In a circumstance straight out of the old school world of cyber espionage, an employee at Tesla was offered $1 million to install malware at the Tesla Nevada Gigafactory plant.
Fortunately for Tesla, the person reported the incident. Tesla then got the FBI involved and the culprit was apprehended.
Interestingly, if the person who had been approached had taken the million, it wouldn’t have made any difference to Tesla’s data, well, as long as the Helix22 data security SDK had been installed.
You see, with the Helix22 SDK, Tesla’s data is always secure and protected whether in use, at rest or in transit. The Helix22 data security cryptography is embedded along with the data itself, and subsequently stays attached to the data and therefore cannot be exfiltrated by unintended users. Even if the effort was primarily a ransomware attack, Tesla could just ignore the threat as all their data is 100% protected.
How we do this is through the genius of our patented DNABindingTM. This protocol embeds our encryption directly to the data. On Tesla’s system, or yours, data is always protected. Even at rest or in use, your data is always safe. To handle transmission, we invented a true user2user (U2U) encryption. We manage data security transmission through the truly brilliant and also patented universal Helix22 key service. The Helix22 encryption originates on your network or device. When data arrives to our key server, it is already encrypted so all it needs to do is issue another private key. This key will then only work with the receiving device, which generates the matching key required to open the data. In this protocol, we are truly a “zero-knowledge” server so your Intellectual Property (IP) remains encrypted. Even if subpoenaed, we can honor the request by just handing over the encrypted content…as that is all we have. Helix22 also only use keys one-time and then destroys them. This way the data security is future forward prefect. Therefore, in our unique user-to-user encryption (U2U) world, there is no opportunity at all for any data leak.
Let’s take it a step further and address the Tesla example. Even if Tesla had fallen victim to the internal attack, there is no reason for concern of data theft. Any data that has been forwarded, downloaded, copied or saved cannot be exfiltrated. Period. Helix22 has the world’s foremost data packets which are protected with multi-layered, military grade encryption algorithms that have already withstood quantum computing attacks and penetration testing by MI6.
The BLAKFX founders also founded Wickr, which is used by the US military and has never been hacked since its inception in 2012. Helix22 is several generations enhanced.
Finally, the Helix22 encryption is quantum computing era immune.
Though we hope that all firm’s have as honest employees as does Tesla, in reality we all know on occasion, they might take the money.
Hopefully, you will have Helix22 installed so you can just fire the person and move on.
Helix22 – Zero Risk
To read more about the thwarted attack on Tesla, click here: