C – Create an app that scans the dark web and gives you an alert anytime your information is found
Y – Yaggi Atenna app for your phone
B – Bluesnarfing protection software for your home network
E – Encryption software that isn’t breakable by quantum computing
R – Remote backup software that that is secure and encrypted end to end
S – Server chassis that use biometrics to secure access to them and perform any work within
E – Exit nodes on the TOR network that are secure and can’t be geolocated
C – Create a programming language that won’t allow code to be compiled if not secure
U – UDP encryption that doesn’t affect performance
R – RAM that is intelligent enough to help protect against buffer overflow attacks
I – IP based surveillance systems that are undetectable, secure, and integrate with traditional SIEM systems
T – Threat intelligence service that is able to deliver actionable intelligence and integrate directly with the customers systems immediately
Y – YouTube service that anonymizes your viewing, allows access to all content, while ensuring top level privacy for viewers