Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Global-WAN - The Swiss Neutral Data Haven

Able to transmit any existing network service (voice, video, data), Global-WAN neither requires modifications nor any configuration in the infrastructure, either for end-users or telcos.

  • Login to see the comments

Global-WAN - The Swiss Neutral Data Haven

  1. 1. Global-WAN® Swiss Data Haven The Neutral Global Network Built on Post-Quantum Security for “The Internet of Things” global-wan.ch
  2. 2. This document is aimed at helping people to understand the Global-WAN technology. Further information regarding the internals of TWD Industries AG's technology are available under a proper NDA, to selected partners. 2 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  3. 3. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 3 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  4. 4. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 4 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  5. 5. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 5 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  6. 6. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 6 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  7. 7. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 7 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  8. 8. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 8 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  9. 9. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 9 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  10. 10. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 10 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  11. 11. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 11 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  12. 12. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 12 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  13. 13. The Problem “Nations have no friends, only interests” John Kornblum US Ambassador in Germany (2014) 13 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  14. 14. US Vendors' Dilemma “How do you protect what you want to exploit?” Scott Charney, VP Trustworthy Computing, Microsoft 14 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  15. 15. US Strategists' Dilemma “The Internet is the most transformative innovation since Gutenberg and the printing press, yet we're treating it as a war zone.” Jason Healey The Atlantic Council (US think-tank) 15 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  16. 16. The Solution “To restore trust, there's no substitute to offering the real thing: forever unbreakable trusted security.” TWD Industries AG, 2007 16 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  17. 17. Global-WAN Purpose & Distinctive Value Unique, By-Design 17 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  18. 18. “Securing Phone, Fax, Radio, Video Conferencing, Web applications, unified communications, etc. with Forever-Unbreakable Trusted Encryption”. For * Individuals (consulting, politics, lawyers) * Enterprises (board, partners, R&D, branch) * Governments (Army, Police, energy grid, embassies, trading, etc.). 18 | Copyright © 2014 TWD Industries AG. All rights reserved. PURPOSE Global-WAN
  19. 19. 19 | Copyright © 2014 TWD Industries AG. All rights reserved.
  20. 20. EASE OF USE 20 | Copyright © 2014 TWD Industries AG. All rights reserved. Plug & Play and: - Compatible with all HARDWARE - Compatible with all SOFTWARE - Compatible with all Operating Systems (IBM, ORACLE, Apple, Microsoft, Linux...) Global-WAN
  21. 21. Global-WAN 21 | Copyright © 2014 TWD Industries AG. All rights reserved.
  22. 22. FOREVER SAFE 22 | Copyright © 2014 TWD Industries AG. All rights reserved. Security designed to last: - Proven as unbreakable forever (post-quantum) - Hides communication endpoints (where, who) - Hides application and user metadata Complete security: no “what, who, when, where”. Global-WAN
  23. 23. Global-WAN Business Development Investment Opportunities 23 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  24. 24. To accelerate its Development, TWD Industries AG invites International Investors 24 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  25. 25. “With the right acts of digital sabotage, attack aircraft will be grounded, infrastructure disrupted and communications severed, reducing the enemy to a state of raging, pre-modern impotence.” The Economist 25 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  26. 26. 26 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  27. 27. “There's a market failure in cyber-security, made worse by the trouble firms have in getting reliable information about the threats they face.” The Economist, “Vulnerabilities - Zero-day game - Wielding a controversial cyber-weapon.” 27 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  28. 28. 28 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  29. 29. “To avoid lurid headlines about car crashing, insulin overdoses and houses burning, tech firms will surely have to embrace higher [security] standards.” The Economist "The Internet of things (to be hacked)" 29 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  30. 30. 30 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  31. 31. INVEST GLOBALLY In Emerging Markets and Established Markets: ● USA (“the NSA has destroyed trust”) ● EUROPE (badly needs resilience, growth) ● AFRICA (new infrastructure, sovereignty) ● ASIA (needs to foster independence) ● LATIN-AMERICA (won't trust the USA) 31 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  32. 32. INVEST IN NATIONS Securing the CRITICAL INFRASTRUCTURE: ● Security (Army, Police, Finance, etc.) ● Assets (Water Supply, Airports, etc.) ● Energy (Pipelines, Nuclear Plants, etc.) ● Networks (Internet, GSM, 3G/4G, etc.) ● E-Admin (e-Votes, e-Medical, e-Fiscal) 32 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  33. 33. INVEST IN PATENTS Let Global-WAN licence its patents and micro-chips to secure all these devices. 33 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  34. 34. Architecture & Components Designed From Scratch (can't trust existing products) 34 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  35. 35. SOFTWARE COMPONENTS G-WAN: A Server That Can be Trusted Designed To Build A Secure Platform: ● Less Code, Less Bugs, Higher Efficiency ● New Technologies (Parsing, Memory, etc.) ● No Vulnerability Found Since 2009 Launch Needed a Safe Server to release Secure Services. 35 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  36. 36. Lorenz-Waterwheel Designed to Scale From [1-∞] CPU Cores. Lock-Free, Wait-Free, Multi-Threaded and Event-Based. 36 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN Connections MULTICORE SCALABILITY
  37. 37. 37 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN MULTICORE SCALABILITY
  38. 38. UBIQUITOUS PLATFORM G-WAN: Lightweight (200 KB) App. Server Designed To Run Everywhere: ● Smartphones (Low-Consumption, Low-Latency) ● Embedded (Control At The Lowest Level) ● Servers (Web, SaaS, PaaS, Clouds) With Scripts In 17 Programming Languages: (asm, C/C++, C#, Java, Scala, Go, Javascript, Lua, Perl...) 38 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  39. 39. VERSATILE PLATFORM G-WAN: An Universal Stack Open to Third-Parties: ● Applications (C/C++, C#, Java, Obj-C, Perl) ● Middleware (HTTP/S, asynchronous scripts) ● Database (Key-Value, SQLite, ORACLE) ● Infrastructure (DNS, Email, Proxy, VPN, etc.) 39 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  40. 40. ZERO CONFIGURATION G-WAN: An Unobstrusive Stack Why Configuration Files Are Bad: ● Confusing, User Errors, Buggy, Version Incompatibilities ● Mostly Redundant with existing File System Information ● Inadequate: Adaptive Options Are Much Safer / Efficient Safer, Faster, Simpler, No User Lock-In, No Planned Obsolescence, Able to Run on Unattended Systems. 40 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  41. 41. ORACLE OPEN-WORLD 41 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  42. 42. ORACLE OPEN-WORLD 42 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN Making The Impossible Become Routine ● G-WAN Accelerating ORACLE NoSQL ● In A Social Gaming Demo Of 100 Millions Bots ● All Moving In Real-Time (Heading, Speed, etc.) ● Queried by 45,000 Persons Joining The Game ● And Achieving A Whooping 1.2 Billion of TPS ● ...On A Mere 6-Core Desktop Machine!
  43. 43. The Global-WAN Project Development Schedule 43 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  44. 44. 44 | Copyright © 2014 TWD Industries AG. All rights reserved. Reaching The Harvesting Phase 3 years 2 years 5 plus years  Integration still dominating  Exploitation gains speed  Consolidation of development processes is key  Minimize team churn and grow it only slowly  Focus on integration  Only very few clients  Gain experience in automation  Build a strong team  Integration becomes less important  Exploitation takes lead and grows significantly  Quality becomes key topic  Long term employees perform best Information Integration Information Exploitation 1) Ramp-up phase, 2008 2) Consolidation phase 3) Harvesting phase, 2014 Global-WAN
  45. 45. Productivity Standards Favourably Comparing With The Next Best: 45 | Copyright © 2014 TWD Industries AG. All rights reserved. Server Birth Files Blank Comment Code Total Nginx 2002 256 35,131 4,308 94,369 133,808 G-WAN 2009 171 11,198 42,706 56,766 110,670 G-WAN was written in less than half the time, and offers many more features in half the code of Nginx. Further, G-WAN's source code has 10x more comments than Nginx's code. Source Code Lines Global-WAN
  46. 46. Why TrustLeap? The Need For Global-WAN on both Server and Client Sides 46 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  47. 47. Unbreakable Security ● Future-Proof (Post-QUANTUM) ● Mathematically Proven (Can Be Trusted By All) ● Independent From Computing Power Used To Break It ● No More Need To Enlarge Encryption Keys ● No More Need To Change Encryption Algorithms ● Also Unbreakable Two & Three-Factor Authentication ● No Central Key Repository Needed (But Can Be Used) ● Mobiles / Embedded: Very Low Overhead (CPU / RAM) 47 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  48. 48. The Value Of Trust Applications ● Corporate Asset Protection (Patents, Talks, Databases) ● Public Asset Protection (e-Votes, Medical Records, Legal) ● International Negotiations (United Nations, Contracts) ● Transaction / Archiving Certifications (Indisputable) ● Defence (Impenetrable Communications, Drones, etc.) ● Chips Would Be Ideally Used (Tampering, I.P. Protection) ● Legitimacy to Impose a Licensing Monopole (Exclusivity) 48 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  49. 49. Trust Starts With Identity ● Email (Data Protection, Negotiations, Board Talks) ● Routers / Firewalls (How Safe Are Barriers If Broken?) ● Transactions (Trading, Contracts, Non-Repudiation) ● Storage (Confidentiality, Tamper-Proof, Full-Control) ● Defence (Remote Presence / Control, Chain Of Orders) ● I.P. Rights (What Worth Is A Proof That Can Be Spoofed?) ● Legal (Customers / Lawyers / Regulators Security Chain) 49 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  50. 50. TrustLeap Worldwide Corporate HQ TrustLeap Paradiesli 17 CH-8842 Unteriberg SZ Switzerland Phone +41 (0)55 414 20 93 Fax +41 (0)55 414 20 67 Email contact@trustleap.com www.trustleap.com About TrustLeap TrustLeap, the security division of TWD Industries AG, protects digital assets with cryptanalytically unbreakable technology (safe against unlimited computing power as it is proven mathematically that no key leaks can be exploited). The TrustLeap secure platform leverages offers of enterprise, cloud, networking, digital media and financial services in global strategic markets. TrustLeap lets partners and users form dynamic ecosystems where duly accredited strangers can safely trust each-other. Establishing widespread trust enables organizations to secure their infrastructure, raise the value of their offers and safely market their digital assets. TrustLeap 50 | Copyright © 2014 TWD Industries AG. All rights reserved.

×