The D++devices under hagpl

D++devices are external devices used as intimal servers providing local assistance to our daily used devices by dedicating each D++device to one specific task/process, and then combining them, to solve some fundamental vulnerabilities, such as the meltdown and spectre proven to remove the independence of processes in a singular device, a known weakness proven by attacks, such as of the nsoGroup and facebook.

Among others, such D++devices can assist in privacy issues of GDPR as a Client Data Protraction (CDP) solution for (home/moving) workers in small to big organizations and for participants in the hopeisback platform.

In our developent, we are focusing on the advantage of Olimex integration with qt to easily produce different machines per specific tasks, including the Qdolphin with its plug-ins.

d++
  • one D++device intimically serving laptop or phone while having pair of processors: the from-sim-router and the data-locker together with one removable powerbank. This D++device has one sd card and 3-4 usb ports.
    • Its media sd card, also as a communication medium, has
      • 1. the algo to run on the data-locker while using the following:
        • 1.1. locked management files for locking data from the original devices, where these management files can be unlocked only by using
          • 1.1.1 encrypoted4device management files to be unlock only by specific pub key of that device while using the Diffie-Hellman Forward Secrecy protocol.
        • 1.2. The algo, as it is used in qdolphin, cuts input files and lock each piece with contextual kdf2 kilobit key by the threefish in ctr mode algo, such that each piece is locked by unique strong key which is indexed in the management files according to arguments such as salt and those which are known to the user, such as the url of the file and its password and also with the landing urls with expiration time.
        • 1.3. events:
          • 1.3.1. When the sd is inserted, the device unlock the key and remove that key from the sd and
          • 1.3.2. the ram is cleared before when both: the sd is ejected and the original device are disconnected and hence the data on the sd is locked when it is not inserted.
          • 1.3.3. when new data is added and that is to processes in additional device (like laptop) for that device the additional data is encrypted.
The berliner ug500 D++devices is now intended to be structured  -
  • Ownership: Its owner until the end of the initial round has the intention of selling that ownership to ScomCom, named here S0 and being a nonGerman (British?) limited company, of which
    •  d (if not redefined by its equal owners) equals 0.8;
    • Seed-Market-Value is EUR2.5M (1% per EUR25K), where
      • the maximal offer in this seed round is only EUR100k and
      • its shares might also be formed by convertible bonds, but only after their owner comply with the rules derived from the comcomized agreement; and where
    • S0 is committed also to become in the year 2020 the founder owner of the (Irish?) "publisher house platform of the creative class" owned only by Scomcoms, each of which equal owners are inventors, developers, artists and/or founders, while the non equal ones are investors/producers.
  • Market worth: d++devices positioned in CDP for the GDPR implementation, aims creating new huge market, while its penetration is gradual, since it introduces new type of use and devices - the ones which only assist, but not replace, other devices, while in itself keep isolating tasks per device and os, to avoid issues such as of the meltdown.
    • To understand the measurement of such market, we take in account the market impacted from GDPR. Here are some insights: "The GDPR services market is expected to grow from USD 907.4 million in 2018 to USD 2,659.4 million by 2023, at a Compound Annual Growth Rate (CAGR) of 24.0% during the forecast period." More: 1 2 3 4.
eu law enforcement officials say (IM-RAT): "We now live in a world where, for just US$25, a cybercriminal halfway across the world can, with just a click of the mouse, access your personal details or photographs of loved ones or even spy on you," says Steven Wilson, Head of Europol's European Cybercrime Centre (EC3)."
Subject: