Malware Secure Computers
A Computer Hardware Discovery and Design
We made a very important cyber security, protection discovery. This discovery led to how the actual computer itself is able to "safely" process both clean and malware infected information files and is accomplished without the need or use of detection software. The enabling technology has been proven in our lab.
The subject of this web page is about our important discovery, our ability to provide an increase in cyber protection for computer information data thought the world and the path to commercial and economic success for Canada.
One of the main reasons for the plethora of malware attacks such as ransomware is, modern cyber protection software are being run on computers, whose core principle of how data is processed, was established and has not changed much in over 40 years.
Our new computer design is due to our in-house discovery of a new information conduit for data to travel on. It is different from other types of information conduits such as, fiber optics, wire or RF. I named this new type of information conduit and its support circuitry the r-conduit.
In our lab, a Malware Infected Word document was presented to the input of the r-conduit, the output was the very same Word document, except, "no longer infected". (Please re-read this statement slowly)
This is significant. Malware in, clean out - detection software, VPN, encryption, analytics or AI, was not used
We are not saying we are perfect at preventing cyber attacks, for we do not know what will be in the hands of hackers tomorrow. However, we are a monstrous improvement over what is currently on the market today.
This is a re-design of how the actual computer processes information data, not another software improvement.
To add a tone of credibility to my discover, hear is a short paragraph on my background.
I have 30+ years in
electronic component technical sales, sales management, project management and
was instrumental in the supply of electronic components used in three
satellites. I speak at
conferences, have been published in the respected military
technology magazine Vanguard and have been invited as a keynote speaker at the
4th World Conference
on Forensic Sciences in Osaka Japan, Nov. 4-6, 2021.
Our ultimate objective is to start a new company, based on the new r-conduit principle, manufacturing Malware Secure Computers in North America, Europe and South Asia with our head office in Canada.
In 2020 CIRA, the Canadian Internet Registration Authority, forecasted that cyber attacks were going to annually cost the economies of the world ≥ $6 trillion by 2021. Ransomware being a major contributor.
is estimated in 2020 there were 304 million ransomware attacks with an
Our new computer design, well satisfies a substantially pent-up, international market demand, for the high a level of malware protection, which we most certainly can and one day will be providing.
Because of an increase in the complexity of electronics used in our computers, the cost to manufacture is reflected in an early estimated retail price of $u 2,5k - $u3.0k each.
order to keep our costs down, a first run of a minimum of 10,000 computers
will be necessary. This will result a first
sale total of ≥
In order to finance our first production run, sales will be on a pre-paid basis, funds will be deposited in trust, into a respected Canadian bank. All transactions will be administered by an internationally respected accounting firm. Should our target of 10,000 computers not be made, then that accounting firm will refund payments, less a small administering free. When the 10,000 target is reached, suppliers will be assured of payment by that accounting firm.
Our first run will be made by contract manufacturers. Depending on the degree of proven success from our first run and having received proven market interest, guidance will be sought from our advisors for where or when to take direct control of our own manufacturing and other business decisions.
Although not formalized in the form of a board of directors, I have a team of advisors which I call upon for guidance.
Talents include: a friend who is a former director of technology development for a Canadian province, our corporate lawyer, three lawyers in the family, a sister who is an accountant, a relative who is a professor of media relations, a friend who is a former production manager of a large electronics manufacturing facility, a recently retired computer design electronics engineer and several potential suppliers who want my business and are offering technical support. In short, a list of senior advisors to guide our efforts, technically, legally, financially, accounting, marketing and manufacturing. Then there is my 30+ years of business and technical experience in the electronic components industry.
Incoming files are first received in a specially designed type of isolated input computer, whose only function is to process incoming files. This input computer, is known as a Linux based, SandBox Computer, with several new safety designed features and improvements.
It is called a SandBox because, a sandbox is a safe container where a child can safely play with the sand and the sand does not get out. Similarly for us, it is a safe container, where we can run special processes on that file and it does not get out.
As our SandBox is physically and electrically isolated from the main CPU processing area, how do we get that file "safely", from that SandBox to the main CPU, especially when we do not know if that file is malware infected or not.
For us, it does not matter if the file in the SandBox is a malware infected file or not, for all files information files which are presented to the r-conduit input, the output is the same file, but always, absolutely, "not malware infected".
The output of the r-conduit is received in the main CPU area. That file may now be "safely" used in the normal manner and may be shared with others with confidence in the knowledge that the file is absolutely safe to use.
For the ease of understanding, the r-conduit may be thought of as a cleaning process, but is in fact very much not. The r-conduit is an important, new and major technological discovery for computer processing, which will help contribute to a sizeable reduction in cyber / malware / ransomware attacks for users of our computers.
For the ease of explanation in this web page, we use the term, information data or files, as an encompassing term, to include the safe processing of, internet searching, email, email attachments, Word, PDF, RTF or SQL and ORACLE type data base files, to name a few. These are common files types for a malware to obtain entry into a computer. As this is a new and evolving technological discovery, after further research we will include and confirm other data types.
It will be an advantage for a government, corporation or a wealthy person to help fund the development of our PoC. Not only economically but also for the Cyber / Malware / Ransomware protection of their own data.
A special note - To those with a cyber research budget of ≥ us$250k
This is an open invitation to investigate myself and my company, to consider funding our us$15k Proof of Concept.
Likely to date, what you have invested in cyber security, is not working, as proven by the number of cyber attacks which are still happening. Determine for yourself the probability for the high degree of protection we will be able to offer your company and the worthiness of this investment.
The existing computer architecture enables, a file to enter, be processed, saved or shared.
The existing computer architecture also enables, a malware to enter, be processed, saved or shared. Therefore, enabling that malware to execute its malicious intent and spread to other computers.
This very basic realization is what led me onto my, three year journey to resolve this weak point. Which I have. The following is a primer of this discovery.
Technical people tend to overlook the need to improve the basic principles of how computers work and just accept that it works and build from there. They tend to focus on computers doing more, working faster and costing less.
What we did was to take an in-depth look at and to question the very basics of how and why computers work. We discovered a flaw, then made an important improvement, which only "then" led us to our advanced new design for our Malware Secure Computers.
It is the process of re-thinking the basics, which led us to this important discovery.
All incoming files are first received in a special type of isolated input computer known as a SandBox Computer. All information files, either clean or malware infected are then "safely" transferred from the SandBox to the main CPU via the r-conduit as a "NOT INFECTED" file. Now that the file is now absolutely "NOT INFECTED", that file is now ready for its normal usage and "safe" sharing with others.
After that file is transferred to the main CPU, that SandBox is shut down and restarted to remove any potential malware. Upon boot up, a special cleaning program is run, making sure that the isolated input SandBox Computer is absolutely and totally malware free and ready to "safely" receive the next file.
As this re-booting and cleaning process is time consuming, to overcome the time delay, there are five, independent, isolated, cascading input SandBox Computers' which share the incoming work load.
It is the processing characteristics of the r-conduit, which has enabled our computers to consist of several physically and electrically isolated areas. These isolated areas are, five inputs, one output, and one main CPU processing area. It is the r-conduit which enables "safe" communications between these isolated areas
In order to prevent a malware from being manually entered by a malicious employee, a clumsy employee or an onsite hacker, when loading or updating information or software, an additional hardware security feature is installed which prevents this.
the loading of updates and software, access is controlled by only
authorized personnel and will only be allowed to be loaded when a strict,
new, hardware/software procedure is followed.
Providing an additional layer of security.
Providing an additional layer of security.
I have tried to explain this discovery with simpler language. Much of what is said above is repeated again with additional explanation and detail.
Even before MS DOS version 1.0 in 1981, all files entering the computer are controlled by the main CPU. It is the CPU that also allows a malware too easily obtains entry into your computer.
Even with the best efforts of good detection software such as McAfee or Norton, "occasionally" malware bypasses detection software, for a variety of reasons. It is then that a malware has the opportunity to enter and execute its malicious intent.
It is the need to have the main CPU in control and making decisions for all incoming files, which is the week point and what allows for a malware to enter. It is this simple and basic fact, which led us on our three year journey to research a solution. We felt, there must be a better way to process an incoming information file. It was our discovery of the r-conduit, which led us to our design of how to safely process both clean and malware infected information files.
Before the main CPU has a chance to process an incoming file, we inserted a special type of computer known as a SandBox Computer, whose only purpose is to process incoming files in an isolated environment The SandBox first receives that incoming file as either a clean or malware infected file. Then that information file is transferred to the r-conduit, which then "safely" transfers that file to the main CPU, as an absolutely "NOT INFECTED" file.
This process could be thought of a file cleaning or blocking process, but it is certainly not either. In order to clean or block a malware, you first need to detect, analyze or somehow know if that file is actually infected or not. For our computers we do not need to detect, analyze or know if that incoming file is infected or not. With our computers, using our new r-conduit technology, . . . . . that - malware - just - does - not - get - through !
In a normal SandBox Computer, to prevent a malware from writing to and hiding in the Hard Disk Drive (HDD) or
BIOS, writing is prevented by using software control.
This is a week point, for malware is designed to bypass and disable
software control. To prevent writing to the HDD
or BIOS for our computer, we inserted a "mechanical switch" on the
write buss (write wire) to the HDD and BIOS. This absolutely
prevents a malware from writing to or hiding in the HDD or BIOS.
Yet, software and information in the HDD and BIOS may still be "safely"
read to be used and to run programs.
The SandBox Computer is connected to the outside world to allow for files to enter, yet, it is physically and electrically isolate from the main CPU. With the SBC being so isolated, the problem is how to get that file "safely" to the main CPU for its normal usage. What we did is, all information files in the SandBox are presented to the r-conduit, malware infected or not. It is the r-conduit which "safely" transfers information files to main CPU as an absolutely "NOT INFECTED" file.
Now that file exits in two locations, potentially malware infected in the SandBox Computer and absolutely "NOT INFECTED" in the main CPU processing stage.
As that file in the SBC may or may not be malware infected. As to not take a chance, power to
just that SandBox is shut
off, then turned back on, this rebooting removes any
malware which may be located in RAM. As part of the BIOS
boot up process, a memory cleaning program is run on all types of RAM, including non-volatile
RAM. Non-volatile RAM is a
type of memory, which is not deleted when power is shut off. Also
non-volatile RAM is a popular hiding spot
for a malware to hide. While this can be a problem for many computers, it
is not a problem for us.
The process of re-booting and RAM cleaning the SandBox insures that the SandBox is absolutely and totally malware clean, before being ready to accept the next file.
Since the SandBox process of re-booting and cleaning is time consuming, our computers have a total of five cascading, isolated and independent input SBCs for new files and processing. When one is either shutting down or booting up there are three or four other fresh SandBox Computers' to receive a new file.
are not saying we are perfect at preventing cyber attacks, for we do
not know what tricks will be in the hands of hackers tomorrow.
However, we are a monstrous improvement over what is currently on the
Current cyber security
thinking is, if a malware infected file is present, it
should be immediately deleted.
Often detection software will automatically delete a malware infected file or email before reaching its
intended recipient. The reason for deleting that file, is to prevent that
malware from entering a computer and spreading to others.
The reason for deleting that file, is to prevent that malware from entering a computer and spreading to others.
It is important that critical information, is not prematurely deleted, at the same time preventing any malware from spreading into that or any other computer. Until now, this has been difficult for some and dangerous for other, but for us it is perfectly safe.
Examples of important
information are: 1. The building is on fire. 2.
Boiler # 5 is ready to explode. 3. A person with a gun is in the
lobby. 4. The attached important file needs to be immediacy
faxed to . . . . If that senders' file was malware
infected, the intended recipient may not have received that important information.
Examples of important information are: 1. The building is on fire. 2. Boiler # 5 is ready to explode. 3. A person with a gun is in the lobby. 4. The attached important file needs to be immediacy signed and faxed to . . . . If that senders' file was malware infected, the intended recipient may not have received that important information.
computer located on planet
earth today. The exception being, closed loop or air gap systems, which this discovery mimics
well and provides a new type of air gap malware protection at the individual
The receiving of vital
information is of critical importance to, police, military,
government, critical infrastructure, business, voting systems,
manufacturing, IIOT and IOT. Anywhere when important information must
be received and must be malware free, which is basically every one
of the estimated
The receiving of vital information is of critical importance to, police, military, government, critical infrastructure, business, voting systems, manufacturing, IIOT and IOT. Anywhere when important information must be received and must be malware free, which is basically every one of the estimated
Retirement: For fun, I have redesigned how the computer works.
For fun, I have redesigned how the computer works.
With little funds, I am attempting to start a multi-billion dollar computer manufacturing industry in North America, Europe and South Asia. Stricter control over the manufacturing our computers is needed to maximize the security of our data systems.
During WWII, we certainly would not
have asked our enemies to
manufacture our guns and bullets, just because they were
expensive. Let's take
back control of the manufacturing of our computers. By doing so,
we will wind
up strengthening our economies, while maintaining strict control over the
protection of our critical data and the reliability of the semiconductors
used in our computers. This way we will not need to fear if those
semiconductors contain deeply hidden code or capabilities for our enemies to exploit.
proven the enabling technology in our lab, a Proof of Concept
demonstrate this important discovery is needed for us to obtain funding for commercial product
development, which should easily follow due to the high level of
protection we will be providing.
Despite having proven the enabling technology in our lab, a Proof of Concept to demonstrate this important discovery is needed for us to obtain funding for commercial product development, which should easily follow due to the high level of protection we will be providing.
Having been self-funding our research for the last three years I am running out of cash. I do not have enough funds to build a simple PoC (under us$15k). I am in need of funding in order to launch a new industry and direction as to how cyber protection can be provided today and into the future.
Tomorrow, ROATI Technologies Inc. will be a major manufacturer of Malware Secure Computers, in order to get there, we need help today.
If you have read this far you must be very interested. Please feel free to contact me. I pride myself as being an easy Canadian to talk too.
The world needs the level of malware and cyber protection which ROATI Technologies one day will be providing. I need help today, to make it a reality, sooner.
How much do you want your data to be protected?