47.73. Security and Privacy. |
1. now is the time. for us to go. Directories containing business data cannot be accessed from the Internet so hacking and malware threats have been eliminated. Directory containing Eliza cannot be accessed from the Internet so hacking has been eliminated. Directory names are long meaningless secret numbers that act like strong passwords. |
2. File names are long meaningless secret numbers that act like strong passwords. Human readable file names do not need to be used because no person has any reason to access these files. |
3. Files contain a long string of meaningless numbers without any structure. Files contain unused numbers so only a small fraction of what is stored is used. Files contain what looks like 2048 encryption keys, but that actually contain business data. Relevant data is like looking for a needle in a haystack. |
4. It is expected that agencies in many parts of the world may gain physical access and may be able to copy the data. Threat and risk analysis suggests that such agencies may deduce they have copied a load of worthless data because most data has no value. |
5. Data is optimized to be rapidly loaded by Eliza into internal arrays. Data is purposefully designed to be meaningless to people who are not permitted access for any reason. Excessive encryption is used with different methods used on each field so the cost of decryption becomes significant. |
Energy Management Service. |
1. Reading history is encrypted and stored as a long string of numbers in one file - plausibly deniable business data. |
2. Each reading is the reading date, day reading, night reading, gas reading and solar reading. |
3. Every date and meter reading is encrypted (as 8 digits). |
4. The reading file has a prefix (1 digit) as its identity and version. |
5. Each reading date and set of meter readings is terminated with a suffix (as 41 digits). |
6. Any number of readings may be stored in one file, but one file per year may be reasonable. |
7. Any number of reading files may be stored in an account folder. |
8. Any number of account folders may be supported with the account number passed in the URL. |
9. Files and folders carry a "ll" suffix for identification purposed only. |
Information. |
1. Tell Me is an information service to include glossary used by business rules. |
2. Contract rates are four decimal places of pence per day or pence per unit. |
3. Monthly costs are two decimal places of pounds as normal GBP amounts. |
4. Criminals in all parts of the world attack web sites that use known packages with a complex application stack such as WordPress. The solution is to deploy a grossly simplified application stack with one program that links to another hidden directory that cannot be seen via the Internet. Criminals are left with only one program to attack and only one program has to be made excessively secure from any kind of attack. |
5. Guides, advice, tutors and information is stored as wiki text files that do not need to be encrypted and must not be confused with business data that demands excessive levels of encryption. Totally different and unconnected application services are used for wiki content management services (CMS) to any private and secure business application service. |