ShofarPortfolio™
ShofarPortfolio™ ● Secure Communications Service
ShofarPortfolio™ ● Secure Communications Service
ShofarPortfolio™ ● Secure Communications Service

Cancel

ShofarPortfolio™ ● Secure Communications Service

Complete

ShofarPortfolio™ ● Secure Communications Service

Contact

ShofarPortfolio™ ● Secure Communications Service

Costs

ShofarPortfolio™ ● Secure Communications Service

Download

ShofarPortfolio™ ● Secure Communications Service

Error

ShofarPortfolio™ ● Secure Communications Service

Green level

ShofarPortfolio™ ● Secure Communications Service

Levels of security

ShofarPortfolio™ ● Secure Communications Service

Who is monitoring

ShofarPortfolio™ ● Secure Communications Service

Payment

ShofarPortfolio™ ● Secure Communications Service

Prices

ShofarPortfolio™ ● Secure Communications Service

Service Providers

ShofarPortfolio™ ● Secure Communications Service

Red level

ShofarPortfolio™ ● Secure Communications Service

Shop

ShofarPortfolio™ ● Secure Communications Service

Sign Up!

ShofarPortfolio™ ● Secure Communications Service

Project Status

ShofarPortfolio™ ● Secure Communications Service

Email Server takedown

ShofarPortfolio™ ● Secure Communications Service

Technology

ShofarPortfolio™ ● Secure Communications Service

Thank You ● You now have an account

ShofarPortfolio™ ● Secure Communications Service

Traffic Analysis

ShofarPortfolio™ ● Secure Communications Service

Where occurs

ShofarPortfolio™ ● Secure Communications Service

Yellow level

ShofarPortfolio™ ● Secure Communications Service

Your Stuff

 

Second only to the cellphone, the internet is a remarkable tool that is used by many parties to monitor and influence you in some of the minutest details in your life. Tools exist to allow computers to examine the subtle details of your life and find areas of interest. What seems like a token detail is just another bit of information that when gathered with the massive amount of data on you, your family, your community and the world, can be used to influence and control your life.

You are being monitored

Typical email makes a perilous journey from the sender to the recipient.  The vast majority of all email passes though servers and network equipment designed to monitor the contents of each email.  This monitoring is being done by government agencies, corporations, criminals, religious organizations, and others.

Even when you feel safe because you have a secure (https) connection and a green address bar in your browser, you are only safe from some types of monitoring between you and the server.  You may still be handing your email to a server that is reading it in its entirety.

Our services are based on .ShofarPortfolio  ShofarPortfolio relies on numerous family-owned businesses to provide service to clients.  There is no “weakest link” to corrupt or bring the systems down.  You are invited to examine what happens to email, what services are offered, and how you can become a ShofarPortfolio user.

 ● Who is monitoring you and why

 ● Where monitoring occurs

 ● What we do to secure your communications

    o Levels of security

    ●  Red level: To communicate with everyone else

    ● Yellow level: To communicate from any browser

    ● Green level: When no one needs to know you what you are doing

    o Traffic Analysis

    o Email Server takedown

    o “We Don’t Know Your Stuff™”

 ● ShofarPortfolio™ Service Providers

 ● What does it cost?

 ● ShofarPortfolio™ ● Project Status

 ● ● ● ● ●

I’m convinced, sign me up!

 ● ● ● ● ●

ShofarPortfolio™ ● ShofarPortfolio.Own
ShofarPortfolio™
NSA ● CotttonMouth
NSA ● CotttonMouthThe COTTONMOUTH device was published in NSA’s January 8, 2007 ANT Product Data catalog. It provides “covert communications” to computers of High Value Targets.