top of page
Search
  • Writer's pictureJerry

Online Convenience vs. Offline Security

Updated: Dec 3, 2021

A more detailed description of our Island Technology for those interested.


Since the beginning of the internet, there has been an age-old struggle between online convenience and offline security. The theory is that there has to be a compromise of one or the other. Since convenience sells, security is typically sacrificed. You don't have to look very hard to find the latest big company data breach that lost the sensitive personal information you trusted them with to realize the consequences of this approach.


There are some pieces of information that should never compromise security, which led us to ask the question:


Why can't we have both convenience and security?


We believed there had to be a way to keep data completely offline, secure, while still being able to use it conveniently online without compromising the stored data. This is known in the electronics world as creating an "air gap". So we created an air gap in our system and then asked, "now, how do we use it?"



Using an island


That question led us to create a middle island in between the connected outside world and the air-gapped data. This island cannot connect to both the outside world and the air-gapped data at the same time or else it would no longer be air-gapped. Therefore, the island can only have one direction of communication. We gave the user physical control over this direction so the direction could not be remotely manipulated by software, which would render the air gap useless.

Leaving a request


The island in its simplest form is an isolated hardware component that can have a request written to it. This means the connected outside world can bombard the island constantly and will never be able to reach the data stored behind the island. When the user decides to use their data, they can allow a request from a trusted source to be passed behind the island by disconnecting the island from the outside world and connecting it to the backend. The request can then be processed and a response can be written back to the island to share with the outside world. The user would then disconnect the island from the backend and reconnect it to the outside world to share the response. When the user disengages with the island the response on the island is erased. The user remains in full control.

There are many different electronic components and arrangements that can implement our Island Technology. It depends on the type of data being stored and what type of request needs to be handled. The required outcome is always the same; the user maintains ultimate control of the island.


 

Are you in an industry that you think would benefit from using our Island Technology? Let us know in the comment section below or contact us directly at info@airpasswallet.com. Remember to subscribe at the top of the page to get the latest news and updates.

19 views0 comments

Recent Posts

See All

Comments


bottom of page