Here's what people think about whether unbreakable encryption should be available to everyone.Read More
We went to the public and asked if such a thing as unbreakable encryption existed. Here are the results.Read More
Nearly all cryptography software today relies on public key algorithms, the security of which depend entirely on computational infeasibility. However, state-funded agencies with overwhelming resources have a different definition of "infeasibility" than ordinary criminals. One of the core tenets at Prolaag is "don't underestimate your adversary" - so we employ only private-key algorithms, most notably One-Time Pad.
Most security services act as an information intermediary between clients. The service provider establishes encrypted connections to the sender and recipient of a message, but decrypts and re-encrypts messages as they get passed. Any breach of their security (including a court order or National Security Letter) compromises your privacy. At Prolaag, we don't broker messages; we are unable to make your communications available to a 3rd party, even under pressure.
The best cryptography in the world won't provide privacy if the sending or receiving computer is compromised. The Prolaag hardware VPL secures both endpoints by physical isolation, in effect creating an air-gapped dark intranet. Think of it as your own personal JWICS. The computer or wired phone you use to communicate won't get hacked because, behind the PV-110, it's simply not connected to or addressable by the Internet.