1 of 5

Slide Notes

DownloadGo Live

DAM

Published on Feb 03, 2016

No Description

PRESENTATION OUTLINE

DAM

Drone Airspace Management
Photo by jacilluch

Securing Mobility Problems

  • There are a myriad of technologies needing varying levels of security
  • DAM is focused on securing UAS communication scenarious
  • DAM is building applications powered by Castle patented encryption technology
  • DAM is focused on securing UAS communication scenarios

Why Castle Crypto?

  • It has been vigorously audited by a team with deep Web and crypto expertise
  • Runs on desktop, laptop and mobile
  • Anonymous and ephemeral (no signup/accounts)
  • Post-quantum end-to-end encrypted text, photos, and file transfers
  • End-to-end encrypted (non-post-quantum)

Castle (cont'd)

  • Castle enhances OTR's cryptographic protocol
  • Castle re-purposes each random out-of-band shared secret as a symmetric key
  • The result is Castle is “strong, robust and easy to use" communication application providing “security from a broad range of cryptographic attacks"

MitM Prevetion