Logo - Confidential User Personal Information Delivery

Articles> The Missing Link All Have Missed To Restore Cyber Security Effectiveness

TwitterAngel ListLinkedIn

Hello and thank you taking a few minutes to read this article.


To start, many ideas/concepts can be conveyed through a simple Infographic. Highly technical areas can be as well if your audience has previous knowledge of said technical areas. Attempting to show a near engineering level Infographic to a non-technical audience? Simply not possible.

What is one to do other than attempt a watered down version which risks insulting those who you seek to reach? Regardless, an attempt shall be made to explain the importance of a design with its roots from the year 2000 adapted to today's improved computer design.

Having set the stage, lets proceed.

Brief History:

In order to understand any improvement we must look at past iterations to form a comparative baseline. In the computer world everything is all based on a zero (off state) or a one (on state). In the world of computerized devices everything ever created is based on this simple premise.

In the 1940's we had the UNIVAC life size computer. Many tasks were done manually and took up the landscape of a large sized warehouse. In the 1950's we had the next generation ENIAC computer, an evolution of the UNIVAC in many ways, now in a more compact small warehouse footprint. In 1955, the final year of testing at the University of Pennsylvania, my Mother was fortunate to have interned on the ENIAC.

Through the 1960's we had major miniaturization due to efforts of IBM and Texas Instruments and a small company called Intel formed in 1965 - the year I was born. In the 1970's a company called Apple started in a garage and in the 1980's we had IBM join the fray with their own home computer design.

While rudimentary in explanation, the point is each decade brought major improvements. Perhaps a simple Infographic would have sufficed? Maybe one day I can have a Marketing guru make one.

The Microprocessor Evolution:

In 1965 Gordon Moore, a co-founder of Intel, commented of computing power roughly doubling every 12 months. Up until the 2010's that mostly held true. Same applied to other areas such as Cisco routers and of course software to make all that fancy hardware do what we wanted and needed.

Relating to this article, this is where a diversion from a standard 'History of Computers' takes place. With a pattern established lets proceed.

Want vs Need - Which Comes First?

Historically, software follows hardware in a tick-tock fashion (a term Intel uses internally as well for their microprocessor evolutions). With new hardware capabilities from designers and engineers, new software is made to use those new abilities - and all the other sectors of society can then create a nice Infographic to sell those new abilities.

A few questions remain though: Has software now surpassed the hardware we currently use? With so many alleged advancements in technology why are millions of people still being hacked so easily? Is cyber security a 'want'? Quite frankly we all expect a certain level of protection from so many solutions out there, thus my argument is that cyber security is a 'need'.

We 'want' software to do many things and never give it much though on how it all works. We only know we do 'want' it to just work. When it comes to cyber security though - we 'need' it to work. And this is where every single vendor will profusely defend their products yet they always have some explanation why their 'want it to work' software has failed. Something is being missed in our Infographic world.

Hardware Advancement - The Missing Link:

There has been something missing to place us in this conundrum. My take on this is - in regards to cyber security only, software has now outpaced hardware in the tick-tock fashion. This explains how so many are able to exploit 'old' hardware design with software. Let that sink in for a moment.

If my presumption is correct then we need a hardware evolution of the cyber security field before any vendor can provide a software solution. In all respect to the major players like Symantec, IBM, TrendMicro etc, they are simply not 'Hardware' engineers. IBM is in mainframes but not really anywhere else. Cisco is all about routers but even they can not address the DDoS attacks (basically overloading a server with requests until it stops responding) so they are lacking in a 'Hardware' advancement as well. In fairness I could never do what they do though I do understand what they are after and how they do it. There is a solution though. Please read on.

In retrospect, Intel made huge advancements in hardware design and getting it out to us for a long time. In all fairness I feel Intel is currently spread way too thin and has lost some of their mojo in this area because of it. No disrespect at all only a reflection of how vast the digital computing world has become. Intel's AMT and Trusted Computing tech while useful for some purposes does not address hackers at all and in some ways encourages it.

And this is where a point must be made - there are times another Steve Jobs comes along with respect to a given area. In this case it is cyber security, and is where the C.U.P.I.D. design comes in to play. As much as many want to believe they have all the answers, in practice having complimenting competitors results in a better end result for all. Get too big and complacency usually sets in.


The rest of this article discusses what this restoration of hardware (as Intel did for so long) leading the software can result in. However if time is an issue this is a good stopping point.

The C.U.P.I.D. design:

Now that we have a working theory as to the missing link and source of today's cyber security problems, please allow me to introduce the Confidential User Personal Information Delivery design. Affectionately called 'CUPID'. Though started in the year 2000, no one understood what I was describing then as many still do not today. No Infographic could possibly surmise this missing piece of hardware design, however what the inevitable software will be able to do would make a nice Infographic. Again maybe one day a Marketing guru can come up with one.

The missing link is a single unpatented hardware change to unlock the deepest levels of the computer design itself. Why nobody has thought of this raises more questions than answers though. Needless to say the only person to understand this single hardware change has in fact been a BIOS level engineer. This is why I can not share what the change is unless an investor is serious through a face to face meeting. Without knowing one is serious why give away such a design for others to make money. I would like to make some too. For now lets move to what it will enable shall we?

The hardware design change allows for every digital one and zero to be visible to any loaded antivirus software, or any other software you choose to allow. This allows any internal or external device to be monitored without being detected - and will catch any illegal snooping like hackers, NSA and CIA do.

With a complex mathematical set of algorithms and a randomly chosen set of variable encryption using your devices internal I.D. information aka 'device fingerprint', a connection is secured with a server that also uses CUPID.

This is also where the 1991-era failed 'PKI' or 'Public Key Infrastructure' or PGP 'Pretty Good Protection' is replaced with a server adjustable 'encryption duration' to change keys so hackers will go crazy thinking they can decrypt. Seriously - why are we using 26 year old security means? Because none have taken the time to investigate this design being presented right now.


The 'Internet of Things' revolution also would operate at this level with slight changes along with Cisco routers. Time for true endpoint security and an upgrade from failed PKI and PGP. This is not the 1990's anymore. While there is more to it this meets the 'need' for explanation. Now for the fun part.


Custom Download Packages:

With your now secure connection to the server with your specific device fingerprint, your choice of antivirus is downloaded and all before even booting to a welcome screen. There are several ways to do this however the most reasonable one is a end user makes a choice from their ISP account page one time so when your device powers on it is already established which antivirus provider you use. The provider is on a unique link for secure software pushs to the ISP servers, which then go to your device.

On another note, home ISP based routers can get in on this CUPID based revolution too so those pesky hackers or CIA folk do not (as revealed by Wikileaks Vault7) infiltrate your home network. This would provide a true end-to-end encryption channel for the absolute best in cyber security. And mobile laptops? There is a relatively easy way to incorporate them too however with laptops come other deployment options way to lengthy to describe for this article.

Direct Marketers will like my idea to use the CUPID design to shut out all 'data collection' which currently profits everyone from Google to Facebook to Amazon and instead let the end user trade that information for free antivirus from proven vendors. Why should all these other companies get to sell your usage data while you as a person get nothing in return? Sounds like they have a free lunch without your even knowing. Time to change that and let the end user get antivirus from a reputable provider for free.

Another alternative would be a end user pays for antivirus thus no data is shared at all. There is your total privacy and win-win-win for you, the antivirus and direct marketing companies. Google-Amazon-Facebook already have enough money don't you think? Somehow this will also lead in to the transformation from legacy television to internet television though I need to talk with a direct marketer before outlining the 'how'.

This is also where 3rd party vendors will have vast expansion of options for the end user. Any packages for corporate users would be determined by their administrators. This is where Infographics will easier show what can be done - all from the previous single hardware mod + design outlined earlier. This will create 2 Internets - Secure using CUPID and unsecure for those not wanting to use. This isolates bad actors to save any allowed agency precious resources to focus only on those who choose not to be secure.

Some possibilities for 3rd party customizable packages include but not limited too:

1) Anti-DDoS - Any server being overloaded uses the CUPID connection to backtrack the IP to the referring Cisco Router which denies that IP further access for xx number of minutes (Cisco can give time length options on temporarily banned IP) . The Server can use any number of triggers before a backtrack-DDoS is issued to a router and the Server Operating System is oblivious to the banned IP, unless user chosen to be made aware.

This Cisco router then refers back to the return-path router the same info. As it reaches the ISP level that server is advised as well thus triggering a temporary ban of IP service for xx minutes. Most Terms of Service with ISP's do not allow continued DDoS and considers this action as 'Abuse'. Boom - end of DDoS.

Those with VPN same thing would happen. Those who change IP addresses would run out. Thus this is the anti-DDoS feature Cisco lacks. The key is both the servers and routers must incorporate a version of CUPID so they can properly talk with each other as the servers are being overloaded from the DDoS attack.

2) OEM Custom Support - Using Dell as an example, optionally CUPID can offer secure storage for anything from backup images to full KVM-style access remote control. All it takes is entering the BIOS, click 'Support' and the Dell phone technician would have full troubleshooting access.

As any Operating System is irrelevant to CUPID operation Dell could troubleshoot your entire computer/device without anything else involved. A backup/restore image could be present in this secure storage unavailable to any other device or one could be downloaded. Many options here.

3) BIOS Protection - As CUPID is started from the BIOS itself and loads before anything else one could have the free unused BIOS space wiped each startup to prevent any malware/hackers using it. The current Microsoft 'Secure Loader' and ELAM drivers all come after CUPID so Microsoft will have to adjust to the new structure or be shut out of people using them. Change is not easy but necessary when the needs of the many outweigh the wants of the few.

4) Special Uses - Such as autonomous cars, car-to-car communications, drones, US Military vehicles (several more plans for them) and even satellites (obviously next generation ones). The CUPID design from the vehicle perspective could be updatable or static loaded from the dealer. Many choices exist. Same goes for critical national infrastructure, where each role will have their own process designs. While the core CUPID design remains the same the specific application would get its own variant. Thus the CUPID 'platform'.

5) Military Uses - For what should be obvious reasons I will not discuss unless in proper environment.

6) Law Enforcement - CUPID will keep honest people honest by providing 100% privacy unless a warrant is served upon both the antivirus maker and ISP. With approval a unique package will be downloaded to your device to comply with the law. If one turns their CUPID off they are now unsecure and will be monitored anyway as the warrant stated. Forensics could not be any simpler.

7) Multi-Passwords - For a given device one can set up multiple passwords too. Lets say their smartphone is stolen and forced to give password - programmable actions for what you want the device to do so you get away while thieves believe they have a workable device. So many options here for smartphones. Think of all the 3rd party vendors on this one.

Many more uses - Depending on how CUPID is set up by an end user/corporate employer, only those not using CUPID will be the ones getting hacked. I put much belief in the antivirus makers skillsets to take these changes and discover new ways to stop hackers with their newfound unrestricted access to all data to keep us safe. Why shouldn't we? That's "what they do".

The infographic designers will have much to do with all the new advancements the CUPID design offers.
All that is needed to get the ball rolling on this unpatented change and design is a Angel Investor for up to 2 million to get an Alpha model built for testing at the hacker convention Defcon. If they can not hack it there is your free advertising and any Venture Capitalist would be seriously lacking if they passed up that kind of industry disrupting game changer.

While there are a few other areas not discussed such as memory needed, secure storage and CPU usage all those have answers too. Seeing as by this point you must have other things to do though we will end this article here.

I thank you for your time and if you feel like it add me on Twitter @cupidtech












What? Your still here? Why are you all the way down here? Well ok... as a bonus here is the song I had to refrain from using as background music. Hope you enjoy it.


Copyright 2017 @www.cupidtechnologies.com All Rights Reserved