Cyber Security Discovery

Malware Secure Computers

Summary and Detailed Explanation

< Summary > :                                                                                                      April 8, 2021

Malware Ransomware attacks happen because current software techniques are just not working.  

The problem is not the software, the problem is how the basic computers process that data.

ROATI Technologies made a major discovery, leading us to a redesign as to how our computers processes data.  This computer redesign enables a considerably higher level of malware security than is currently available for PCs and servers.  

For ROATI x86 Malware Secure Computers, new, old and custom, software and operating systems are equally well protected. 

The following may sound impossible to some.  This level of security is actually accomplished without the need or use of Detection Software, Encryption, VPN, or Analytics.  The enabling technology has been proven in our lab.  

Our computer redesign is a major technological leap forward for the malware protection of information data and represents a significant economic opportunity for Canada.

We are an underfunded company, building a Proof of Concept (PoC) for a president of major Canadian bank president, who offered to fund our commercial product development for a small equity stake, contingent upon a PoC demonstration.  Building a PoC while being under funded, is proving to be a challenge.

You are invited to reach out to help us.  We will be receptive to any help, to move this technology forward. 

Support offered today, will be expressed in a more meaningful way tomorrow, once we are market ready.  

This is a ground floor opportunity, please step up to help us today. 


< Detail > :


Definition:  A Malware is a “Malicious Software” which is specifically designed to disrupt, damage or gain unauthorized access to a computer system.   e. g. Virus, Ransomware, Worm, Botnet, Trojan etc.

Preamble:  Our discovery is a new hardware based computer redesign, not another software improvement.

Request:  I most sincerely invite your inquiries.


The Problem:  The Canadian Internet Registration Authority ( , in 2020 forecasted that cyber attacks are expected to annually cost the economies of the world $6 Trillion dollars by 2021.   Malware is a major contributor to that costly and expected cyber mayhem.

Although detection software companies, such as McAfee and Norton, do a valiant job at trying to prevent a malware attack, the fact is, they first need to detect the presence of a new and never before discovered malware.  By the time a new malware is actually discovered, there is a time delay for developing a patch, that patch is then uploaded to their web sites and eventually uploaded to an end users computer.  Because of these delays, Malware attacks happen.

To overcome these delays, detection software companies use analytics to look for “known” behavior patterns of malware.  Despite their best efforts to analyze "known" behaviors, Malware infections still get in.  The proof is in the many Ransomware attacks which regularly happen.

Even the cloud, although generally considered safe, malware attacks still happen.

My Background:  During my 30+ years in electronic component technical sales, sales management and project management, I have been exposed to a breadth of electronic design technologies. Including working on the supply of electronic components used in three satellites circulating the globe.  My highest profile satellite was working with the engineers for the supply of the CCD imaging sensor, which was used in the European Space Agency satellite, which produced from outer space the first images of the Aurora Borealis, hovering like a crown above earths North Pole.

I was a speaker at the International Cyber Security and Information Security Conference.  Also I am honored to have been invited as a keynote speaker at the, International Forensic Sciences Conference 2021, in Osaka Japan.  I have had an article published in the Canadian military technology magazine Vanguard.  The article was on the need for the government to form a new department to take a second look at rejected funding applications  

Discovery:   August 8, 2016 I discovered a new computer principle, which led me to the design of a New Class of Computer Components, which led me to the design of a new section/process for computers which is our Virus Blocking Interface Hardware (VBIH), which in turn led me to a new way for the basic computer to "safely" process information files without the need or use of Detection Software.   Realizing the significance of this discovery, I federally incorporated ROATI Technologies Inc., September 21, 2016.  

ROATI is an acronym for Ralphs Onto A Technology Innovation.

Proof of Discovery:  I presented a malware infected Word document to the input of the VBIH, the output was the same Word document, but “no longer malware infected”.   

As impossible as this may sound, this was accomplished without the need or use of Detection Software, Encryption, VPN or Analytics.  This is significant.

This is an internal proof of discovery.  To prove this discovery to the world, I need to build a Proof of Concept (PoC) to prove that, what I say what my redesigned computer can do, can actually be done.

Malware Secure Computer Design:   The ability of our VBIH to “safely” process a Malware Infected information files, has enabled a major redesign of the computers architecture, enabling this previously never thought possible, high level of Malware security.

Description:  A ROATI computer consists of four "physically isolated and independent zones";  Input, Output, Neutral and Processing Zones.  Each of these "physically independent" and isolated zones safely communicate with each other through the VBIH of the Neutral Zone.  The four independent zones work together to form one computer, which safely communicates with the Malware Infected outside world.

Typical Computer:   the above is a typical off the shelf type of computer, consisting of the "inner connected" input, output and processing and storage stages.  They are all electrically attached to and directly communicate with each other, allowing for a malware to obtain entry, be processed, stored, do its damage, then that malware is shared with others and that malware easily spreads, inflicting its malicious damage. 

The Malware Infected World:  is the malware infested world of the internet, incoming storage media such as USB, CD, Wi-Fi, Bluetooth, the Cloud, unsecured computers on a network, etc.

The Input Zone: of a ROATI computer, “safely” works with both clean and malware infected user data files.  Modern computers used today, consider opening a malware infected file as dangerous, we do not.  In fact, we can and do "safely" use Malware Infected user data files.   For us processing a Malware infected file is an advantage.  This will seem counterintuitive to those who do not know how a ROATI Computer works.

For the technically minded

There are five, cascading, Linux based sandbox computers who share the one BIOS and SSD where the write buss to each have been "mechanically" switched open circuit. 

For a flowchart and description of the cascading sandbox system

The Output Zone:  is the isolated output section where "only" malware safe data is exported. 

The Neutral Zone:  is the isolated section consisting of the Virus Blocking Interface Hardware (VBIH) and support circuits.  The VBIH is the core to the new way by which we can safely process both clean and malware infected information data.  When either a clean or a malware infected information file is presented to the input, the output is always "no longer infected".  This new newly discovered way to process information files is accomplished without the need or use of detection software, encryption, VPN or analytics.  The VBIH is the core to our discovery.  

Because of the way the VBIH process files, it is impossible for a malware to get into the Processing Zone, from an email, internet activity, including an external hackers attempting to install a malware to exploit a Zero day Vulnerability.    

The Processing Zone:  can be thought of as your standard computer.  You may use modern off the shelf software, modern o/s, your own custom software, heritage software and older operating systems.  New and old, software and operating systems are equally well protected. 

An additional hardware feature is provided which prevents the introduction of a malware by a malicious employee, a clumsy employee or an onsite hacker.  Access for software updates are controlled only by authorized personnel under a new and specific security protocol.   

Benefits for Canada: 

A new level of malware protection for our Data.

The start of a computer manufacturing industry in Canada generating thousands of high tech jobs.

The exporting of our Canadian manufactured computers, will help contribute to reducing our trade deficit and will help to bring in new foreign capital, which will be re-invested into supporting Canadian technology.   

This new industry will help Canada to becoming an even stronger technology and manufacturing powerhouse.

Our corporate taxes and wealth generated for Canadians will help to compensate for the governments climbing deficit, due to the COVID-19 pandemic.  Deficit spending has been needed to protect the economy and to provide support for those who have been adversely affected.    


< Conclusion > : 

A little bit of help today, will help ROATI Technologies provide all the above and more.

The ROATI computer discovery, is a major technological leap forward for the Cyber protection of information data and represents a significant economic benefit for Canada.

We are on the precipice of an evolutionary shift in Cyber Security.   I invite you to contact me to discuss rolling up our sleeves together.  This is a ground floor opportunity, please be in contact.  

Safe Computing
Ralph Kachur        


My Father loyally fought for Canada during WWII
I loyally fight for Canada during the Cyber Wars of 2021
What will you do to protect your data from a malicious attack

For this page as a Word Document, Download


ROATI Technologies Inc.
         Malware Secure Computers
    Protecting Electronic Information


1216 - 64 Bramalea Road
Brampton, Ontario, L6T 2W8

(905) 846-1233 EST,  -4 GMT, -4 UTC
(800) 458-3089 USA  &  Canada

Phones answered

8:00 am - 10:00 pm Eastern Time,  7 days / week
5:00 am -  7:00 pm Pacific Time,   7 days / week

≥ 1 hour All time zones.