”The Red Pill” has come to be known as a release from what you think is real. In this age of disinformation, being “Red Pilled” means seeing the true situation. Malicious hackers don’t want you to take The Red Pill and see through their deceptions.
Hackers send phishing emails to get the user to click on a bad link, and that link may spoof an online service or institution getting you to reveal passwords, Identity information, or to download malware.
Inherent in the design of the Internet, is a problem called REPUDIATION, where authentication has no verification, whether claiming to be from your bank, the IRS, a Nigerian refugee, or even family members.
Current Cyber Security depends on perimeter defenses such as a firewall, where a gatekeeper hopes that an account name and password match. The problem is that few gatekeepers keep records when an automated “User” attempts to login hundreds of times with slightly different guessed passwords. This is called a brute force attack.
This is allowed because the gatekeeper to your security does not use Non-Repudiated Identification, authentication where the unique entity can be proven to be who they say they are.
The Internet itself does not use non-repudiation. The internal infrastructure is hidden behind Human readable information of email addresses and domain names which humans can’t verify. Even the presentation of links in email have a human readable form vs a machine readable form.
The Red Pill (R) Security Suite is a family of applications that records cyber incidents, verifies the accuracy of the parties involved and records the information of millions of records collected over 10 years.
records the information of millions of records collected over 10 years
SohoStar’s CidrPress™ tool associates a threat score with individual or ranges of IP addresses. The WhereIsFido™ tool performs domain name services and returns the IP address and THREAT SCORE. The VoirDire™ tool provides a unique Self-Sovereign Identification escrow which directly relates the ID to an individual using Web Of Trust cross verification.