we're here to help
Frequently Asked Questions
HyperSphere's innovative approach to quantum computing as a method of protecting your data means we're often asked questions about the program and how it works. If we don't answer your question here, feel free to contact us for more information.
Q: Does Vault include a cryptocurrency wallet?
A: No. Hypersphere® Technologies, Inc., including Vault, does not provide or maintain a cryptocurrency wallet of any type. Vault provides protection for existing cryptocurrency credentials.
Q: What is Shadowing?
A: Shadowing is a patented secret sharing technology that permits protection of any data, for example a password, pass phrase, or other data. “Shadows” of the data are created, the original data can be destroyed, and then when needed the data can be revived when needed from a defined number of Shadows (2, 3, or 4).
Q: Isn’t Shadowing just another form of Encryption?
A: No. Encryption just shows the same data in another format. It is vulnerable to most computers and especially the new Quantum Computers. Shadowing creates shadows of the data using our Patented Shadowing Technology then destroys the data. The data can only be recreated when the required number of Shadows come together. Since the original data is destroyed, there is nothing to steal.
Q: What is Encryption?
A: Encryption is simply the process of converting text and/or data into an unreadable format of the text and/or data using an encryption Key. The original text and/or data still exists and is vulnerable to hacking once the hacker has the Key. Modern computers such as Quantum computers make decoding the Key quick and simple.
Q: Where are my Shadows stored?
A: One Shadow is stored by the owner at a place they choose. Another Shadow is stored by HyperSphere. In the case of 3 Shadows being created, the third shadow is stored at another safe place chosen by the Owner. No two shadows should be stored in the same place. HyperSphere stores only one Shadow so it is impossible for HyperSphere to recreate the data without Owner participation.
Q: How does this relate to a Cryptocurrency wallet?
A: Your password, pass phrase, or other related data can be revived to ensure your ability to access your cryptocurrency wallet. You will not become a statistic of someone who has lost access to their cryptocurrency, which sadly has happened to about 20% of the people who own cryptocurrencies.
Q: Why does this matter?
A: Using old technologies, access to cryptocurrencies and/or other data can be lost, hacked, or stolen. Shadowing provides a defense against these threats.
Q: Can I upgrade or downgrade my subscription?
A: Yes. Subscriptions can be modified by the User on-line by opening their account and following the instructions.
Q: What benefit do I get with a yearly plan vs a monthly plan?
A: With the yearly plan you receive one (check this) month free.
Q: How do I cancel my subscription?
A: Subscriptions can be canceled by the User on-line by opening their account and following the instructions.
Q: What is a block chain?
A: Block chain is a method of keeping a record of transactions made in cryptocurrency that is kept across several computers that are linked in a peer-to-peer network. In peer-to-peer networks, each computer is capable of acting as a server for the others allowing access to files among computers without a central server.
Q: What does quantum mean?
A: There is no simple definition of “quantum” as related to computers. Wikipedia has the following definition: In physics, a quantum (plural quanta) is the minimum amount of any physical entity (physical property) involved in an interaction. The term has been applied to a new design of computers operating at extremely low temperatures and extremely high speed.
Q: What is a “White Paper”?
A: A white paper is a guide that informs the reader about complex issues in terms that helps the reader understand the subject being discussed.
Relationship to Current Technologies
Q: Does Shadowing work with current encryption technologies?
A: Yes – Shadowing can leverage existing cryptographic algorithms – ECC, RSA, and AES.
Q: Using patented Shadowing, is compromise and exfiltration of data possible?
A: If insufficient Shadows are accessible, comprise and exfiltration of protected data is not possible even using quantum computing. This can be and in fact has been mathematically proven.
Q: Can anyone else guarantee this level of security?
A: No. Inferior solutions created before Shadowing are based on Shamir’s Shared Secret polynomial based concepts. These solutions permit exfiltration of data even if less than M parts of their “shared secret” is accessible. This weakness of the competing solutions has been validated in academia.
Q: How will Shadowing will scale in an Enterprise deployment?
A: Unlike data splitting solutions created before Shadowing, some of which are being sold today by companies such as Dyadic and have been purchased by Intuit, we do not need cipher text to be exchanged or passed around to (M) of the devices before decryption can happen.
In competing technologies – passing of cipher text information across devices and machines – not to mention multiple cloud providers – limits performance of business-critical application servers and the scheme cannot be used for any high-volume application.
Also, Shadows can be regenerated and/or revoked without having to re-encrypt the payload. The business implications are significant.
Q: How much processing power does it take to run Shadowing (Core Code)?
A: Very little – in fact that’s one real differentiator between the Shadowing algorithm and all others before it.
For example – Shamir based algorithms are slow and not cryptographically secure. Shadowing performance is very fast and scalable to high volume applications. We have demonstrated this using functioning code on a laptop computer, for example via a WebEx. Often – we generate hundreds of thousands of calculations in a demonstration using an IBM laptop with a core i7 chipset from Intel.
Q: What is quantum cryptography?
A: Quantum cryptography leverages quantum computing to process information in a radical new way. Applications include factoring large numbers. The ability to factor a large number would render most current cryptographic solutions obsolete.
Q: Is Shadowing immune to quantum cryptography?