QUANTUM QUOTIENT
Code know : not personal. How know : individual.
THE BASIC PRINCIPLES OF DIFFER
Differ : authentic differentiation instead of identification.
100% IT security : anything less is acceptable when it comes to our values?
Security Profile Protection Profile. (Common Criteria)
Limes-IT : no fixed ID-data, no recorded procedure required.
LimIT : the attack is limited and eliminated from the outset.
Subject-center : the Differ-User itself is the code, password.
Differentiate thyself! Know thyself : Γνῶθι σεαυτόν! (Delphoi)
Total Intelligence : for quantum resistance and instead of AI.
Base-0 numeral system : this is the basis of logic. Base-2 is the basis of computing.
Everything is possible in the 0-dimension πάντα δυνατὰ (MRK9:23,10:27)
Pseudo-Input : a button press or mouse click is not data entry, but rather a confirmation of real-time presence.
ID-GUI : Information for Authorised Insider / Disinformation for Attackers Outsider.
Metacommunication : IT resources are only tools just media.
No man ever steps into the same river once.
Δὶς ἐς τὸν αὐτὸν ποταμὸν οὐκ ἂν ἐμβαίης (Herakleitos) , inertial frame (Einstein)
DIFFER IN PRACTICE
Mutual initiation, initialisation
When the User is authorised, they become a so-called Differ-User in an environment isolated by the Differ ACM Module.
Differ-User and Differ-Module create a unique meta-communication protocol.
It’s not personal confidential data (passwords, codes, etc.) that are being recorded, but rather an information flow agreement is.
Info-Unit : Differ-User recognises the data substitute objects, the Info-Unit (aptly: data-in-form).
Differ-User can choose from the options or generate a new Info-Unit.
Limes-IT functions : Differ-User learns to recognise the Info-Unit on the GUI.
This is also a method of limiting the attack potential (LimIT)..
Determinants : requirements arising from ad hoc events that must be fulfilled in a later differ phase.
Due to the delayed and random role, the Attacker's sampling is limited (eliminated)..
Navigation : Differ-User megismeri, hogy miként irányíthatja, befolyásolhatja a differációt.
These data entry forms are no different from other input operations.
Communication protocol : a set of agreed rules for signalling, confirmation and information.
appearance does not differ from other output signals or image noise.
Subject calibration : Application of signs, images, icons, etc. associated with the Differ-User on the GUI.
For the attacker, this is disinformation, misinformation, and the essence evaporates (sublimates/”sublimITs”).
Other options depending on the expected special security requirements and product development:
Pre-authentication procedure instead of non-variable identification (data-type, user name).
Multi-step authentication, door handle function, foolproof measures...
A tutorial programme is available to Differ Users for training and practice.
The Differ Access Control Management (ACM) process
A differentiation process (in the basic case) has the following phases:
The figure doesn't reveal much about the essence of the process, does it? Well, that's good news.
The goal is to prevent outsiders from gaining insight into the process, through knowledge of I/O data and the process
An initiated Differ User sees more on the ID-GUI than an attacker, who sees no pattern for penetration
Is data entry visible? Public?! Of course. There is no password entry, but real-time relevant communication.
Differ-Users understand what the change is, where the process is at, and can even control the flow..
Differ-ACM mixes signals into the image noise on the ID-GUI, thereby informing Differ-User and misinforming the Attacker.
However, Differ-User can override ACM because it is differentiated, and it can even commit mistakes because it is different in this respect, as well.
ID-GUI PERFORMANCES
BASIC MODEL : information, disinformation, misinformation
COMPLEX MODEL : disinformation scissors
CHAOTIC DISPLAY : misinformation scissors
SUBJECT-CENTRALIZED DISPLAY : privat scissors
NORMAL VERSION
AD HOC VERSION (unusual, unexpected GUI modification for test)
TOTAL PLAN & PREMIER PLAN VIEW
SEPARETED I/O (independent input)
Possible applications
Truly individual Identification (IT, ITC)
Absolute Authentification (IT, ITC, Encryption)
Encryption (Subject-centralized), Cloud technology
Access to assets (wall safe, tresor, safety vault...)
Acces to object (car, phone/tablet, installation...)
Term access control (building, office, smart home...)
Geographical access (police, migration management...)
Military (own weapon, armoury, tactical object access...)
Cyberwarfare
Research and development of Total Intelligence