud folder do not reside on the Webcloak™ device, instead they are added to SafeCloud and are encrypted using top secret level encryption.
SafeKeeper is your secure encrypted password keeper that allows you to store all of your passwords and account numbers on your Webcloak™ device. When you want to access a site simply select the SafeKeeper entry and click the link. Webcloak™ will switch to the SafeWeb browser and automatically log you into the site. You don’t need to remember all of your passwords, and all of your important sites, passwords and account numbers are easy to find in the SafeKeeper system.
Backup and restore your Webcloak™ device on your computer or in SafeCloud. You don’t want to take your Webcloak™ device back and forth to the office? You can have as many Webcloak™ devices as you like and you can keep them synchronized using SafeCloud's synchronization feature.
- One-click stealth mode hides Webcloak™ from prying eyes
- Uses password and security image authentication
- Protects personal information as it travels to and from the Internet
- Anti-spoofing protection
- Access to SafeCloud secure cloud storage
- Backup, restore, and synchronize your Webcloak™ device in SafeCloud
- Lock Webcloak™ with a click of the mouse
- Encrypted password keeper
- Encrypted drag and drop file vault
- Encrypted cloud storage
- Scroll down for more...
A Growing Issue
Each year the Internet becomes more dangerous, attacks by hackers become bolder and more sophisticated. The risk of infections by viruses/spyware and the cost to individuals/companies are increasing at an alarming rate. The computer and Internet security industries have simply not been able to keep pace in combating this new generation of attacks. Key industry experts are speaking out about the problem, but lack solutions.
If You Are Browsing, You Are Vulnerable - When browsing the Internet users unknowingly step into a cyber-war zone exposing their data and hardware infrastructures. Open a browser to the Internet and you open a doorway that swings two ways - outward toward the vastness of the Internet and inward toward the guts of your machine. While your browser enables you to go anywhere on the Internet, your browser simultaneously allows cunning wrongdoers to go anywhere inside your computer network.
There are new "Root-kit" viruses that can take over your computer and operate undetected by you, your operating system or your anti-virus software. There are "Botnets" that use the machines of unsuspecting computer users as robots to systematically attack governments and large institutions.
Identity theft, fraudulent transactions, lost productivity and stolen photos are major and growing issues. According to the FTC, identity theft and fraudulent transactions now cost individuals and companies more than $80 billion annually in the U.S. alone. It is estimated that more than 50% of computers are infected by at least one virus, malware or spyware program. With the explosive growth of Internet use comes the exponential growth of Internet attacks. The threat is hyper-real, ubiquitous and costly.
Have you ever clicked a link to realize that you have unleashed a virus on your computer? Do you know anyone who has been the victim of identity theft? We understand your fear.
Our team is committed to delivering the best level of computer security and have been working hard for the last 3 years with leading experts in cyber-security and encryption specialists.
Martin Dawson, Chief Technology Officer:
Martin Dawson has software development experience that spans over 30 years and includes the creation of the first Internet interactive streaming media products, LearnFlow and Xstream Media. Mr. Dawson also created the first practical audio delivery technology that enabled streaming audio and the viewing of rich multi-media content over the Internet. He has pioneered the technologies for delivering automated software updates over the Internet and for delivering interactive media to web browsers - years before Flash and Shockwave.
Mr. Dawson has designed and developed proprietary software for companies such as Microsoft, Intel and Citrix. Additionally, software created by Mr. Dawson has been part of a tool set pre-installed on Dell, Micron and Gateway computers.
"My first “shrink wrap” product came out in the late 80’s and was called "Quickstudy for Lotus 1-2-3", which included over 60 highly interactive software simulation based tutorials on a single diskette. You learned how to use software by interacting with a complete simulation of the software. If you had 1-2-3 installed on your computer, Quickstudy would create an interface which allowed you to launch the tutorials from within 1-2-3’s menus and dialog boxes. In the early 90’s at a Comdex show (a computer tech gathering) the hall was abuzz with talk of the pre-release of a new graphical “Web Browser” called Mosaic. I was intrigued and immediately acquired a copy. I realized that because of the component based object oriented nature of my simulation engine I could potential adapt it to “streaming” media for the World Wide Web. I succeeded and “LearnFlow” was born. LearnFlow allowed us to stream our interactive content along with audio and other multi-media formats over a common modem connection. When Microsoft released its new “Microsoft Office” website we were asked to provide our technology and create content for their on-line demos. This was years before Flash and Shockwave. I didn’t stop there" - Read more…
Mr. William Shopoff — Chief Executive Officer:
CEO Bill Shopoff has a gift for building, motivating and managing teams to succeed in entrepreneurial ventures. He attributes his success with these teams to a watershed experience in his training — studying with Dr. Edward W. Deming who emphasized quality control and systems-based business management.
Bill Shopoff has also been instrumental in technology-based projects including co-founding eBridge Technology Ventures I and II. He was an early stage investor in ITV Capital and Voyager Capital, two venture capital companies launched in the late 1990’s.
Use of Funds
Your funds are greatly appreciated and will be used to finalize and test the Webcloak™ hardware and software. Funds will also be used to produce the initial Webcloak™ devices as well as purchase additional cloud servers.
Risks and challenges
Webcloak™ utilizes a custom USB device that has to be manufactured. We are working with a reputable U.S. manufacturer and have two backup manufacturers, but unforeseen events can occur in the world that can affect supply and potentially create delays in delivery.
We have been working for years to create the most comprehensive Internet security and anonymity product that includes all of the features and tools to safely use the Internet. We believe that we have created an invulnerable system, but the bad guys are hard at work as well and there are new vulnerabilities popping up every day.
We are constantly watching for new threats and have created mechanisms in our systems that will allow us to securely update or enhance the Webcloak™ environment if needed.
It is important to understand that the Webcloak™ device is still being prototyped and the product needs further development to be consumer ready.
The first version of Webcloak targets Windows systems. We will be releasing versions that support all popular operating systems in the future.Learn about accountability on Kickstarter
- (45 days)