User2User Encryption for China

As we know, many companies find it difficult to operate in Chinese territories due to privacy concerns. However, Helix22 has addressed that issue and is expanding rapidly.

You see, with the Helix22 SDK, the data is always secure and protected. It does not matter what server or what app is running, the Helix22 data security cryptography is embedded along with the data, and therefore cannot be regenerated.  Your typical encryption app will only protect data while in transition. As in North America or Europe, your data is in the clear until encryption is applied with the key. Most encryption services have no choice but to read, copy and save all transmissions prior to encryption, that is just how they work. The only thing keeping the government from accessing it all, is the willingness of the company in question not to release it. Just ask Apple how much fun the have going to court all the time.  In China however, all apps and key services and hosted in China are legally obligated to record a copy of your transmission and forward it to the government. If you aren’t on Chinese servers, they will just ban usage.

However, withdrawing your business from outside of China is not really a long-term viable business solution. We have brilliantly overcome the data privacy conundrum and made it so no one need ever hand over data without your firm or nations consent.

How we do this is through the genius of DNA binding. This process embeds our encryption directly to the data.  Helix22 is the first ever B2B and B2G product that can protect all your data while at rest and in use…not just in transit. To do this we invented a true user2user encryption (U2U).  We manage transmission through the truly brilliant and patented pending universal Helix22 key service. The Helix22 encryption originates on your device. By the time the data arrives to our key server, it is already encrypted so all we need to do is issue another key. This key will only work with the receiving device, which generates a matching key required to open the data. In this protocol, we are truly a “zero-knowledge” server and even if subpoenaed, we can honor the request by just handing over the encrypted content…as that is all we have.  Helix22 also only use keys one-time and then destroys them. This way the data security is future forward prefect. Therefore, in our unique user-to-user encryption (U2U) world, there is no opportunity at all for any data breach.

Let’s explain that thought further. Let’s go ahead and assume that there is a data breach and your firms data is on a Chinese-based server. The breached data can be downloaded, forwarded, saved or copied but due to the encryption and key service technology that you have installed with Helix22, the person who has accessed the data cannot open any of it.

Let’s take it a step further. Even if you are a victim of an internal attack, any data that has been forwarded, downloaded, copied or saved cannot be opened. Period.  We have the world’s foremost data packets which are protected with multi-layered, military grade encryption algorithms that have already proven the ability to withstood quantum computing attacks. Our founders also founded Wickr, which is used by the US military and has never been hacked since its inception in 2012. Helix22 is several generations enhanced since then.

Let us just be honest. It is simply not good business to need to withdraw services from China. There is too much revenue on the table. Utilizing Helix22 for your data management strategy, makes China a perfectly viable market as anywhere else in the world.