Developing a new security method for OFFLINE data backup, based on the concept that “You Cant Hit What You Cant See”
Data Backups are a great way to store all of your data in a safe and secure location. Your memories, hard work, and digital life are stored on your backups, and often house irreplaceable items. If you take a moment to think bout whats in your current backup files, how many of these items are acceptable to lose in the event of a virus or ransomware? If the answer is None, this project may give you a much needed edge on your data protection.
There are many methods of Data Backup: Offline Backup, Network-Based Backup, and Online (Cloud) backup. Cloud Backups have integrated security measures already in place to limit the risk of viruses or ransomware, whereas Offline Backups and Network-Based Backups do not. To truly understand, a background of ransomware knowledge is a great place to start.
What is Ransomware? (Information derived from Microsoft)
“There are different types of ransomware. However, all of them will prevent you from using your PC normally, and they will all ask you to do something before you can use your PC.
They can target any PC users, whether it’s a home computer, endpoints in an enterprise network, or servers used by a government agency or healthcare provider.
Ransomware can:
Prevent you from accessing Windows.
Encrypt files so you can’t use them.
Stop certain apps from running (like your web browser).
Ransomware will demand that you pay money (a “ransom”) to get access to your PC or files. We have also seen them make you complete surveys.
There is no guarantee that paying the fine or doing what the ransomware tells you will give access to your PC or files again.”
Ransomware seeks and destroys or encrypts data, leaving it unusable by the owner of the data. This is a form of a digital hostage scenario, with you as the hostage. Lets put a end to this cycle of malicious action!
What can Shadow Disk do for you?
Shadow disk is not a anti-virus or anti-malware program. Shadow Disk is instead designed to be a data backup and recovery program that works in 3 major security methods for you to “Bounce Back” after being hit by malicious software. Using the concept of “You Cant Hit What You Cant See”, Shadow Disk provides 2 layers of concealment, effectively hiding the backups from Windows itself, and allowing Wndows access to it only during a backup or recovery procedure. In addition, the backup itself is encrypted using a AES 256 bit Military-Grade encryption, eliminating the possibility of backup tampering or manipulation. In short, malicious software will have to get through 3 invisible hurdles and a Military-Grade defense in order to get to your backed up data. In addition, a bootable program will be automatically applied to your computer boot-up to allow easy 1-click restore without ever having to look for a USB or disc, or needing a technician.
Why is this different from whats currently offered?
Current programs provide anti-virus and encryption, but no concealment to render your backup files “invisible”. Without knowing that you have a backup file, a malicious program would be unable to determine what to attack. Although anti-virus and anti-ransomware is a prudent and highly recommended item to utilize, protecting your backups can save your data and system from corruption and loss. In addition, the specifics of the program are randomly generated, allowing for a “Rotating Shield Frequency” (Star Trek fans will get it).
What is the Managed Backup / Install?
Our goal is to make this a “Set it and Forget It” program. From installation, through setup, and daily use, you will have access to a support person at any time to assist with your recovery and backup needs. Need help installing? Use the Customer support module integrated into the installer to reach customer support. No phone call, no email, just direct support to a technician that will install and customize it for you on the spot. Want to make sure that your backups are good? A technician will have a regular updated report specifically for your backups. If a backup fails to start, or fails to backup entirely, a technician will reach out to you via email (With a copy of the report) and offer to fix the issue (Often the same day as the failed backup).
How will the funding be utilized?
We aim to build a program that is 100% before launch, leaving very little to update, upgrade, or change in the future. We plan on utilizing systems that are currently existing, such as Team Viewer, to provide backup and customer support services (Such as Managed Backups). These licenses are expensive, however we would rather not “Reinvent the wheel”, and we should utilize time-tested exterior programs for other facets of our program (like customer support). 0% ($0.00)(None) of the funding will be utilized for pay or compensation of person(s) developing this program.
What is the current development status of the program?
Installer: 100% completed, Core script: 100% completed, Customer Support Module: 100% completed, Website: 0% completed, Client Backup Management (Offline): 100% completed, Client Backup Management (Online): 25% completed Testing: 15% , Current consensus of concept based on Core Script: Concept is tested and proven to be operational, with little to no adjustment needed to complete base program.
Risks are always inherent with this type of program, leading primarily in the reality that defensive measures (Anti-Virus and Anti-Ransomware) and malicious software (viruses and ransomware) is a cat and mouse type game. As protection measures advance, so does the complexity of malicious software. At this current time, there are no known viruses (Based on independent research) that can infiltrate our protective measures, however further development will always be needed to combat future threats.