Malware Secure Computers

A Computer Hardware Discovery and Design

September 15, 2021

Elevator:

We made a very important cyber security, protection discovery.  This discovery led to how the actual computer itself is able to "safely" process both clean and malware infected information files and is accomplished without the need or use of detection software.  The enabling technology has been proven in our lab.  

The subject of this web page is about our important discovery, our ability to provide an increase in cyber protection for computer information data thought the world and the path to commercial and economic success for Canada.

Overview:

One of the main reasons for the plethora of malware attacks such as ransomware is, modern cyber protection software are being run on computers, whose core principle of how data is processed, was established and has not changed much in over 40 years.  

Our new computer design is due to our in-house discovery of a new information conduit for data to travel on.  It is different from other types of information conduits such as, fiber optics, wire or RF.   I named this new type of information conduit and its support circuitry the r-conduit. 

In our lab, a Malware Infected Word document was presented to the input of the r-conduit, the output was the very same Word document, except, "no longer infected".   (Please re-read this statement slowly)

This is significant.  Malware in, clean out - detection software, VPN, encryption, analytics or AI, was not used

We are not saying we are perfect at preventing cyber attacks, for we do not know what will be in the hands of hackers tomorrow.  However, we are a monstrous improvement over what is currently on the market today.  

This is a re-design of how the actual computer processes information data, not another software improvement.

To add a tone of credibility to my discover, hear is a short paragraph on my background. 

I have 30+ years in electronic component technical sales, sales management, project management and was instrumental in the supply of electronic components used in three satellites.  I speak at conferences, have been published in the respected military technology magazine Vanguard and have been invited as a keynote speaker at the 4th World Conference on Forensic Sciences in Osaka Japan, Nov. 4-6, 2021.  
My name is Ralph Kachur.

Our ultimate objective is to start a new company, based on the new r-conduit principle, manufacturing Malware Secure Computers in North America, Europe and South Asia with our head office in Canada.

Business Overview:

In 2020 CIRA, the Canadian Internet Registration Authority, forecasted that cyber attacks were going to annually cost the economies of the world ≥ $6 trillion by 2021.  Ransomware being a major contributor.  

It is estimated in 2020 there were 304 million ransomware attacks with an estimated 62% paying the ransom at an average of $u2.5 million per payout plus other hidden costs.  Projections for 2021 is estimated to be much higher.

Our new computer design, well satisfies a substantially pent-up, international market demand, for the high a level of malware protection, which we most certainly can and one day will be providing. 

Because of an increase in the complexity of electronics used in our computers, the cost to manufacture is reflected in an early estimated retail price of $u 2,5k - $u3.0k each.  

In order to keep our costs down, a first run of a minimum of 10,000 computers will be necessary.  This will result a first sale total of u$30,000,000.00.  

In order to finance our first production run, sales will be on a pre-paid basis, funds will be deposited in trust, into a respected Canadian bank.  All transactions will be administered by an internationally respected accounting firm.  Should our target of 10,000 computers not be made, then that accounting firm will refund payments, less a small administering free.  When the 10,000 target is reached, suppliers will be assured of payment by that accounting firm.

Our first run will be made by contract manufacturers.   Depending on the degree of proven success from our first run and having received proven market interest, guidance will be sought from our advisors for where or when to take direct control of our own manufacturing and other business decisions.

Although not formalized in the form of a board of directors, I have a team of advisors which I call upon for guidance. 

Talents include:  a friend who is a former director of technology development for a Canadian province, our corporate lawyer, three lawyers in the family, a sister who is an accountant, a relative who is a professor of media relations, a friend who is a former production manager of a large electronics manufacturing facility, a recently retired computer design electronics engineer and several potential suppliers who want my business and are offering technical support.  In short, a list of senior advisors to guide our efforts, technically, legally, financially, accounting, marketing and manufacturing.  Then there is my 30+ years of business and technical experience in the electronic components industry.

Technical Overview:

Incoming files are first received in a specially designed type of isolated input computer, whose only function is to process incoming files.  This input computer, is known as a Linux based, SandBox Computer, with several new safety designed features and improvements.  

It is called a SandBox because, a sandbox is a safe container where a child can safely play with the sand and the sand does not get out.  Similarly for us, it is a safe container, where we can run special processes on that file and it does not get out.  

As our SandBox is physically and electrically isolated from the main CPU processing area, how do we get that file "safely", from that SandBox to the main CPU, especially when we do not know if that file is malware infected or not.

For us, it does not matter if the file in the SandBox is a malware infected file or not, for all files information files which are presented to the r-conduit input, the output is the same file, but always, absolutely, "not malware infected".   

The output of the r-conduit is received in the main CPU area.  That file may now be "safely" used in the normal manner and may be shared with others with confidence in the knowledge that the file is absolutely safe to use.

For the ease of understanding, the r-conduit may be thought of as a cleaning process, but is in fact very much not.  The r-conduit is an important, new and major technological discovery for computer processing, which will help contribute to a sizeable reduction in cyber / malware / ransomware attacks for users of our computers. 

Important Note:

For the ease of explanation in this web page, we use the term, information data or files, as an encompassing term, to include the safe processing of, internet searching, email, email attachments, Word, PDF, RTF or SQL and ORACLE type data base files, to name a few.  These are common files types for a malware to obtain entry into a computer.   As this is a new and evolving technological discovery, after further research we will include and confirm other data types.

 

Comment:
This is an important cyber protection discovery where we have proven the enabling technology in our lab.  A major Canadian bank president has offered to fund our commercial product development for a small equity stake, contingent upon the demonstration of a basic Proof of Concept (PoC).  For the last three years, I  have been self funding our research.  Today our biggest problem is to raise the approximate us$15k necessary to build a simple PoC.  

It will be an advantage for a government, corporation or a wealthy person to help fund the development of our PoC.  Not only economically but also for the Cyber / Malware / Ransomware protection of their own data.

A special note - To those with a cyber research budget of ≥ us$250k 

This is an open invitation to investigate myself and my company, to consider funding our us$15k Proof of Concept. 

Likely to date, what you have invested in cyber security, is not working, as proven by the number of cyber attacks which are still happening.  Determine for yourself the probability for the high degree of protection we will be able to offer your company and the worthiness of this investment.  

The Problem:
How x86 computers process user data files, for the most part has not changed much in almost 40 years, ever since Microsoft first introduced MS DOS Ver. 1.0, August 12,1981.  In 1981 I purchased a copy of Ver 1.0 directly from the president of that then upstart company, called Microsoft.  His name was Bill Gates.

During our analysis of the basics of computers and their well established processes, I realized,that the existing basic architecture of how computers process incoming information files is the weak point which has enabled the plethora of cyber-attacks which we see today.  

The existing computer architecture enables, a file to enter, be processed, saved or shared.

The existing computer architecture also enables, a malware to enter, be processed, saved or shared.  Therefore, enabling that malware to execute its malicious intent and spread to other computers.  

This very basic realization is what led me onto my, three year journey to resolve this weak point.  Which I have.  The following is a primer of this discovery.  

Technical people tend to overlook the need to improve the basic principles of how computers work and just accept that it works and build from there.  They tend to focus on computers doing more, working faster and costing less.  

What we did was to take an in-depth look at and to question the very basics of how and why computers work.  We discovered a flaw, then made an important improvement, which only "then" led us to our advanced new design for our Malware Secure Computers.  

It is the process of re-thinking the basics, which led us to this important discovery.


How It Works:

Summary: 

All incoming files are first received in a special type of isolated input computer known as a SandBox Computer.  All information files, either clean or malware infected are then "safely" transferred from the SandBox  to the main CPU via the r-conduit as a "NOT  INFECTED" file.   Now that the file is now absolutely "NOT  INFECTED", that file is now ready for its normal usage and "safe" sharing with others

After that file is transferred to the main CPU, that SandBox is shut down and restarted to remove any potential malware.  Upon boot up, a special cleaning program is run, making sure that the isolated input SandBox Computer is absolutely and totally malware free and ready to "safely" receive the next file.  

As this re-booting and cleaning process is time consuming, to overcome the time delay, there are five, independent, isolated, cascading input SandBox Computers' which share the incoming work load.

It is the processing characteristics of the r-conduit, which has enabled our computers to consist of several physically and electrically isolated areas.  These isolated areas are, five inputs, one output, and one main CPU processing area.  It is the r-conduit which enables "safe" communications between these isolated areas

In order to prevent a malware from being manually entered by a malicious employee, a clumsy employee or an onsite hacker, when loading or updating information or software, an additional hardware security feature is installed which prevents this.

For the loading of updates and software, access is controlled by only authorized personnel and will only be allowed to be loaded when a strict, new, hardware/software procedure is followed.  Providing an additional layer of security. 

Detail:  

I have tried to explain this discovery with simpler language.  Much of what is said above is repeated again with additional explanation and detail.

Even before MS DOS version 1.0 in 1981, all files entering the computer are controlled by the main CPU.  It is the CPU that also allows a malware too easily obtains entry into your computer.

Even with the best efforts of good detection software such as McAfee or Norton, "occasionally" malware bypasses detection software, for a variety of reasons.  It is then that a malware has the opportunity to enter and execute its malicious intent.

It is the need to have the main CPU in control and making decisions for all incoming files, which is the week point and what allows for a malware to enter.  It is this simple and basic fact, which led us on our three year journey to research a solution.  We felt, there must be a better way to process an incoming information file.  It was our discovery of the r-conduit, which led us to our design of how to safely process both clean and malware infected information files.

Before the main CPU has a chance to process an incoming file, we inserted a special type of computer known as a SandBox Computer, whose only purpose is to process incoming files in an isolated environment  The SandBox first receives that incoming file as either a clean or malware infected file.  Then that information file is transferred to the r-conduit, which then "safely" transfers that file to the main CPU, as an absolutely "NOT  INFECTED" file.  

This process could be thought of a file cleaning or blocking process, but it is certainly not either.  In order to clean or block a malware, you first need to detect, analyze or somehow know if that file is actually infected or not.  For our computers we do not need to detect, analyze or know if that incoming file is infected or not.  With our computers, using our new r-conduit technology, . . . . .  that - malware - just - does - not - get - through !

In a normal SandBox Computer, to prevent a malware from writing to and hiding in the Hard Disk Drive (HDD) or BIOS, writing is prevented by using software control.  This is a week point, for malware is designed to bypass and disable software control.  To prevent writing to the HDD or BIOS for our computer, we inserted a "mechanical switch" on the write buss (write wire) to the HDD and BIOS.  This absolutely prevents a malware from writing to or hiding in the HDD or BIOS.  Yet, software and information in the HDD and BIOS may still be "safely" read to be used and to run programs.

Some programs require writing to a storage drive such as a HDD, but in our SandBox Computer the write buss to our HDD, is mechanically switched open circuit, therefore writing to the HDD is absolutely impossible.  So we set up a special location in RAM for the program to write to, known as a Virtual RAM drive or VRAM drive. 

The SandBox Computer is connected to the outside world to allow for files to enter, yet, it is physically and electrically isolate from the main CPU.  With the SBC being so isolated, the problem is how to get that file "safely" to the main CPU for its normal usage.  What we did is, all information files in the SandBox are presented to the r-conduit, malware infected or not.  It is the r-conduit which "safely" transfers information files to main CPU as an absolutely "NOT  INFECTED" file.  

Now that file exits in two locations, potentially malware infected in the SandBox Computer and absolutely  "NOT  INFECTED"  in the main CPU processing stage. 

As that file in the SBC may or may not be malware infected.  As to not take a chance, power to just that SandBox is shut off, then turned back on, this rebooting removes any malware which may be located in RAM.   As part of the BIOS boot up process, a memory cleaning program is run on all types of RAM, including non-volatile RAM.  Non-volatile RAM is a type of memory, which is not deleted when power is shut off.  Also non-volatile RAM is a popular hiding spot for a malware to hide.  While this can be a problem for many computers, it is not a problem for us.

A popular type of operating system called Linux, is then loaded into the SBC.  The main CPU and storage area may use any x86 operating system, including Windows.

The process of re-booting and RAM cleaning the SandBox insures that the SandBox is absolutely and totally malware clean, before being ready to accept the next file.  

Since the SandBox process of re-booting and cleaning is time consuming, our computers have a total of five cascading, isolated and independent input SBCs for new files and processing.  When one is either shutting down or booting up there are three or four other fresh SandBox Computers' to receive a new file.

We are not saying we are perfect at preventing cyber attacks, for we do not know what tricks will be in the hands of hackers tomorrow.  However, we are a monstrous improvement over what is currently on the market today.

As the number of our computer increase in the field, will result in a type of heard immunity for PCs', systems and is especially important for networks. 

The Impossible:
Like many new innovations which are different from generally accepted norms, the contents of this site, may sound impossible to those not familiar with the technical aspects of our malware secure computer discovery and design.  I do most sincerely invite your phone call to challenge or question what I say I have discovered. 

1/
The r-conduit  does not use, detection software, encryption, VPN or analytics in order to safely process incoming data. 

2/
Contrary to current cyber security thinking, it is actually an “advantage” to have a malware infected email, email attachment, user data file or web document in any of our physically isolated SandBox Computer input stages.  

Current cyber security thinking is, if a malware infected file is present, it should be immediately deleted.  Often detection software will automatically delete a malware infected file or email before reaching its intended recipient.  The reason for deleting that file, is to prevent that malware from entering a computer and spreading to others.

It is important that critical information, is not prematurely deleted, at the same time preventing any malware from spreading into that or any other computer. Until now, this has been difficult for some and dangerous for other, but for us it is perfectly safe.

Examples of important information are:  1. The building is on fire.   2. Boiler # 5 is ready to explode.  3. A person with a gun is in the lobby.  4. The attached important file needs to be immediacy signed and faxed to . . . .  If that senders' file was malware infected, the intended recipient may not have received that important information. 

The receiving of vital information is of critical importance to, police, military, government, critical infrastructure, business, voting systems, manufacturing, IIOT and IOT.  Anywhere when important information must be received and must be malware free, which is basically every one of the estimated over 2 billion computer located on planet earth today.  The exception being, closed loop or air gap systems, which this discovery mimics well and provides a new type of air gap malware protection at the individual computer level.

In My Retirement:  
For fun, I have redesigned how the computer works. 

With little funds, I am attempting to start a multi-billion dollar computer manufacturing industry in North America, Europe and South Asia.  Stricter control over the manufacturing our computers is needed to maximize the security of our data systems.  

During WWII, we certainly would not have asked our enemies to manufacture our guns and bullets, just because they were less expensive.  Let's take back control of the manufacturing of our computers.  By doing so, we will wind up strengthening our economies, while maintaining strict control over the protection of our critical data and the reliability of the semiconductors used in our computers.  This way we will not need to fear if those semiconductors contain deeply hidden code or capabilities for our enemies to exploit.

I have redesigned how the computer works, the government needs to support the redesign of our computer industry.

Conclusion:
We've proven the enabling technology in our lab and have confirmed the availability of critical electronic components to our specification, of which my 30+ year background in electronic components was most helpful.  We now need help to build a Proof of Concept (PoC) to demonstrate this critically important and new cyber protection technology.

Despite having proven the enabling technology in our lab, a Proof of Concept to demonstrate this important discovery is needed for us to obtain funding for commercial product development, which should easily follow due to the high level of protection we will be providing.

Having been self-funding our research for the last three years I am running out of cash.  I do not have enough funds to build a simple PoC (under us$15k).  I am in need of funding in order to launch a new industry and direction as to how cyber protection can be provided today and into the future.  

Tomorrow, ROATI Technologies Inc. will be a major manufacturer of Malware Secure Computers, in order to get there, we need help today.    

If you have read this far you must be very interested.  Please feel free to contact me.  I pride myself as being an easy Canadian to talk too.

The world needs the level of malware and cyber protection which ROATI Technologies one day will be providing.  I need help today, to make it a reality, sooner. 

How much do you want your data to be protected?  


Safe Computing
Ralph Kachur      f
President.

 

ROATI Technologies Inc.
         Malware Secure Computers
    Protecting Electronic Information

                    

1216 - 64 Bramalea Road
Brampton, Ontario, L6T 2W8
Canad
a

(905) 846-1233 EDT,  -4 GMT, -4 UTC
(800) 458-3089 USA  &  Canada

Phones answered

8:00 am - 10:00 pm Eastern Time,  7 days / week
5:00 am -  7:00 pm Pacific Time,   7 days / week

≥ 1 hour All time zones

www.roati.com 

www.roati.com/discovery   (This Primer)

www.roati.com/design   (A short summary and longer detail)

ralph@roati.com