Commentary> Eric Snowden

With a properly set up C.U.P.I.D. then nobody could remove any data from the host network and hope to use it somewhere else without higher-ups knowing (and/or approving), or at worst, have the hardware and any data destroyed. Think Mission Impossible and '5 seconds'. While one's words may be honorable their actions may not be.

As a bonus, if a stolen laptop/device attempted to connect to the network again, C.U.P.I.D. could be programmed to completely overload any component(s) in said laptop/phone/device for its final task.

Multiple possibilities exist on how to use the C.U.P.I.D. design and again the software programming of desired features ultimately determines what is to be done. Protocols would need to be decided upon for proper design etc. but this is where the software developers shine.
















Copyright 2017 @www.cupidtechnologies.com All Rights Reserved