New privacy protocol

Issue 9 2020 Cyber Security

The Internet is awash with the personal data of billions of people but almost all of it is controlled by someone else. Every bit of personal information online is acquired, stored, organised, and used to sell to, track, and even profile everyone on the planet — including you.

The @ Company has created a revolutionary Internet protocol that protects privacy by putting personal data back into the hands of those it belongs to, the people. To kick off the new data revolution, The @ Company has released two of three flagship applications built on the @protocol, providing the industry's most secure personal data service. Once downloaded, these applications can be unlocked by a personal online identifier, known as an @sign.

So, what is an @sign? It's similar to a username, but instead of using it to access online services, online services use your @sign to access your information without ‘seeing’ it or storing it. Your @sign is a gatekeeper to your data and only allows it to be accessed based on your terms. Rather than having data stored on servers around the globe that are wholly owned by companies, the @protocol stores your encrypted data on your own @server accessible only to you. The ‘key’ to your own server is stored on your phone, or tablet – whatever personal device is most safe – so it can only be accessed by you. The @sign even enables you to control who can access your data, for how long, and what it can be used for.

"The @sign protocol allows for true peer-to-peer online interaction that is completely secure and ultimately customisable," said Barbara Tallent, co-founder and CEO of The @ Company. "Your data never enters our servers, or anyone else's, only your server, because the protocol simply connects the two devices and validates that they are who they say they are. From there, the data is transferred directly to the other person, no middle man."

The @ Company is launching its new approach to personal data control and security with applications built entirely on the @protocol.

• @persona allows you to curate your public profile, safely storing important, personally identifying information like your contact information, location data, social media profiles, and more. When a company or individual seeks to gain access to your personal data, they will never be able to access anything you don't wish them to, receiving only the data you allow.

• @buzz rebuilds the way we organise our contacts and groups through peer-to-peer communication in a drastically simplified process. Every time you make a change to your profile – be it a new email address, phone number, mailing address, etc. – all approved contacts will receive that information, automatically.

• @mosphere enables completely encrypted peer-to-peer file sharing over the Internet in real time. The @sign's inherent security provides the framework for transferring sensitive information across any mobile device, regardless of location, without fear of interception. Because this data is never stored on a server in the cloud, it goes directly to the recipient, safely and instantly.

"We understand that even the most perfect data sharing protocol in the world isn't useful without the right IRL applications," continued Tallent. "Which is why we've worked with some of the most creative and innovative app developers in the game to build three core applications that showcase just how powerful the @sign protocol can be. But this is just the beginning. As the @sign community grows, so too will our community of applications."

@signs are available now at no cost; personalised @signs are available for purchase. For more information visit https://atsign.com/




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Cyber Talent: It is more about Talent than Cyber
Issue 7 2020 , Cyber Security
Four million trained workers are needed to fully bridge the skills gap in the cybersecurity field around the world and properly defend organisations against threat actors.

Read more...
Liquid Telecom unveils Cybersecurity unit
Issue 8 2020 , News, Cyber Security
Liquid Telecom has unveiled its Cybersecurity unit, which offers end-to-end managed services for digital security solutions.

Read more...
Increased cloud visibility and security
Issue 7 2020 , Cyber Security
Sophos adds cloud visibility features from Cloud Optix to Intercept X Advanced for Server with EDR.

Read more...
Ransomware and customer loyalty
Issue 7 2020 , Cyber Security
Arcserve research uncovers links between ransomware, consumer purchasing behaviour and brand loyalty.

Read more...
IoT will transform industrial security
Issue 7 2020 , Cyber Security
55% of organisations globally are confident the Internet of Things will change the state of security in industrial control systems (ICS).

Read more...
BYOD: bring your own danger
Issue 7 2020 , Cyber Security
Five cybersecurity threats that jeopardise the security of mobile devices and the keys to optimising their protection in a connected world.

Read more...
Nclose moves to secure Microsoft 365 environment
Issue 8 2020 , News, Cyber Security
Nclose has launched dedicated Microsoft 365 managed security services within its Managed Security Services division, to help enterprises with newly-remote workforces close gaps in their security environment.

Read more...
Detect dangerous insider activity
Issue 8 2020, J2 Software , Cyber Security, Products
Offering unique ‘Indicators of Intent’ capabilities, Intercept 6.0 empowers cybersecurity teams with contextual awareness of workforce activities without invading personal privacy.

Read more...
The arms race of AI in cybersecurity
CCTV Handbook 2020, Axis Communications SA , Cyber Security
Cybersecurity goes further than network video and audio, but these are as likely to be targeted as much as any network-connected device.

Read more...
Exploiting the global pandemic
Issue 7 2020 , Cyber Security
Cyber criminals targeting remote work to gain access to enterprise networks and critical data reports FortiGuard Labs.

Read more...