Malware Secure Computers

A Computer Discovery and Design

September 27, 2021

Elevator:

We made a major Cyber Security discovery, which led us to a redesign as to how the actual computer itself is now able to "SAFELY" process malware infected information files and is accomplished without the need or use of detection software.  The enabling technology has been proven in our lab.  This important discovery will result in our manufacturing Malware Secure Computer in North America, Europe and South Asia, with our head office in Canada.  

This web page covers
    ●   our discovery  
    ●   overview of our business and technical plan
    ●   economic benefit for North America.

 

Discovery:

Our new computer design is due to our in-house discovery of a new information conduit for data to travel on.  It is different from other types of information conduits such as, fiber optics, wire or RF.   I named this new type of information conduit and its support circuitry, the r-conduit.  This is a significantly important discovery.

In our lab, a Malware Infected Word document was presented to the input of the r-conduit, the output was the very same Word document, except, "no longer infected".   (Please re-read this statement slowly)

Malware in, clean out - detection software, VPN, encryption, analytics or AI, was not used

We are not saying we are perfect at preventing cyber attacks, for we do not know what will be in the hands of hackers tomorrow.  However, we are a monstrous improvement over what is currently on the market today.  

This is a hardware re-design of how the actual computer itself will "safely" processes information data, this is not another software improvement.

To add a tone of credibility to my discovery, which may seem impossible to some, hear is a short paragraph on my background. 

I have 30+ years in electronic component technical sales, sales management, project management and was instrumental in the supply of electronic components used in three satellites.  I speak at conferences, have been published in the respected military technology magazine Vanguard and have been invited as a keynote speaker at the 4th World Conference on Forensic Sciences in Osaka Japan, Nov. 4-6, 2021.  
My name is Ralph Kachur.

Our objective is to start a new company, based on the new r-conduit principle, manufacturing Malware Secure Computers in North America, Europe and South Asia with our head office in a yet selected province in Canada.

Business Overview:

In 2020 CIRA, the Canadian Internet Registration Authority, forecasted that cyber attacks were going to annually cost the economies of the world over $6 trillion by 2021.  Ransomware being a major contributor.  

It is estimated in 2020 there were 304 million ransomware attacks with an estimated 62% paying the ransom at an average of $u2.5 million per payout plus other hidden costs.  Projections for 2021 is estimated to be much higher.

Our new Malware Secure Computer design, well satisfies a substantially pent-up, international market demand, for the high a level of malware protection, which we most certainly can and one day will be providing. 

The cost to manufacture is reflected in an early estimated retail price of $u 2,5k - $u3.0k each.  

To keep our costs down, a first run of a minimum of 10,000 computers will be necessary.  This will result a first sale total of about u$30,000,000.00.  

In order to finance our first production run, sales will be on a pre-paid basis, funds will be deposited into a trust account with a respected Canadian bank.  All transactions will be administered by an internationally respected accounting firm.  When the 10,000 target is reached, suppliers will be assured of payment by that accounting firm.  Production will then commence.

Due to the significance of this discovery, prior to being available for sale, a well timed product announcement and detailed marketing plan will be launched.  The detail of which needs to be explained under separate cover, but certainly contains news media release, talk shows, conference presentations, trade publications and a social media campaign.

Our first production run will be made by contract manufacturers.   

Depending on the degree of proven success from our first run and having received proven market interest, guidance will be sought from our advisors for where or when to take direct control of our own manufacturing and other business decisions.

Although not formalized in the form of a board of directors, I have a team of advisors which I call upon for guidance. 

Talents include:  a good friend who is a former director of technology development for a Canadian province, our corporate lawyer, three lawyers in the family, a sister who is an accountant, a relative who is a professor of media relations, a friend who is a former production manager of a large electronics manufacturing facility, a recently retired computer design electronics engineer and several potential suppliers who want my business and are offering technical support.  In short, a list of senior advisors to guide our efforts, technically, legally, financially, accounting, marketing and manufacturing.  Then there is my 30+ years of business and technical experience in the electronic components industry as a manager and as a business advisor to many of my customers and local start-ups.

Bank Funding:  A major Canadian bank president has offered to fund our commercial product development for a small equity stake, contingent upon the demonstration of a basic Proof of Concept (PoC), knowing it would be a multi million dollar investment for that bank.  

For the last three years, I have been self funding our research.  Today our biggest problem is to raise the approximate u$15k necessary to hire the specialized technical assistance needed in order to build a simple Proof of Concept.  

It will be an advantage for a government, corporation or a wealthy person to help fund the development of our Proof of Concept.  Not only economically but also for the preferential treatment they would receive for the Cyber / Malware / Ransomware protection of their data.

A special note - To those with a cyber research budget of over u$250k 

This is an open invitation to investigate myself and my company, to consider funding our u$15k Proof of Concept. 

Likely to date, what you have invested in cyber security, may not be working, as assumed by the number of cyber attacks which are still happening.  Even if you have the best protection in the world you must be worried for even Microsoft, Google and other major well protected entities have been hacked and have had valuable data stolen.  Determine for yourself the probability for the high degree of protection we will be able to offer your company.

Here is a thought for you . . . . . . . what if everything I am saying here is true?  

Should decide to not contact me . . . . . . . remember me during your next cyber attack.

Technical Overview:

Incoming files are first received in a specially designed type of isolated input computer, whose only function is to process incoming files.  This input computer, is known as a Linux based, SandBox Computer, with newly designed improvements,  e.g. in a normal SandBox, writing to the BIOS and SSD are software controlled, a common malware target.  What we did was to install a mechanical switch on the write buss, which 100% prevents a malware from writing to the BIOS or SSD, yet data can still be read.

It is called a SandBox because, a sandbox is a safe container where a child can safely play with the sand and the sand does not get out.  Similarly for us, it is a safe container, where we can run special processes on that file and it does not get out, even if that file is malware infected.

As our SandBox is physically and electrically isolated from the main CPU processing area, how do we get that file "safely", from that SandBox to the main CPU, especially when we do not know if that file is malware infected or not.

For us, it does not matter if the file in the SandBox is a malware infected file or not, for all information files which are presented to the r-conduit input, the output is the same file, but always, 100%, "not malware infected".   

Once the output of the r-conduit is received in the main CPU area, that file may now be "safely" used in the normal manner and may be shared with others with confidence in the knowledge that the file is absolutely safe to use.

For the ease of understanding, the r-conduit may be thought of as a cleaning process, but is in fact very much not.  The r-conduit is an important, new and major technological discovery for computer processing, which will help contribute to a sizeable reduction in cyber / malware / ransomware attacks for users of our computers. 

The discovery of the r-conduit and our computer redesign has enable many more technological advantages which are to many to provide on this web page.  If you have any concerns or questions, please do not hesitate to reach out and contact me.  Particularly, if you have any cyber safety concerns or problems which current technology can not provide.

Important Note:

For the ease of explanation in this web page, we use the term, information data or files, as an encompassing term, to include the safe processing of Clean and Malware Infected, internet searching, emails, email attachments, Word, PDF, RTF or SQL and ORACLE type data base files, to name a few.  These are common files types for a malware to obtain entry into a computer.   As this is a new and evolving technological discovery, after further research we will include and confirm other data types.

The Problem:

How x86 computers process user data files, for the most part has not changed much in over 40 years, even before Bill Gates first introduced MS DOS Ver. 1.0, August 12,1981.  Which incidentally, I purchased a copy directly from Bill Gates, just before IBM announced the personal computer and the birth of the modern computer industry.

During our analysis of the basics of computers and their well established processes, I realized, that the existing basic architecture of how computers process incoming information files is the weak point which has enabled the plethora of cyber-attacks which we see today.  

This very basic realization is what led me onto my, three year journey to resolve this weak point.  Which I have.  

Technical people tend to overlook the need to improve the basic principles of how computers work and just accept that it works and build from there.  They tend to focus on computers doing more, working faster and costing less.  

What we did was to take an in-depth look at and to question the very basics of how and why computers work.  We discovered a flaw, then made important improvements, which only "then" led us to our advanced design for our Malware Secure Computers.  

It is the process of re-thinking the basics, which led us to this very important discovery.

In My Retirement:

For fun, I have redesigned how the computer works. 

With little funds, I am attempting to start a multi-billion dollar computer manufacturing industry in North America, Europe and South Asia.  

Taking Back Control:

During WWII, we certainly would not have asked our enemies to manufacture our guns and bullets, just because they were less expensive.  Let's take back control of the manufacturing of our electronics and semiconductors.  By doing so, we will wind up strengthening our economies while maintaining strict control over the protection of our critical data and the reliability of the semiconductors used in our computers.  This way we will not need to be concerned if those semiconductors contain deeply hidden code or capabilities for our enemies to exploit.

I have redesigned how the computer works enabling the "safe" processing of malware infected information files.

Governments need to support taking back control of the manufacture of our electronics and semiconductor industries.


Conclusion:

We need help to build a Proof of Concept to demonstrate this critically important cyber protection technology.  This will start the beginning of a new, home grown, computer manufacturing industry, based on r-conduit principle.

Please feel free to contact me.  I pride myself as being an easy to talk too Canadian.

Like I said above, we are not saying we are perfect at preventing cyber attacks, for we do not know what will be in the hands of hackers tomorrow.  However, we are a monstrous improvement over what is currently on the market today

Opportunity is knocking at the door, I just need a tiny bit of assistance to open it . . . . . . . . . . . . Help !  


Safe Computing
Ralph Kachur       f
President.

 

ROATI Technologies Inc.
         Malware Secure Computers
    Protecting Electronic Information

                    

1216 - 64 Bramalea Road
Brampton, Ontario, L6T 2W8
Canad
a

(905) 846-1233 EDT,  -4 GMT, -4 UTC
(800) 458-3089 USA  &  Canada

Phones answered

8:00 am - 10:00 pm Eastern Time,  7 days / week
5:00 am -  7:00 pm Pacific Time,   7 days / week

≥ 1 hour All time zones

www.roati.com 

www.roati.com/discovery   (This Primer)

www.roati.com/design   (A short summary and longer detail)

ralph@roati.com