ShofarPortfolio™
ShofarPortfolio™ ● We don’t know Your Stuff™
ShofarPortfolio – Matryoshka Project Status – September 2014

It is not hard to find numerous projects in 2014 market that are reducing the amount of exposure of your communications to monitoring and exploits.  Of all of the projects, we only know of one that hides not only all of your content, but all of the metadata.  Using Matryoshka there is no evidence any communications ever takes place.  This is more than a subtle difference.

Another difference is the business model.  Who can be a provider? Anyone!  What is the advantage of a large corporation over a mom and pop shop? None.

It has been a long road with many stumbles alone the way, but progress continues and we have demonstrated many parts of the technology in a live setting.  While so much is in place, there is still much work to be done and eating remains an issue.

If you want to know more, want to be involved, want to be supportive, please contact us directly at ShofarPortfolio@ShofarNexus.com.  Please be aware, support for compromise is not an option.

Matryoshka Communications model
ShofarPortfolio™ Matryoshka Communications

ShofarPortfolio is based on the Matryoshka Communications model and it is a significant development effort.  An underlying part is ShofarDomain’s rootless domain technology which is available now and we invite your participation.

We are looking for partners in developing the Matryoshka Communications model.  Please contact us to start a dialog.

Do you know?
Do you know how email works? Are you aware how the free email services monitor your activity? Are you aware of the degree your government listens in on your communications? Click on a diagram and find out the details. It may change the way you think about how free you are!
How Email Works

Email

How Free Email is Monitored

Free Email

How Governments Monitor

Government

Email Beacon Monitoring

Email Beacon

We don’t know Your Stuff

Unlike virtually all online services we have no idea what information you are storing on our servers. We use multiple levels of encryption to protect your data from prying eyes, including our own.

We employ technology to circumvent traffic analysis, IP monitoring, or other techniques that invade your privacy. We have NO idea what you are doing. Isn’t that the way you want it?

Numerous parties including hackers, advertisers, corporations, governments, and criminals, monitor email. Whether it is benign or malicious, you don’t need to submit.

One thing that we don’t offer is password recovery. Anyone who offers that service can see your data. We do not know your password and do not have the ability to recover it. This means that we have no way to pry into your data. It also means that if you lose your password, no one can recover your data. You, and you alone, can back up your data on a local machine that your trust its physical security.

ShofarPortfolio™ ● ShofarPortfolio.Own
Latest Blogs
Tue, Jul 2, 2013 ● If God wanted man to be private, He wouldn’t have given him the NSA
Thu, Jun 27, 2013 ● Use the barn not the cloud
Fri, Jun 14, 2013 ● Capturing of Metadata
Sat, Jun 8, 2013 ● Computers are listening to your telephone calls
Latest Videos
Cryptograms in ShofarPortfolio’s Matryoshka Communications

0 Cryptograms

Protecting the who, what, where and when of your communications

0 Who, what, where...

What is Internet surveillance and how to avoid it?

0 Internet surveillance