Detection software not needed or used
May 30, 2020
For details of our discovery: www.roati.com
Overview of our discovery:
We are in development of Malware Secure Computers, which do not need to use detection software, encryption, AI or analytics for the following computer uses:
are now in the design phase of a Proof of Concept demonstrator.
The president of a major Canadian bank has offered to fund our
commercial product development for a small equity stake, contingent upon
demonstrating what I said could actually be done. The
core principles to enable the above have been proven in our lab.
The on-site introduction of a Malware, via a USB, CD or Wi-Fi, is a major concern for Cyber Security experts. We protect against the purposeful injection of a Malware by a malicious employee, the inadvertent introduction of a Malware by a good employee or the pre-meditated attack by an on-site hacker. This extra level of protection is also accomplished without the need or use of detection software, encryption AI or analytics.
I have a 30+ year background in electronic component technical sales, sales management, and project management, including the supply of electronic components used in three satellites circulating the globe today.
My highest profile satellite project, was the supply of the CCD imaging sensor used in the imaging portion of the European Space Agency VIKING satellite, which produced the first images from outer space of the Aurora Borealis looking like a crown hovering above Earths North Pole.
Due to my exposure to a breadth of electronic technologies, I made this major Malware security discovery.
One of the main reason I am able to provide this level of Malware Security is because of my discovery and development of a New Class of Computer Components (NCoCC), which has enabled me to do a major redesign of the architecture of the input section of our computers. It is the input stage where it is most Malware obtain entry into your computer. When a clean or malware infected user data file (such as Word or PDF) is presented to the input of the NCoCC, the output is always no-longer-infected.
The other major market for our NCoCC is for the Malware protection of certain types of data communications lines, such as those used in IOT, IIOT, SCADA, Critical Infrastructure and Process Control. Again, without the need or use of detection software, encryption, AI or analytics.
We have self-funded this project in to date. Despite our best efforts, we just cannot take this project any further without the specialized technical help needed or until such time as we able to obtain the necessary financial support needed to hire specialized technical help.
We are on the precipice of an evolutionary shift in Cyber Security and significant economic benefit for Canada, all we need is a small amount of support, to tilt us over the edge.
All I need is, help to build a basic Proof of Concept computer based on my new architecture and NCoCC.
Our phone is answered from 8:00 am - 9:00 pm EST, 7dpw. I sincerely invite you the reader to be in contact.
I cannot see the future, only the now.
I can only hope that what I do today
will prepare me for tomorrows now.
ROATI Technologies Inc.
1216 - 64 Bramalea Road
Brampton, Ontario, L6T 2W8
(905) 846-1233 ( -4 GMT, -4 UTC )
(800) 458-3089 ( USA & Canada )
Protecting Electronic Information
Phones answered : 7 days per week
8:00 am - 9:00 pm, EST,
5:00 am - 6:00 pm, Pacific Time
≥ 1 hour all World Wide time zones