Why most quantum encryption efforts are failing

As quantum computers move from the lab into operation, companies are rushing to develop post quantum encryption. You hear terms like quantum safe, quantum-proof, quantum safe, quantum encryption, and quantum cryptography used frequently. There are now many terms to describe similar approaches to protecting data and ensuring secure communications. So, how do you make sense […]

The evolution of our encrypted systems & the quantum threat

Traditional encryption has been described as taking data as input (called plaintext) and transforming the plaintext into an output (called ciphertext) which is now protected. This is done through an algorithm, such as the AES. AES encryption requires a ‘secret’ or ‘key’ to unlock or decrypt the ciphertext back into its plaintext format. This security […]

The most secure and easiest way to send massive files to anyone.

Secured2’s mission has always been to secure the world’s information and bring back digital privacy. There is no question that TRUST is critical to realizing our vision, as well as for our business and we work tirelessly to earn it every day with our customers. We promote often our quantum computing safe security technology that […]

Code Script

Why Secured2 is better than sharding

As described, sharding is a database technology that separates a database into chunks placed in different nodes to ‘speed up’ the access of data queries in a database. If you break into one node or container you can rebuild the entire dataset. Sharding is not a data security technology, sharding does not break data apart […]

Isn’t Secured2 like Data Sharding?

Many IT professionals we have met have confused Secured2 with a technology called ‘data sharding’. Sharding has been available for years and was introduced in the 90’s to facilitate horizontal scaling of a database. It breaks data into two or more chunks called logical shards. These shards get distributed across separated database nodes called physical […]

What makes Secured2 Quantum Resilient?

What makes Secured2 Quantum Safe?

While most post-quantum solutions are trying to solve the data security problem through advanced mathematical key systems, the Secured2 solution takes a different approach. We are focused on protecting the ‘data’ itself at the file level and solving the problem of factorization. If you can factor an encryption key, you gain access to the data. […]

How does our multi step algorithm work?

To better understand the flow of data through our algorithm, exhibit B is a graphic that illustrates from point of data origin to secure data in transit to self defined storage (cloud, multi cloud, local or hybrid). Starting on the left, data is created on a device (PC, laptop, tablet, mobile device), the data is […]