Many friends and associates have asked me to explain CORA in simple terms. While I have done so, rather successfully (in my opinion), it occurred to my wife, that I should produce a simple, post-card size, bulleted summary of CORA for dummies like her, LOL (funny how the most brilliant are OK in joking about being a dummy :) )
CORA Cyber Security Inc delivers CORA, a step beyond encryption, that empowers unbreakable data security. Limited methods of encryption can be broken, as is evidenced through the reports that constantly appear in the media. CORA uses a distributed methodology, however, unlike Block Chains, CORA maintains a centralized control structure allowing for the shutting down of any CORAfied data if a server is compromised. CORA implements the ideal that Claude Shannon defined as 'perfect encryption'.
Monday, 15 February 2016
CORA for dummies
This first post will be a simple one - CORA for dummies (non-techies).
Many friends and associates have asked me to explain CORA in simple terms. While I have done so, rather successfully (in my opinion), it occurred to my wife, that I should produce a simple, post-card size, bulleted summary of CORA for dummies like her, LOL (funny how the most brilliant are OK in joking about being a dummy :) )
Many friends and associates have asked me to explain CORA in simple terms. While I have done so, rather successfully (in my opinion), it occurred to my wife, that I should produce a simple, post-card size, bulleted summary of CORA for dummies like her, LOL (funny how the most brilliant are OK in joking about being a dummy :) )
Labels:
cloud cora,
cora,
data security,
encryption
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment