The R1 is a device first designed and patented to be a security focused travel router, created for an organization’s top professional on the go.
But we are able to supply an office or home router.
The R1 would act like a wall between you and everybody else, keeping all your devices safe in a secure bubble . Isolating them from networks and Providing Enterprise security All while being Portable and convenient
Since the R1 now faces the internet for you. It was built from the ground up with as little software and vulnerabilities as possible. So much so it has its own Cisco Anti Virus. It was and still every version is being tested by a 3rd party pentesting lab. In 2019 we will throw it at the biggest ontario hackathon for hackers to try to hack it for a big reward!
With RADIUS TLS (No evil twin, since nobody has the private certificate on the R1)
Speaking of evil twins. The R1 will shoot down any evil twin it detects in the vicinity. Engaging in this fight with its superior hardware, to make sure the security of the client isn’t compromised.
ezSec’s and Cisco’s patented technologies are seen here at work, with feeds from VRT at Cisco and Malware Research at ezSec, the modified Snort engine is able to filter out almost all bad traffic on the network.
Utilizing the power of Deep Learning our Data Science team at ezSec was able to find a way to get almost perfect accuracy on a classical data set released by Darpa called KDD Cup and its NSL variant, these are the most cited databases in intrusion detection research.
This beta module has been fed quite some simulated and real data and has been returning crazy results.
Read more on this @ Boutaba et al. Journal of Internet Services and Applications
Recently we announced a partnership with Amsterdam based startup, Elastic.
They have crafted a very special pack for us to detect attacks like DNS, and HTTP exfiltration and more. This comes along with them being our Server Side, Visualization and Storage Infrastructure.
Not only will the R1 tell you if it detected malicious communications on your network and report infected devices. It periodically scans all your devices for vulnerabilities and reports back on their risk of getting hacked.
R1 will block malicious, advertising, or background data collecting web content off your browsing session for safe and seamless browsing. This means that app on your phone wont be able to get these annoying ads anymore.
The R1 is part of a threat intelligence blockchain, sharing and studying information about the latest zero-days. hacking campaigns, hacking techniques and tactics, and more.
The opensource blockchain belongs to our sister company THRINTEL MARKET, which raised more than a $100,000 in its first hour of the online crowdfund.
The R1 has feeds from eSentire and AlienVault as well.
With a Remote Management Server and an extensive admin GUI it is very easy to setup your own rules and fully customize your network and R1.
We are able to customize all that for you ourselves as well. Or you may give our support team a call or chat online with them with 24/7 support.
The R1 can be used as the key to decrypt files on devices.
You connect to starbucks, you are unable to open the excel sheet anymore, you connect to the R1_Secure Network and there you go all yours.
The R1 models your behaviour and detects anomalies.
By behaviour we mean what websites you visit at what time for example. It would be challenging now for someone to impersonate you.
The R1 makes sure everything is peaceful with the user’s device, no malicious activity, no change in the behaviour pattern, even ask a security question if needed, then send a flag showing a healthy device security connection, and confirming user behaviour and identity.
Connect your R1 to your Device for your 2nd Authentication on Important Accounts. No more of these little usbs.
Something you Know. (Password & R1 Security Questions if triggered) Something you Are. (R1 behaviour analytics & modelling) Something you Have. (R1 as a Hardware key)
Fully compatible with Google Suite of tools, Facebook, Github, and more!
No patch for stupidity? I think not!
Security Education means we explain every action in layman terms!
We have built and tested TOR modules for the R1. It can be paired with VPN and obfuscation bridges for maximum possible anonymity from ISP and Big Brother. The technology is the state of the art in terms of privacy on the internet.
Sophisticated hackers may use SSL to bypass certain intrusion detection techniques, we have built prototypes to listen onto their SSL traffic and perform Deep Packet Inspection, eliminating the threat vector.
Other features packed into the R1
Quick charging to your devices on the go (For the train, airplane, commute, etc).
Connect your charger to the R1 USB for some quick charging on the go.
Share files with every device on the network (Either plug a USB or upload files into the R1 itself (its sandboxed ofcourse and needs full authorization to upload from IT staff)
R1 can easily block certain groups of websites (Adult, Advertisements, Background Data, Potentially Unwanted, Pop-ups, etc.)
Boots up in under one second. With one touch!
The organization can monitor, control, modify and connect to the R1 remotely.
The R1 comes with a Remote Mgmt System so that the organization can monitor and run all the extra security modules. RMS includes (Behavioral Analytics Engine, Visualization and database, C&C, and the Deep Learning Based IDS)
Not only that but the R1 comes with two GUIs a very extensive one and another very simple GUI.
ezSec is a local startup. Very easy to reach the management and get things moving in an agile manner.
Lot’s of contractors and short term employees.
Just going to mention the core team affiliations here.
Team experience and education highlights
If you are interested to test some beta versions in your home/car/travel setting.
Let us know! You will get few credits towards pricing as well. And a rewards package.
Interested in a Demo? I can make it quick! I am not gunna do everything here just the highlights. __ Phone is my internet source R1 connects wirelssly to my phone Then hosts a hotspot called r1secure
Demo, demo, demo
This is the hacker
These are users.
Here im going to go old school
And look thru terminal files to show you the structure under the hood
The attack here is an icmp ping to keep things simple
The ping is dropped and reported
Skip that as well although this is very sick
Note8 is attacker
Note 3 is user
R1 is legit
R1.secure in browser
Network joinwifi and scan & system processes
Here is what am authorized to show right now
ML > anom exp> job then remote ip and low req > single metric viewer
See you know well we need security in the office and home routers. So am not gonna talk about that.
But a security travel router?
A Mobile connection is a security nightmare. Based on Kaspersky 2017 survey, 38% of enterprise businesses experienced exploits or loss through mobile devices as the main attack vector. $1,700,000 is the average Enterprise cost of a security incident involving exploits or data loss through mobile devices. [Kaspersky]
Wifi is a security problem, Public Wifi is a disaster. Even worse, Mobile Connections are mostly wireless, so not only are they using WIFI on mobile devices that can’t protect themselves effectively, they are joining mostly public free hotspots with a plethora of infected/malicious devices around. 25% of hotspots use no encryption, and there is 1 hotspot for each 20 humans!
Mobile workers are productive. 1.45 Billion global mobile workers in 2016, 38.8% of workforce and increasing to 1.87B by 2022. [strategyanalytics] And, 61% of workers report working outside the office at least part of the time. [citrix] BYOD is a productivity trend. Only 11% of companies have not deployed a BYOD program. [Insight] A report by MyCloudIT found workers are more productive when they can bring their own device, and when workplace mobility is encouraged.One reason is because workers are prone to having their own devices on them at all times, which increases accessibility and eliminates the learning curve.
We shall be delivering our first official batch in 3rd Quarter in 2019. Global shipping costs are vastly reduced as we have set up a long term partnership with DHL earlier this year. This will enable global market penetration.
We’ve got an early access program however. We will send you an email about that. Since we will have units ready within 2 months They can be Home/Office/Travel.
Tiny Robust Attack Surface
It was built from the ground up with as little software and
potential vulnerabilities as possible.
It even has its own Antivirus.
So robust it passed the most difficult of penetration tests, by
one of the most known pentesting labs and skilled hackers.
Enterprise Network Security
No evil twin, since nobody has the private certificate on the R1
Enterprise Network Security - Cont’d
The R1 will shoot down any evil twin it detects in the vicinity.
Intrusion Detection/Prevention System
The modified engine is able to filter out almost all bad traffic on the network.
Intrusion Detection System (2)
Deep Learning based Intrusion detection system, Data Science @ ezSec.
Intrusion Detection System (3)
Machine Learning powers an Anomaly Detector, with threat visualization..
The R1 periodically scans all your devices for vulnerabilities and reports back.
Web Filtering (Network Level)
R1 will block malicious, advertising, or background data collecting web content off
your browsing session for safe and seamless browsing.
The R1 is part of a TI blockchain, sharing and studying information about the
latest zero-days. hacking campaigns, hacking techniques and tactics, and more.
With a Remote Management Server and an extensive admin GUI it is very easy to
setup your own rules and fully customize your network and R1.
The R1 can be used as the key to decrypt files on devices.
The R1 models your behaviour and detects anomalies.
This was shown to detect unauthorized use of your devices.
The R1 makes sure everything is healthy and appends a healthy flag to the
connection stream to enable access to the organization’s important resources.
Hardware U2F Key
Connect your R1 to your Device for your 2nd Auth on Important Accounts.
The R1 will explain every action in layman terms.
And share tips & Recommendations periodically.
Optional Module: TOR
Maximum privacy and anonymity on the network.
To Be Released: SSL DPI
Sophisticated hackers may use SSL to bypass certain intrusion detection
techniques, we have built prototypes to listen onto their SSL traffic and perform
Deep Packet Inspection, eliminating the threat vector.
Black Sony Vaio | Intel i7 6GB RAM | (Attacker Machine)
Attackers Network Arsenal: High gain Alfa Network AWUS036NHA & High
gain Alfa AWUSO36NH network adapters with 5dbi & 9dbi antennas.
Hak5 Wifi Pineapple Nano with a Samsung Galaxy Note 3.
Black HP Pavilion DV6 | Intel i7 8GB RAM | (User 1 Machine)
Grey Dell Latitude | Intel i7 4GB RAM | (User 2 Machine)
MacBook -- Presentation Laptop (Spectator Machine)
Samsung Galaxy Note 8 (Internet Connected WiFi AP)
Attacker, User 1, and User 2 connect successfully to the R1 Secure Wifi.
Attacker tries to attack User 1. Packets Dropped by R1 and reported.
Attacker tries to attack User 2. Packets Dropped by R1 and reported.
Spectator is able to see this and kick Attacker out!
Attack Scenario - Cont’d
Attacker sets up an Evil Twin to get User 1 & User 2 to connect to his machine
and compromise their security.
R1 detects evil twin and unleashes an attack against it.
User 1 & User 2 are unable to connect to evil twin so they connect back to R1
legitimate R1 Secure wifi.
Attacker gives up after few minutes.
User plugs in a Cellular modem and instructs the R1 to connect.
R1 takes 1.5 seconds to setup a secure wifi - cellular connection seamlessly.
User selects WIFI and instructs the R1 to connect to it .
R1 takes 1 second to setup a secure wifi - wifi connection seamlessly.
User plugs in 1GBps ethernet.cable and instructs the R1 to connect.
R1 takes <1 second to setup a secure wifi - ethernet connection seamlessly.
Phone APP is the best way to test this.
Since an APP cannot be supplemented by a browser extension, users are left with
no other choice.
R1 is now your other choice!
Mobile devices are vulnerable! So is WIFI.
A Mobile connection is a security nightmare.
Based on Kaspersky 2017 survey, 38% of enterprise businesses experienced
exploits or loss through mobile devices as the main attack vector.
Wifi is a security problem, Public Wifi is a disaster.
25% of hotspots use no encryption, and there is 1 hotspot for each 20 humans.
Everybody is mobile, tho! And that’s great!
Mobile workers are productive.
1.45 Billion global mobile workers in 2016, 61% of workers report working outside
the office at least part of the time. [citrix]
BYOD is a productivity trend.
Only 11% of companies have not deployed a BYOD program. [Insight]
Delivering Q3 2019 and the DHL Partnership
Pre order now to see it come into market.
Pricing will increase every month we are closer to the release date.
Orders help us make projections & allocate funds earlier so we can supply demand.
What features do you want to have on the R1?
We are selling you peace of mind, not the R1.
Peace of mind on the go, in the office, and in home.
We help you buy your way out of security incidents hindering your business
The R1 was designed as imagined early on 2015 when the founders were
ethically hacking multiple remote connections in a Yale University Hackathon. This
exposed multiple weaknesses in mobile devices and wireless internet sources.
You can find more about us
ezsec.us ezsec.ca ezsec.org ezsec.net ezsec.io