They want what you got

Motivation header text

It takes years to build a reputation and a

few minutes of hacking to ruin it

The digital age bring us a convinient life but at the cost of something much more important; security.

The threat of cybercrime to businesses is rising fast, McAfee estimates the cost of damages associated with cybercrime stands att $400 billion, up from 250 billion two years ago.

The cost of doing to little
The average cost of a data breach to a larger firm is estimated between $2.2 million to $6.9 million. That’s not counting the damage done to the firms reputation and the accosiated costs of remediation. If a customers-confidential data is lost their trust is eroded and they will conduct their business elsewhere.

The hacking arms race
As the sophistication of hackers increase so does the efforts to detect and stop them. The problem is you can only develop an effective defense by first knowing how the attack works, so the hackers are usually one step ahead. The ammount of money to be made from a sucessfull data breach is a big driver to find ways around current cyber defences, it’s big business and the hackers are winning.

IoT, Internet of Threats
Or Internet of Things as it’s officially called are smart devices that are constantly connected to the internet. Again it’s ment to bring us a more convinient future but it’s at the cost of security, most IoT-devices have little to no security. As the prolliferation of these devices continue to accelerate so does the cyber attacks utalizing their weak security. In 2018 there where 23 billion IoT-devices connected growing to 75 billion in 2025.

There is no 100% effective antivirus
Antivirus programs offers reactive security, they need to know what they are looking for to be able to find and eradicate it. As such no antivirus program can be 100% effetive, hackers are constantly analysing antivirus programs to find ways around their detection.

As an example: Rombertik malware spies on the user and destroys the users hard drive (MBR) if it detects an antivirus program is trying to eradicate it, making analysing the virus difficult.

Another effective way to circumvent protection is purchasing a zero-day vulnerability. This is a software vulnerability unknown to everyone but a few powerfull actors that either uses or sells them. Since this volunerability is unknown the exploit can go on years untill detected and patched (if ever).

Antivirus programs can be increadibly invasive to a users system. They forcibly hook themslefes into other pieces of software such as browsers, word processors or even the OS’s kernel, in an attempt to catch viruses. This invasive approach can deal more damage than they attempt to migrate opening up new security holes for a hacker to exploit.

Proactive security
Bitidentify uses proactive security rather than reactive, our system is built around never having your data connected to the internet. If a hacker can’t see your data it can’t be stolen or even targeted for attempted hacking, this is proactive security at it’s finest.

The core of our system is a bare bones Linux OS (Host) that in turn uses virtualization technology to run two instances of Windows (Guests) on top of it. The Guests are the Open Machine and the Secure Machine, Open is connected to the internet and Secure is only connected to the local network (LAN). The user works with confidential data on the Secure Machine and switches to the Open Machine when there is need for internet.

Working in this way the chance of inadvertently infecting your system is minimized. If the user manages to get infected (trough poor handling of the system) it can easily be restored to working condition at the push of a button.

Scroll to Top