Patented Solution


Hacking attacks continue to succeed despite widespread use of antivirus. Here’s a secret that antivirus makers don’t want you know: The technology they use to stop viruses can actually make it easier for hackers to access your computer:

Antivirus Problems

“Feds issue alert that Symantec, Norton Antivirus products could let hackers hijack computers.” — Tech Times

Symantec – the popular computer protector – may actually help hackers, feds warn.” — CNN

[A]ntivirus programs have become the problem, not the solution. Staggeringly poor programming and security practices have made antivirus programs a gaping security hole in millions of computers.” — Tech Republic

Is your antivirus protecting your computer or making it more hackable? Internet security experts are warning that anti-malware technology is becoming less and less effective at protecting your data and devices, and there’s evidence that security software can sometimes even make your computer more vulnerable to security breaches.” — CBC News

“Research shows Antivirus software is making surfing and online banking less secure.” — Tech2

Antivirus software could make your company more vulnerable. Security researchers are worried that critical vulnerabilities in antivirus products are too easy to find and exploit.” — PC World

“Is your antivirus software putting you MORE at risk?” — Daily Mail

“It might be time to stop using antivirus.” — Ars Technica

“Study finds antivirus software ineffective.” — Government Technology

“Symantec admits anti-virus software is no longer effective at stopping virus attacks.” — Dot Tech

“Antivirus software so ineffective it’s a waste of money, report suggests.” — Computer World

“Google engineer says antivirus apps are ineffective magic, [that] don’t genuinely help. Google security expert says antivirus solutions are useless.” — Softpedia

“Antivirus software is so universally ineffective that it’s just a waste of money.” — CBS News

What Stops Hackers?

Stopping viruses and stopping hackers are two different security issues. Unfortunately, the technology used to stop viruses often opens the door to hackers in the process. Widespread overreliance on antivirus contributes to hackers having free reign over any computer they want.

If antivirus doesn’t stop hackers then what does?

“Antivirus tools are a useless box-ticking exercise says Google security chap.
Advocates whitelists and other tools that ‘genuinely help’ security.” — The Register

“Google security expert says antivirus apps don’t work. It’s time to switch to whitelisting instead.” — Network World

Whitelisting Explained

There are two opposite approaches in regards to securing your digital life: blacklisting and whitelisting.

Blacklisting: Blacklisting tries to identify the bad sites, and then block them.

Whitelisting: Whitelisting uses a list of pre-approved sites, and only allows traffic to those sites.

Blacklisting is always out of date as hackers continually create new malicious sites. New malicious sites (by definition) aren’t in any blacklist. The lag between each newly created site and the time it takes to eventually be in a blacklist is the hacker’s window of opportunity. Once that window is closed, the hacker just creates a new site (and thereby a new window). The ease in which blacklisting is bypassed is stunning.

Whitelisting only allows traffic to flow to pre-approved sites. Therefore, newly created sites aren’t even an issue (since the newly created sites are in the pre-approved list). Hackers can literally create millions of new sites and it doesn’t matter to whitelisting one single bit. Since none of those millions of sites are in the whitelist, they’re blocked.

Traditional Whitelisting Problems

With whitelisting being so much more secure, why hasn’t it been more widely used — especially with the tremendous increase in hacking attacks? While whitelisting is effective, it used to be impractical to use:

Too Difficult to Setup: Traditional whitelisting required knowing every conceivable good site in advance; making it extremely difficult (if not impossible) to setup.

Too Restrictive on Browsing Traffic: Traditional whitelisting often interfered with users being able to go to the sites they want, and it often breaks webpages by inadvertently blocking links needed to generate the webpages.

Too Cumbersome to Maintain: Maintaining the list of approved sites on an ongoing basis proved impractical for most use cases.

These three issues have long prevented widespread adoption of whitelisting in security programs.

Patented Solution

Terra Privacy LLC has just unveiled a new invention that finally solves all three problems with traditional whitelisting. Hacker Deterrent Pro uses a new form of whitelisting which is:

Easy to Setup: Hacker Deterrent Pro’s patented method enables you to setup your initial master whitelist in less than ten minutes. Then you are done.

Easy for Browsing the Internet: Hacker Deterrent Pro also has a patent-pending technology that automatically updates your browser whitelist on-the-fly, in real-time, as you surf the net. This technology literally does all the work for you automatically.

Easy to Maintain Your core whitelist only needs to be updated each time you use new software or install a new browser plugin. Hacker Deterrent Pro’s patented method allows you to update the whitelist with a single click of the mouse. Maintenance is almost effortless.

If you want to keep your digital life out of hackers’ hands, you can finally take control with Hacker Deterrent Pro.

Transparent Traffic Control

Hacker Deterrent Pro also includes another patented security method in addition to its unique whitelisting approach. This security method involves Transparent Traffic Control. Unlike security systems that run silently in the background, Transparent Traffic Control continually displays in the foreground the actual names of all who want to communicate with your computer. This closes the door on a critical security hole in other security systems.

Here’s a very important question: If a security system runs silently in the background, how do you know when a hacker has tampered with it? Answer: You don’t know. And hackers routinely use this fact to their advantage.

Transparent Traffic Control always shows the names of all who want to communicate with your computer. There aren’t any settings to disable or filter this display. Therefore, there’s no way for a hacker to configure it to secretly allow traffic to their servers. Even if a person physically adds the hacker’s server to the whitelist, Transparent Traffic Control would show the connection so that you can permanently shut it down with a single click of the mouse. With Transparent Traffic Control (TTC) Security, hackers have no where to hide.

Product Roadmap

Hacker Deterrent Pro is the brainchild of Michael Wood — a world-renowned cryptographer and internet-communications expert. During retirement, he was plagued with hackers accessing and controlling his home computers.

Michael was surprised to find that there wasn’t any security product to allow him see the names of all who were accessing his computer so he could choose (in real-time) who to allow and who to block. Therefore, he sat down and wrote computer code to enable him to do this. Once done, he was able to see and block those had been controlling his computer. In that moment, Transparent Traffic Control was born.

Realizing that many others need the same protection, he came out of retirement to develop a commercial version of Transparent Traffic Control (TTC). This first product was called TTC NetSwitch.

TTC NetSwitch was highly effective. But it still required technical expertise to use. Therefore, Michael sought to invent an easier way for everyone to take control over who their computers talk to.

This mission resulted in the invention of Name-Based Whitelisting. Instead of merely showing the names of apps that want to access the internet, the new technology also shows the name of the app’s maker (e.g. “Microsoft Corp.”) and it shows the name of the owner of the internet destination (e.g. “Microsoft Corp.”). Now it’s finally easy to know which app traffic to allow and which app traffic to block. (In general, if the name of the app’s maker and the name of owner of the destination are the same then the traffic is safe to allow.)

If all your apps are solely talking to their makers then none of your apps are talking to hacker command and control servers. Incredibly simple. Incredibly secure. The combination of Name-Based Whitelisting and Transparent Traffic Control was the foundation of Terra Privacy LLC’s next product: Hacker Deterrent.

Hacker Deterrent’s novel whitelisting method made it easy to block app-injected trojans from connecting to hacker command and control servers. However, for ultimate protection, browsers needed to be protected by whitelisting too. Yet protecting browsers via whitelisting was one of the most difficult challenges in the cybersecurity industry.

Fortunately, Michael invented an ingenious solution to this seemingly intractable problem: a dynamically-generated whitelist that automatically creates itself from scratch, on-the-fly, in real-time while you surf the net. This fully automatic whitelist method was called Transient Whitelisting.

Michael committed to protecting all internet traffic through whitelisting: browser traffic, app traffic, and operating system traffic. He achieved this through Transient Whitelisting (for browsers), Name-Based Whitelisting (for apps), and Triple-DNS Whitelisting (for the operating system). This 100% whitelisting security is the impetus for Hacker Deterrent Pro.

TTC NetSwitch Hacker Deterrent Hacker Deterrent Pro
Transparent Traffic Control
Name-Based Whitelisting
Transient Whitelisting
Triple-DNS Whitelisting

Ultimate Protection

Whitelisting provides the ultimate protection against hackers. Now, thanks to Hacker Deterrent Pro, you can finally have 100% whitelisting security for all your internet traffic. Hacker Deterrent’s patented and patent-pending technologies protect you in ways that no other security system can.

Unique Protection

Click on any hacking attack below to see how Hacker Deterrent Pro protects you in ways that antivirus and firewalls do not:


Select news coverage of Terra Privacy LLC:

Beta News — May 26, 2017

Security Week — May 25, 2017

PC Tech Magazine — March 10, 2016


Inventor’s Biography

Internationally Renowned Cryptographer: Michael Wood is the inventor of the acclaimed REDOC-II encryption system (US Patent 5003596). The historic strength of Michael’s encryption was first attested by Dr. Thomas Cusick (who published 60 papers in the field of cryptography and 8 PhD students whose thesis work was in this area). Dr. Cusick’s conclusions were subsequently confirmed by Drs. Eli Biham and Adi Shamir, the two cryptographers famed for breaking the United State’s government’s national encryption standard. Michael’s Redoc encryption methods are currently taught in the cryptography textbook Applied Cryptography by Bruce Schneier.

Internet-Communications Expert: Michael Wood is also the inventor of an artificial-intelligent system for mapping network topologies — a core component of managing internet traffic (US Patent 6405248). This technology was sold to Micromuse for $42 million for incorporation into the NetCool product line; which was subsequently sold to IBM for $865 million.




“I have been in the industry for 23 years and this is by far the best addition to my arsenal of tools for dealing with unacceptable network traffic. I think a dynamic white-list is a good solution.” — Timothy Gallardo

“I’ve had this for a week now, I’m very pleased with the tool…. Overall it appears to do what is says it does!” — Enoxh Eloe

“This is amazing! Thank you!” — Therial Rial

More testimonials here.


#1 Hacking Method of 2016

The Verizon Data Breach Report for 2016 is out. So what was the number one hacking method of 2016? And how can you protect yourself from it? Find out here.


Viruses vs. Trojans

Which are more common: viruses or trojans? The answer might surprise you. Find out here.


New Trojan Records Everything

T9000 Trojan records every video, audio, chat message, Microsoft Word document, Excel spreadsheet, Powerpoint presentation, and more. Meanwhile, it’s undetectable to popular anti-malware, including: Norton, McAfee, Bitdefender, and Kaspersky.

Can Hacker Deterrent stop sophisticated trojans like T9000? Find out here.


Hacker’s Dirty Little Secret

The cybersecurity industry has a dirty little secret that hackers don’t want you to know. What’s the secret? Find out here.


Key To It All

When it comes to defeating trojans, there’s one key to it all: Command and Control Centers (aka C & C Centers, or C2 Centers). C2 Centers are the very heart of the hacker’s operation. Copies of the files you read, the keystrokes you type, the videos you watch, etc. are all packaged and sent to the hacker’s C2 Center. Also, when a hacker wants to control your computer, such as uploading a file, he does so through the C2 Center as well.

Even though C2 Centers are the very heart of the hacker’s operation, half of the security experts at large companies aren’t familiar with them. This lack of knowledge results in tragic consequences. For the golden key to stopping hackers is to sever their malware’s connection to the C2 Center. The moment you do so, the hacker’s entire operation falls apart. More info here.


Shockingly Easy To Break Windows 10 Encryption

What if the supposedly secure Bitlocker encryption on Windows 10 could be completely undone simply by pressing two keys? It’s actually that shockingly easy, provided you know which two keys to press and when. More info here.


Email Security and Privacy

Two recent Yahoo incidents raise serious concerns over email security and privacy:

  • Over 500 million Yahoo email accounts were recently hacked. (NBC News)
  • The US Govt installed a “” backdoor into Yahoo email servers. (The Intercept)

With the major email providers offering little security and even less privacy, what can you do to take email security and privacy back into your own hands? Find out here.