Take back control of your

Home header text

Bitidentify software hides your data from the internet, rendering it impossible to steal

To hack a computer the hacker needs to gain access to it’s storage device in order to steal data or make changes to it. With the Bitidentify system the storage device is never connected to the internet making it impossible to target for hacking or infection with malicious code.

Open and Secure icon

Open & Secure

At the heart of the Bitidentify system a Linux core is used to virtualize two instances of the same OS, these are the Open and Secure Machines. One is only connected to the Internet and one is only connected to LAN.

Invisible File Storage icon

Invisible Storage

Files stored on the Secure machine are invisible to anyone but the user, since the machine has no internet-access they are impossible to target from the outside.

Restore icon

System Restore

If you get infected with mallicious code you can easily restore your system to it’s original state, compleatly removing the infection. This works for any type of virus, malware or ransomware that make changes to your operating system.

Only allowed USB icon

Only allowed USB-Devices

In many office enviroments USB-sticks are plugged in to multiple computers daily, each time exposed to potential infection. Bitidentify only allows USB-devices that are registred with the users specific computer thus minimizing the risk of inadvertedly infecting your system.

Bitidentify Secure Data Layer

Take back control of your data

Bitidentify runs on any modern 64-bit PC with at least 4 GB of RAM and 100 GB of free hard disk space. The choice of operating system for the Open & Secure Machines is up to the user, we support all x86 OS’es.

Why we are committed to Bitidentify​

Digital information has become indispensable in our daily life and serious threats from Internet hackers happen everyday. We must be more cautious to protect data we stored in our devices. With Bitidentify SDL, data-hacking from external networks such as the Internet is impossible and is a thing of the past.

Newsweek, Dec 12 2018

Motherboard, Jan 8 2018

Home invest foreground

Invest in Bitidentify

Bitidentify SDL software is currently in late prototype stage. We keep developing and improving our technology while investingating new means of computer attacks…

Scroll to Top