|
Malware Secure Computers
Malware Detection
Software not needed or used
Based
on a New Class of Computer Components,
developed in house.
ROATI Technologies Inc.
December
17, 2019
In Short :
Our discovery will allow us to build Malware Secure Computers, which does not need to use Malware
Detection Software such as McAfee or Norton in order to safely:
-
visit Malware infected
web sites,
-
watch Malware infected video streaming,
-
open, edit, save
and share Malware infected emails as no longer infected,
-
open, edit, save
and share Malware infected user data files as no longer infected.
-
we
also have devised a method to prevent the introduction of a Malware by a malicious employee,
a well intentioned employee or an on-site hacker
For us "it is perfectly safe to have
a Malware located in our input stage", including any new and yet to
be discovered Malware which would normally would bypass existing detection
software. What we have discovered is a new way to process
computer information based and is based on a New Class of Computer Components
(NCoCC) developed at our lab at ROATI Technologies Inc.
The
new way which our NCoCC processes information will have a significant
impact of the future Malware Secure usage of: 1/
desk top computers, 2/ enterprise systems, 3/ PLC, 4/ IOT, 5/ IIOT, 6/ critical infrastructure, 7/ SCADA,
8/ process control, 9/ and other applications currently under investigation.
Our discovery may be applied to new, current or heritage
infrastructures.
It is perfectly safe to have a Malware resident in our input stage, our discovery has shown it to be 100% impossible for
that Malware to be able to infect the BIOS
or Hard Drive of the input stage of our system. Because of our
new design that Malware will only be temporarily resident while that
file is being processed. That temporary Malware simply does not get passed on to
the main processing and media storage areas of the system. This may be contrary to intuitive
thinking, however, we actually can process Malware infected files without needing to
detect the presence of that Malware. The core principle
of our discovery has been proven in our lab.
Once funded, our discovery will lead to
the development of a multi-billion dollar industry for
Canada. This discovery and new industry will firmly establish Canada as
a world leader in Cyber Security
innovation and the manufacture of specialized Malware secure computer based products,
for years to into the future.
Bank Funding Made Available, if We Can Demonstrate Technology
:
I was extremely lucky to have had the fortuitous opportunity to have a meeting with a
president of a major Canadian bank, where I described my discovery.
Before leaving that meeting, that president offered to sit down with me to seriously discuss
that bank funding my commercial product development, for a small equity
stake, then repeated "and I mean a small equity stake". This offer is contingent upon my Proof of Concept (PoC) sever performing as
I described; which I know it will, as the core principle has already been proven in my lab.
However, the cost of custom components for prototyping, circuit board design, specialized
technical hardware design work and some minor software and firmware development are beyond our ability to self-fund, therefore we are now
facing the need for government assistance.
Over the past three years, I have proven the core principle of my
discovery, confirmed availability of critical custom components,
self-funded our R&D to date, Yet despite my best efforts I just
can not afford to self-finance our PoC server in order to obtain the
funding offered by that president of a major Canadian Bank.
When we first proved the core principal of my NCoCC and our new computer design in our lab,
we needed to manually move files through the various stages of our system
in a specific pattern. Where we need help is to
computer automate the process in order to demonstrate our PoC design.
Now looking to the USA and other Countries :
Due
to the level lack of support for early stage innovation in Canada, unfortunately,
I am now starting to look to the USA and other countries for the
support we need. The amazing part is a president of a
major Canadian bank wants to fund my commercial product development
for a small equity stake and I can not obtain the support needed to
build a basic PoC computer. As a proud Canadian, it is with a sad heart that I need to make this move to
the USA or another country who will gain the technical and economic
benefit of my discovery.
My Background :
My name is Ralph Kachur, I have over 30 years of experience in Canada, Europe and the USA;
in electronic component technical sales, sales management, project management
and as an SME business consultant; I was instrumental in the supply of
components used in three satellites circling the globe, have held Canadian military security clearance
for a special project, am a novice C++ programmer and have been privy
to many electronic instrumentation design, marketing and business launch projects.
My
exposure to a breadth of technologies over 30 years has led me to this very
important discovery.
Our
Mission:
To develop within the Ontario Technology Corridor, an industry supporting our
Canadian discovered, designed, manufactured and supported Malware Secure computers, computer based products and
software to the world.
The following is basically the above with more detail and additional background, including a
brief section on what we can and cannot do.
History, Problem and Resolution
:
The problem lies in the need to use "detection software"
to detect the presence of a "known malware",
before it infects the BIOS or hard drive of your computer.
The proof, is in the thousands of
"yet to be discovered"
new malware which are being unleashed every week, which can and do regularly bypass existing detection
software companies such as McAfee or Norton. Detection software companies simply cannot keep up to the tidal wave of new Malware coming at
them, as is demonstrated by the many Cyber Attacks caused by a Malware intrusion
regularly announced in the news.
When a "yet to be discovered" malware hits the cyber sphere,
one can only wish for a very slow spreading of that malware on its journey
toward your computer.
Currently one can only hope for:
-
a timely discovery of that new malware,
-
the detection software company you selected can find a quick and effective patch,
-
a prompt update is made available to their customers,
-
a timely update to protect the computer which you are using to read this document.
All this does not occur instantly.
Cyber attacks are reportedly
costing the economies of the world over a Trillion dollars annually, of
which Malware is the most common vehicle used for
Cyber attacks. Cyber attacks are forecasted to grow even larger in 2020 - 2022.
Our newly developed technology will put a
significant dent into that forecasted cyber mayhem.
Although the current thinking is to detect the presence of a malware, I have felt for
several years, there just had
to be a better way.
This caused my multiyear journey into researching why and how the various the parts of a computer
communicate with
each other and how a malware enters a system. It was when I discovered a new computer principle, which
rapidly lead to our in house development of our New Class of Computer
Components (NCoCC), which in turn started us on our path to develop our line of
Malware
secure computers for the office environment and then for our line of
Malware Secure products for the manufacturing plant, IIOT and critical
infrastructure environments.
How
it works :
The
basic ROATI Technologies system consists of three physically isolated and
independent computers working in tandem, all contained within one
housing. The various stages communicate with each other through
a New Class of Computer Components
(NCoCC) which we developed in house. A
computer engineer may think of it as physical virtualization, but it is
not for is it a completely new and different way of processing user data
files.
The first stage
is the input stage where all incoming user data files and
internet activity are received "Malware infected or not".
Once received they may be presented for second stage processing, for
saving to our third stage.
Under normal operating conditions the first stage is configured to 100% prevent "any" Malware from entering the
main BIOS or hard drive of our first stage.
It is in this first stage where we made a major redesign of the
computers architecture and is one of several reasons for the high level of
Malware security we are able to achieve.
The second stage is
where all information files are passed through our NCoCC.
It is here where internet activity, video streaming, emails and user data
file are all securely
transferred to the third stage as
"no-longer-infected", even if that file was or was
not originally Malware infected, all files are processed the same.
The core operating principle of this stage will be revealed once our patent protection
has been secured.
The
third stage may be thought of as what one
would consider an existing design for a PC or server, but is considerably
different. It is
similar in that it is in this stage where most of our general computer
processing
and long term storage media are located.
For
this stage we have added new security features, which includes
a design to prevent an
external storage
media, such as a USB or CD, to introduce a malware, by a: 1/ a malicious employee, 2/ the
un-intentioned but detrimental activity of a good
employee doing work at home on their computer, which contains a "yet-to-be-discovered"
Malware or 3/ the on premises introduction of a
Malware by an onsite
hacker.
For
all stages the obtaining, loading or updating of, "malware safe
software",
will be controlled via our new method for obtaining "malware secure
software". Details will be released once our patent and copyright
protections have been secured or will more likely be revealed as part of
our product launch.
Once trained on our new methods, IT professionals and security
aware users will be
able to confidently load "malware safe software and updates" and
not have to worry about using the Malware infested internet.
Our
plan:
We
need to demonstrate
proof of our new technology in order to obtain funding for commercial product
development, but we first need government support to build a very basic Proof of
Concept email server.
A
PoC demonstrator is in fact quite easy to build as it can be built using
existing technologies, discrete components and existing software.
Our commercial production design will require the specialized skills of a
low level computer hardware engineer and custom software engineer.
There
are four main steps:
1/ Disclose
the core secret to a trusted government employee.
Due
to my need to obtain government support and because my statements are
likely hard to believe, I will need to disclose the core secrets of the
technology and the basics of my business plan, to a trusted government
employee. Once disclosed, the accuracy of my statements about
this new technology and the
considerable economic benefit for Canada will become
abundantly obvious.
I
am very cautions as to who I will disclose this to, mainly because of the temptation
to another to gain great personal wealth and my concern for the potential loss to the Canadian economy if my secrets are improperly
disclosed. Although an NDA will need to be signed, I would prefer
to only disclose my secrets to a person I have met and I am totally confident that
my secrets will not be disclosed to another. However, that
person needs to be of such
stature, within the government, that others will believe what that person
has to
say about my discoveries and innovations. I trust you,
the reader, will appreciate my caution. However, my position is open
for discussion, especially if it means moving this project forward.
2/ Determine if the
hardware can be built.
I
have spent the good part of
the first two years
researching our component variations with Silicone Valley giants and
international suppliers from India to Germany.
This has been quite the challenge as we are a new, unknown and
unproven company.
It
was difficult
to break through their customer service firewalls in
order to obtain access to senior design engineers. However, we
were finally able to get through to all the important senior
engineers we
needed to talk to and were able to obtain confirmation for many
of our
unique component designs.
3/ Build a Proof of Concept server.
Some
standard components have been purchased. Certain solvable computer
PCB design
challenges need specialized technical design advice.
I
have to date:
-
proven the core principle in my lab,
-
confirmed
standard and custom components,
-
self-funded our research and
development to date,
-
plus, I have attempted to self-finance our Proof of
Concept server.
However,
the cost of
custom components for prototyping, circuit board design and some software
development are beyond our ability to self-fund, therefore we are now
facing the need for government assistance.
4/
Demonstrate technology.
I
have
an independent ethical hacker who will do aggressive malware penetration
testing and will document their findings on line. Also I will request government cyber
security specialists to do aggressive malware penetration testing.
Likely I will approach the Canadian Center for Cyber
Security branch of the Communications Security Establishment. As
we will then be armed with "documented proof" that malware protection was
actually accomplished without the need or use of virus or malware detection
software, it will become obvious to all the very high level of malware protection we will be able to provide to
Canada, the world and the considerable economic
benefit for Canada which our Malware innovations represents. It is at this point, that I will then make application to funding agencies for
commercial product development and or sit down with the president of
that major
Canadian bank mentioned at the beginning of this article.
Markets:
Anywhere a malicious malware can infect a computers BIOS or hard
drive, destroy data, ransom data, cause costly data misinformation or
the release of sensitive personal, corporate or
military information.
In short, anywhere in the world where the flow or exchange of information data needs to be
Malware Safe.
Other Malware
Safe uses for
our NCoCC
:
Other
markets currently under
investigation for our NCoCC include: use in laptop computers, tablets, cell phones,
instrumentation applications and others. The major obstacle for entering these markets is the
high cost
for R&D to miniaturizing our NCoCC into a hybrid /
integrated circuit. Miniaturization is needed
for high volume production for lower cost and size
reduction for portable and IIOT products. We just cannot afford the high cost of
a hybrid R & D project at this very early stage of our corporate
development, but is certainly part of our long term objectives and
business plan.
Enterprise
Systems: (a special market)
The
enterprise market for our NCoCC is broken down into several sub categories.
Here are a few:
-
Air-Gap
and non Air-Gap closed loop systems, will be able to use our computers as secure
terminals for external input/output and or secure internet activity,
which for security reasons was previously not even considered.
-
Smaller
enterprise systems of 5 - 500 computers, where Malware intrusion via
internet searching or emails are a major concern.
-
Protection of communication lines
for Critical Infrastructure such as an electrical power grid.
-
Large
companies such as financial
and Insurance Institutions, where internet input is needed from
customers and employees and
their concern that the data information be
secure and a Malware is not able to gain access into the main
system.
-
Internet
input to government computers such as income tax.
Malware
Secure Computers and our NCoCC based products manufactured
in Canada by ROATI
Technologies Inc., will significantly reduce the level of Malware
infestations inflicted upon enterprise and government systems, therefore significantly
reducing the high financial costs of mitigating the damage from and
actual attack. Also, the indirect cost caused by the loss of corporate
reputation due to the public announcements of an attack because of the
requirements of GDPR and other similar international standards.
What we Can and Cannot do:
"We
cannot" prevent password stupidity. However,
"that hacker will only have access to what
that single user has access permission for".
By the very nature of our design, a destructive Malware just cannot get
in.
"We may be able to" prevent access to our system
because of poorly designed software.
" WE CAN " provide systems which:
-
absolutely prevent a Malware from entering the BIOS or Hard Drive of our systems first,
second and third stages,
-
allow for safe internet activity, including video streaming,
-
allow for the safe opening, using, editing, saving or sharing an incoming Malware infected:
1/ email as no longer infected, 2/ email attachment such as Word or PDF, as no longer infected, 3/ user data file or an information data stream as no longer infected,
-
securely process
only desirable text based scripts, while preventing undesirable text based
script attacks,
-
prevent the unauthorized access and introduction of a malware to our main processing
and internal storage media areas by a malware
infected media such as a USB or CD,
-
when
a good employee takes work to do at home and
that work becomes malware infected with a new and yet-to-be-discovered Malware,
which would normally bypass detection software like McAfee or Norton, that
now Malware infected work may be confidently uploaded back onto our
systems, without the fear of that yet-to-be-discovered Malware being uploaded with that
work.
-
if a hacker obtains a user password, that hacker will only have access to
what that user has access permission to. Any attempt for a Malware
entry will be prevented, resulting in protection against a
system wide Malware
attack. This feature has important application
in enterprise systems,
-
protect data communications for most PLC, SCADA, IOT, IIOT, process
control and critical infrastructure
applications.
-
reliably do all the above, without the need or use of Virus or Malware
detection software,
-
provide a
secure commercial service, for internationally distributing "Malware safe" software &
updates, instead of using the Malware infested internet.
|
Conclusion:
Since we federally incorporated September 21,
2016, it
has taken us a considerable amount of perseverance to
reach the stage which we have been able to achieve to date.
We are
on the precipice of an evolutionary
shift in cyber security. Now all we need is a feather of help to tilt
us over the edge and to turn
our discoveries into a significant economic benefit for Canada.
With pride, I quote Winston Churchill, "we have
accomplish so much, with so
little".
Here is a final thought for you, while we are slow to market, because of
our limited financial resources, much of Canada and the worlds' Cyber space remains
under - preventable attack.
I
most sincerely invite you, the reader, to contact me, to challenge
or question the above
statements or to make any suggestions you may have to
offer.
I have found the following to be true.
The
Novice: is very impressed with my discovery.
The
Expert: based on 0% knowledge of my discovery, say it is
impossible. This is the dilemma I face.
I
need help. Please be in contact, even if is to provide 60 seconds of your
time.
Safe
Computing,
Ralph Kachur,
President,
ROATI Technologies Inc.
Protecting Electronic Information
with Malware Secure Computers
Proudly designed, manufactured &
supported by Canadians.
I am often asked:
How can you develop this when thousands of computer professionals
have not?
My answer is:
Gravity has been around since the very beginning of time.
It took Isaac Newton, over 300 years ago to see
the obvious.
For me the knowledge and experience gained in over
30 years of electronic component technical sales,
was helpful.
I cannot see the
future, only the now.
I can only hope that
what I do today
will
prepare me for tomorrows now.
The above are our declared objectives, of which we are heavily invested in
attempting to achieve. However, we would not be so heavily invested for as long as
we have been, unless we felt the above to be possible and achievable; for much has already
been achieved. We now need help to turn our discoveries into a commercial reality for
Canada.
As we are in the development
stage, no decision
of any kind should be based on the above and is subject to change
without notice.
|
ROATI Technologies Inc.
1216 - 64
Bramalea Road
Brampton, Ontario, L6T 2W8
Canada
(905)
846-1233 |
EST, -5
GMT,
-5 UTC
|
(800) 458-3089 |
USA & Canada
|
Phones answered
|
8:00 am - 9:00 pm
|
Eastern Standard Time, 7 days / week
|
|
5:00 am -
6:00 pm
|
Pacific
Time, 7 days / week
|
|
≥
1 hour
|
all
time zones.
|
www.roati.com
ralph@roati.com
f
|
|