We changed the standards.

Fool-Proof Security Network Interface

Oxford dictionary defines a social code as: “an interpretive framework representing the world as it is understood within a culture or subculture” (Dramatic Pause) 

Well what does that mean in plain English? These are the rules and standards that a community adheres to.

What are the standards and rules or the social code of network security today??? All security companies promise you things like end-to-end encryption and five level or layered security. But what does that mean? The rules of network security now are to let every threat into the network and then “protecting” the network by carefully monitoring traffic in and out, using malware, spyware and/or virus protection programs, firewalling certain segments of the network, offering protective microchips on your server and separating retail terminals from operations terminals, all of which are costly both in terms of the cost of security programs, hardware and monitoring, the cost of maintaining two separate or multiple systems within the network, and the time it takes to navigate the labyrinth between systems to get even simple tasks done between your operations team and your retail or public domain team.

In the meantime every virus, worm, trojan, malware, spyware, and ransomware program out there has free reign inside the network and we have to hope that any network vulnerability inside the network prevents hacking, theft or is identified and either destroyed or quarantined. That is the social code of today’s “secured network”.

In fact the only fool-proof security, nowadays especially, is anonymity.

Social Code Security changes the very fabric of the rules and standards we have lived by for the past thirty years, that has seen company after company held hostage by thieves and people who get joy from destroying networks and people’s lives; costing companies and individuals millions upon millions to pick up the pieces. Social Code Security creates five new and simple rules to network security.

Rule 1

Don’t give the bad guys a gateway to get into the Network in the first place: How you ask? By using a patented technology that does not broadcast an IP Address for these people, who seek to do harm, to follow back to your network.

Rule 2

Transform information packets so that they are a uniform length, which excises any extra or excess code that does not belong from the information packet before it enters your network scraping the Trojan, worm or virus from the code that should be entering the network. How you ask: Simple. Transform all data packets into cell frames.

Rule 3

Use switching technology (which is also Social Code Security’s patented technology) to create variable openings into your network that are randomly selected each and every time the network grants access to legacy internet information.

Rule 4

Provide multi-level encryption for all data passing into the Network. Everybody talks about encryption, but what does that mean? It means that each cell frame has a randomly selected, multi-numeral code that is assigned to the front of every cell frame like a key that must fit perfectly into the lock fitted into the impregnable Social Code wall that envelopes your network. And the best part, the key and lock change every time the Network access is sought using a faster than light automated algorithm not once, but twice. So it provides ultimate security without long delays because of complicated log-in protocols.

Rule 5

Each company and individual will have its own, separate, fully dedicated cloud that is hidden behind Social Code Security’s impregnable wall. If there is no IP Address to follow and no way to get behind your personalized Social Code network wall without the two random keys, even high profile targets such as Equifax, or Target achieve something that hasn’t been possible for them in 30 years...... Anonymity. If you can’t see the network because there is no address, if you can’t get into the network by disguise, and if you can’t gain access to the network because there are no doors, you can’t steal what you can’t see. Now that’s The Social Code Security we want you to live under!

Phasellus semper viverra tristique. Sed justo tortor, iaculis.
“The nations at the most risk are those that are most connected.”
Marcus Ranum
one of the early innovators of the firewall called Stuxnet (the first firewall)