sliver
Our Work

Armor Graph is our flagship software product. It was designed with the sole purpose of defending communication between two parties. It works to protect intellectual property and privacy.
  • Decentralized communication
  • Host your own Message Router
  • No information is ever stored in the cloud
  • Every conversation has a unique password
  • Every message gets a new encryption key
  • Transfer unlimited size files

HOW IT WORKS

MESSAGE ROUTER


Our system works in two parts. The first is the Message Router. This software lives on a server with an accessible IP address. The Armor Graph connects to the Message Router but there is no login and no information is ever stored here. Like a network router, it takes messages in and sends them along. If the recipient of the message isn’t connected, the message is just dropped from memory.

The more independent users set up their own Message Router, the more decentralized the system becomes. The Message Router will always be free.

This decentralization is the one of they ways we are different. We are bucking the trends of data mining to defend your information.

Client


Armor Graph is the client application and where all the security measures are contained. Every message sent gets a new encryption key using AES256 with GCM block mode. Armor Graph can connect or disconnect from one or many Message Routers. This is the “decentralized” part.

By replacing logins and PKIs with a password for every conversation is another way we are different.

CLIENT SOFTWARE



Armor Graph is the client application and where all the security measures are contained. First you enter your set up information. Then you add a contact. Their information is simply what Message Router they are using and an agreed upon password. When you are both online and one of you clicks the handshake button, a new set of base encryption keys are generated and it is blended with your password avoiding a Man in the Middle attack. From there each message sent gets a new AES256 encryption key avoiding a replay attack. Each message is has a Hash signature because we use GCM block mode. If the message is altered transit, the hash won’t match and the message is throw away. If it fails to decrypt, the message is thrown away.

The designed is to be decentralized to any client can connected to one or more Message Routers. (that’s where the graph comes in). Armor Graph can connect and disconnect from any Message Router at any time.

By replacing logins and PKIs with a password for every conversation and new encryption key for each message, is another way we are different. Logins can be brute forced attacked. Private / Public key pairs depend on you trusting the provider of the public key. If given the wrong key, you could be subject to a Man in the Middle attck.

Screen Shot

MESSAGE ROUTER


Message Router Software


The Message Router software lives on a server with an accessible IP address. You can download and install it anywhere you'd like. It run on a server with a private or public address, whichever meets your needs. The Armor Graph connects to the Message Router but there is no login and no information is ever stored here. Like a network router, it takes messages in and sends them along, but never stores anything. If the recipient of the message isn’t connected, the message is just dropped from memory. Anyone can set up a Message Router at any location they see fit. This is the "Decentralized" part of the system

NOT US


"What all these data breaches are teaching us is that data is a toxic asset and saving it is dangerous.
...
Saving it [data] is dangerous because it's hard for companies to secure. For a lot of reasons, computer and network security is very difficult. Attackers have an inherent advantage over defenders, and a sufficiently skilled, funded and motivated attacker will always get in."

- Bruce Schneier
Our goal is to have as thousands Message Routers setup and none of them within our control. The more parts of a system that are in your control and not that of third party, they better your security will be.

Top