The patented and patent-pending technologies in our privacy and security products were created by Michael Wood:
Internationally Acclaimed Cryptographer: Michael is the inventor of the REDOC-II encryption system (US Patent 5003596). The historic strength of his encryption was first certified by Dr. Thomas Cusick (who published 60 papers in the field of cryptography and 8 PhD students whose thesis work was in this area). Dr. Cusick’s conclusions were subsequently confirmed by Drs. Eli Biham and Adi Shamir, the two cryptographers famed for breaking the United State’s government’s national encryption standard. Michael’s Redoc encryption methods are currently taught in the cryptography textbook Applied Cryptography by Bruce Schneier.
Internet-Communications Expert: Michael is also the inventor of an artificial-intelligent system for mapping network topologies — a core component of managing internet traffic (US Patent 6405248). This technology was sold to Micromuse for $42 million for incorporation into the NetCool product line; which was subsequently sold to IBM for $865 million.
Michael had a persistent problem with hackers accessing and controlling his home computers. Therefore, he decided to purchase a security system that would allow him to see the names of everyone accessing his computer; so he could decide who to let in and who to keep out. To his surprise, none existed.
The intensity of the hacks grew so strong that Michael completely disconnected from the internet for six months. He decided that the only way that he could safely connect his home to the internet would be to design a name-based security system himself. His background in computer security and network engineering gave him the skills needed to do so.
His first product was TTC NetSwitch. TTC NetSwitch showed every domain that the computer wanted to connect to so that anyone could choose, in real-time, who their computer was allowed to talk to. Next, Michael began grouping domains by owners (e.g. Microsoft, Apple, etc.) so that you can more easily choose which people or companies your computer can talk to. This technology gave birth to Hacker Deterrent. Then Michael developed dynamic whitelisting, a technology that automated up to 99%, making it extremely easy to control who can access your computer. Dynamic whitelisting was the foundation of Hacker Deterrent Pro.
Hacker Deterrent Pro solved the problem of trojans for Windows-based PCs. Michael was determined to solve the issue of trojans for all client-side devices: all computers (Windows, MAC, Linux, etc), all phones (iOS, Android, Blackberry, etc.), smart appliances (TV’s, printers, etc.), and the Internet-of-Things. Since dynamic whitelisting proved to successfully block trojans in the real world, Michael discontinued the Hacker Deterrent line in order to move the technology to the cloud, where it will soon be able to protect all client-side devices from all manufacturers.
In the meantime, Michael committed to solving the other client-side hacking issue: phishing links. His recent invention of PhishViewer fulfills his commitment. The PhishViewer family will consist of PhishViewer Webmail, PhishViewer Switch, and PhishViewer Native. PhishViewer Webmail is a server-based email client for use with email service providers that permit webmail-based access. It is available now.
PhishViewer Switch will be available in the beginning of 2019. PhishViewer Switch will sit in front of corporate email servers. Companies will be able to use both their current email readers and their email servers, with the switch automatically embedding PhishViewer security on-the-fly.
PhishViewer Native will be available the middle of 2019. PhishViewer Native will be a suite of independent programs that run directly on Windows, MAC, iOS, and Android. These native apps will be hybrids of the webmail/switch technologies. These native apps can access free email services such as gmail, Yahoo Mail, and AOL. The PhishViewer family will ultimately provide protection against phishing links for all email service providers and companies alike.