We need to focus on the key paragraph today that h
Post# of 82672
From today's 10Q : "The Company’s ability to continue as a going concern is dependent upon its ability to continue to implement its business plan. Currently, management is attempting to increase revenues by redirecting its sales focus from direct sales to domestic and international sales channels, primarily selling through a channel of distributors, value added re-sellers, strategic partners and original equipment manufacturers . While the Company believes in the viability of its strategy to increase revenues"
As a mentioned on Monday, the below link is directly from what we believe is SFOR's main Channel partner ACS' (Advanced Cyber Security) website. ACS (which is using Strikeforce' technology) is integrated in to Intel's Trusted Platform Module AND chip!!! Keystroke technology is NOW INTEGRATED into Intel's Module's and Chips. WOW !!
https://docs.wixstatic.com/ugd/5870e3_af261a2...07e37f.pdf
Here is a link to the full article and I put the key paragraph here:
KTLS™ (Keystroke Transport Layer Security) protocol is currently
integrated in to Intel’s TPM for
enterprise endpoint desktop
deployments. If Intel (or other)
TPM is available for mobile
devices KTLS™ protocol can be
deployed .
If a TPM (Trusted Platform Module) chip is available for access to the KTLS™ system components, the Session Key is encrypted/decrypted by a TPM Master Key Pair (RSA 2048 public key cryptosystem), which resides on the TPM chip (and never leaves it ) .
• The encrypted Session Key is stored in secure memory shared by all KTLS™
system components. The TPM Master Key Pair is generated by the TPM chip
every time the computer is powered up. This can be accessed via the NULL
hierarchy.
• If a TPM chip is not available for access to the KTLS™ system components, the
Session Key is encrypted/decrypted by a Storage Master Key (AES 256 Key)
comprised of a combination of a hard coded part and a randomly generated part.
Introduction to ACS Keystroke Transport Layer Security™ (KTLS™)