Military Uses

All of the Public features plus:

Multi-phase variable on-the-fly encryption to any bit-level down to frame-by-frame level which is backwards compatible with Public version if desired. Please note that the higher bit-level encryptions will slow total transfer speed by a small amount.

Multiple passwords for a given user login with redirect to different subnets/information based on login info. Great for supressed agents in the field.

Ability to have preset codes for manually entered authentication prior to commencing any actions, similar in design to (still used?) Submariners launch-code authentication process.

With proper antivirus definitions, ability to ensure any attached hardware is not compromised. Though a multi-step setup process, STUXNET would not prevail.

Ability for any Country to be aware of any non-authorized Country attempting to access. Decision to allow/disallow for surveilance depends on desired objective. One possibility is redirecting to what appears to be the intruders target yet false/bogus set of information awaits.

Ability to connect to and control an authorized device in its entirity within the Military scope. Example: a plugged in desktop/laptop/smartphone that is in idle/sleep state. Internet connectivity required.

Ability to encrypt any storage device and have unique unlock key stored on server in the event device is stolen. This could be done in Public version as well however best practice would reserve only for Military spec.

Several other uses but am uncomfortable sharing on a public website.






Copyright 2017 @www.cupidtechnologies.com All Rights Reserved