SlideShare a Scribd company logo
Global-WAN®
Swiss Data Haven
The Neutral Global Network
Built on Post-Quantum Security
for “The Internet of Things”
global-wan.ch
This document is aimed at helping people to understand the Global-WAN technology. Further
information regarding the internals of TWD Industries AG's technology are available under a
proper NDA, to selected partners.
2 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
3 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
4 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
5 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
6 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
7 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
8 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
9 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
10 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
11 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network.
12 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
The Problem
“Nations have no friends,
only interests”
John Kornblum
US Ambassador in Germany (2014)
13 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
US Vendors' Dilemma
“How do you protect
what you want to exploit?”
Scott Charney,
VP Trustworthy Computing, Microsoft
14 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
US Strategists' Dilemma
“The Internet is the most transformative
innovation since Gutenberg and the printing
press, yet we're treating it as a war zone.”
Jason Healey
The Atlantic Council (US think-tank)
15 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
The Solution
“To restore trust, there's no substitute to
offering the real thing:
forever unbreakable trusted security.”
TWD Industries AG, 2007
16 | Copyright © 2014, TWD Industries AG. All rights reserved.
Global-WAN
Global-WAN
Purpose & Distinctive Value
Unique, By-Design
17 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
“Securing Phone, Fax, Radio, Video Conferencing,
Web applications, unified communications, etc.
with Forever-Unbreakable Trusted Encryption”.
For * Individuals (consulting, politics, lawyers)
* Enterprises (board, partners, R&D, branch)
* Governments (Army, Police, energy grid,
embassies, trading, etc.).
18 | Copyright © 2014 TWD Industries AG. All rights reserved.
PURPOSE
Global-WAN
19 | Copyright © 2014 TWD Industries AG. All rights reserved.
EASE OF USE
20 | Copyright © 2014 TWD Industries AG. All rights reserved.
Plug & Play and:
- Compatible with all HARDWARE
- Compatible with all SOFTWARE
- Compatible with all Operating Systems
(IBM, ORACLE, Apple, Microsoft, Linux...)
Global-WAN
Global-WAN
21 | Copyright © 2014 TWD Industries AG. All rights reserved.
FOREVER SAFE
22 | Copyright © 2014 TWD Industries AG. All rights reserved.
Security designed to last:
- Proven as unbreakable forever (post-quantum)
- Hides communication endpoints (where, who)
- Hides application and user metadata
Complete security: no “what, who, when, where”.
Global-WAN
Global-WAN
Business Development
Investment Opportunities
23 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
To accelerate its Development,
TWD Industries AG invites
International Investors
24 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
“With the right acts of digital sabotage,
attack aircraft will be grounded,
infrastructure disrupted and
communications severed, reducing the
enemy to a state of raging, pre-modern
impotence.”
The Economist
25 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
26 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
“There's a market failure in cyber-security,
made worse by the trouble firms have in
getting reliable information about the
threats they face.”
The Economist, “Vulnerabilities - Zero-day
game - Wielding a controversial cyber-weapon.”
27 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
28 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
“To avoid lurid headlines about car
crashing, insulin overdoses and houses
burning, tech firms will surely have to
embrace higher [security] standards.”
The Economist
"The Internet of things (to be hacked)"
29 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
30 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
INVEST GLOBALLY
In Emerging Markets and Established Markets:
● USA (“the NSA has destroyed trust”)
● EUROPE (badly needs resilience, growth)
● AFRICA (new infrastructure, sovereignty)
● ASIA (needs to foster independence)
● LATIN-AMERICA (won't trust the USA)
31 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
INVEST IN NATIONS
Securing the CRITICAL INFRASTRUCTURE:
● Security (Army, Police, Finance, etc.)
● Assets (Water Supply, Airports, etc.)
● Energy (Pipelines, Nuclear Plants, etc.)
● Networks (Internet, GSM, 3G/4G, etc.)
● E-Admin (e-Votes, e-Medical, e-Fiscal)
32 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
INVEST IN PATENTS
Let Global-WAN
licence its
patents and
micro-chips
to secure all
these devices.
33 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
Architecture & Components
Designed From Scratch
(can't trust existing products)
34 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
SOFTWARE COMPONENTS
G-WAN: A Server That Can be Trusted
Designed To Build A Secure Platform:
● Less Code, Less Bugs, Higher Efficiency
● New Technologies (Parsing, Memory, etc.)
● No Vulnerability Found Since 2009 Launch
Needed a Safe Server to release Secure Services.
35 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
Lorenz-Waterwheel
Designed to Scale
From [1-∞] CPU Cores.
Lock-Free, Wait-Free,
Multi-Threaded and
Event-Based.
36 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
Connections
MULTICORE SCALABILITY
37 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
MULTICORE SCALABILITY
UBIQUITOUS PLATFORM
G-WAN: Lightweight (200 KB) App. Server
Designed To Run Everywhere:
● Smartphones (Low-Consumption, Low-Latency)
● Embedded (Control At The Lowest Level)
● Servers (Web, SaaS, PaaS, Clouds)
With Scripts In 17 Programming Languages:
(asm, C/C++, C#, Java, Scala, Go, Javascript, Lua, Perl...)
38 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
VERSATILE PLATFORM
G-WAN: An Universal Stack
Open to Third-Parties:
● Applications (C/C++, C#, Java, Obj-C, Perl)
● Middleware (HTTP/S, asynchronous scripts)
● Database (Key-Value, SQLite, ORACLE)
● Infrastructure (DNS, Email, Proxy, VPN, etc.)
39 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
ZERO CONFIGURATION
G-WAN: An Unobstrusive Stack
Why Configuration Files Are Bad:
● Confusing, User Errors, Buggy, Version Incompatibilities
● Mostly Redundant with existing File System Information
● Inadequate: Adaptive Options Are Much Safer / Efficient
Safer, Faster, Simpler, No User Lock-In, No Planned
Obsolescence, Able to Run on Unattended Systems.
40 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
ORACLE OPEN-WORLD
41 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
ORACLE OPEN-WORLD
42 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
Making The Impossible Become Routine
●
G-WAN Accelerating ORACLE NoSQL
●
In A Social Gaming Demo Of 100 Millions Bots
●
All Moving In Real-Time (Heading, Speed, etc.)
●
Queried by 45,000 Persons Joining The Game
●
And Achieving A Whooping 1.2 Billion of TPS
●
...On A Mere 6-Core Desktop Machine!
The Global-WAN Project
Development
Schedule
43 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
44 | Copyright © 2014 TWD Industries AG. All rights reserved.
Reaching The Harvesting Phase
3 years 2 years 5 plus years
 Integration still dominating
 Exploitation gains speed
 Consolidation of
development processes is
key
 Minimize team churn and
grow it only slowly
 Focus on integration
 Only very few clients
 Gain experience in
automation
 Build a strong team
 Integration becomes less
important
 Exploitation takes lead and
grows significantly
 Quality becomes key topic
 Long term employees
perform best
Information
Integration
Information
Exploitation
1) Ramp-up phase,
2008
2) Consolidation
phase
3) Harvesting
phase, 2014
Global-WAN
Productivity Standards
Favourably Comparing With The Next Best:
45 | Copyright © 2014 TWD Industries AG. All rights reserved.
Server Birth Files Blank Comment Code Total
Nginx 2002 256 35,131 4,308 94,369 133,808
G-WAN 2009 171 11,198 42,706 56,766 110,670
G-WAN was written in less than half the time, and offers many
more features in half the code of Nginx. Further, G-WAN's source
code has 10x more comments than Nginx's code.
Source Code
Lines
Global-WAN
Why TrustLeap?
The Need For Global-WAN
on both
Server and Client Sides
46 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
Unbreakable Security
● Future-Proof (Post-QUANTUM)
● Mathematically Proven (Can Be Trusted By All)
● Independent From Computing Power Used To Break It
● No More Need To Enlarge Encryption Keys
● No More Need To Change Encryption Algorithms
● Also Unbreakable Two & Three-Factor Authentication
● No Central Key Repository Needed (But Can Be Used)
● Mobiles / Embedded: Very Low Overhead (CPU / RAM)
47 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
The Value Of Trust
Applications
● Corporate Asset Protection (Patents, Talks, Databases)
● Public Asset Protection (e-Votes, Medical Records, Legal)
● International Negotiations (United Nations, Contracts)
● Transaction / Archiving Certifications (Indisputable)
● Defence (Impenetrable Communications, Drones, etc.)
● Chips Would Be Ideally Used (Tampering, I.P. Protection)
● Legitimacy to Impose a Licensing Monopole (Exclusivity)
48 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
Trust Starts With Identity
● Email (Data Protection, Negotiations, Board Talks)
● Routers / Firewalls (How Safe Are Barriers If Broken?)
● Transactions (Trading, Contracts, Non-Repudiation)
● Storage (Confidentiality, Tamper-Proof, Full-Control)
● Defence (Remote Presence / Control, Chain Of Orders)
● I.P. Rights (What Worth Is A Proof That Can Be Spoofed?)
● Legal (Customers / Lawyers / Regulators Security Chain)
49 | Copyright © 2014 TWD Industries AG. All rights reserved.
Global-WAN
TrustLeap
Worldwide Corporate HQ
TrustLeap
Paradiesli 17
CH-8842 Unteriberg SZ
Switzerland
Phone +41 (0)55 414 20 93
Fax +41 (0)55 414 20 67
Email contact@trustleap.com
www.trustleap.com
About TrustLeap
TrustLeap, the security division of TWD Industries AG, protects digital assets with cryptanalytically unbreakable technology
(safe against unlimited computing power as it is proven mathematically that no key leaks can be exploited). The TrustLeap
secure platform leverages offers of enterprise, cloud, networking, digital media and financial services in global strategic markets.
TrustLeap lets partners and users form dynamic ecosystems where duly accredited strangers can safely trust each-other.
Establishing widespread trust enables organizations to secure their infrastructure, raise the value of their offers and safely
market their digital assets.
TrustLeap
50 | Copyright © 2014 TWD Industries AG. All rights reserved.

More Related Content

PDF
TrustLeap Multipass - Unbreakable Passwords For Cloud Services
PDF
Trustleap - Mathematically-Proven Unbreakable Security
PDF
TrustLeap GWAN - The multicore Future requires Parallelism Programming tools
PDF
CONFidence2015: Real World Threat Hunting - Martin Nystrom
PPTX
Four keys to securing distributed control systems and the industrial (IoT)
PDF
Firepower ngfw internet
PPTX
DevTalks 2021 Cloud Engineering @Crowdstrike
PDF
David Klein - Defending Against Nation Sate Attackers & Ransomware
TrustLeap Multipass - Unbreakable Passwords For Cloud Services
Trustleap - Mathematically-Proven Unbreakable Security
TrustLeap GWAN - The multicore Future requires Parallelism Programming tools
CONFidence2015: Real World Threat Hunting - Martin Nystrom
Four keys to securing distributed control systems and the industrial (IoT)
Firepower ngfw internet
DevTalks 2021 Cloud Engineering @Crowdstrike
David Klein - Defending Against Nation Sate Attackers & Ransomware

What's hot (19)

PDF
Making Network Security Relevant
PPTX
Vulnerabilities of machine learning infrastructure
PPSX
Secure channels main deck
PDF
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
PPTX
Enabling Data Protection through PKI encryption in IoT m-Health Devices
PPTX
Conclusions from Tracking Server Attacks at Scale
PPTX
SafeNet overview 2014
PPTX
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
PDF
So You Want a Threat Intelligence Function (But Were Afraid to Ask)
PPTX
Stories from the Trainyard!
PDF
Netguard product brochure
PDF
Exfiltrating Data through IoT
PDF
IoT security fresh thinking 2017 sep 9
PDF
CDE Marketplace: SQR Systems
PDF
A 2018 practical guide to hacking RFID/NFC
PDF
Fal conunite2019 complete_zero_trust_final
PPTX
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
PDF
SecurEntry by PrehKeyTec
PPTX
Implementing a Secure and Effective PKI on Windows Server 2012 R2
Making Network Security Relevant
Vulnerabilities of machine learning infrastructure
Secure channels main deck
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Conclusions from Tracking Server Attacks at Scale
SafeNet overview 2014
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
So You Want a Threat Intelligence Function (But Were Afraid to Ask)
Stories from the Trainyard!
Netguard product brochure
Exfiltrating Data through IoT
IoT security fresh thinking 2017 sep 9
CDE Marketplace: SQR Systems
A 2018 practical guide to hacking RFID/NFC
Fal conunite2019 complete_zero_trust_final
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
SecurEntry by PrehKeyTec
Implementing a Secure and Effective PKI on Windows Server 2012 R2
Ad

Viewers also liked (12)

PDF
Global wan prez-ru.mini
PDF
Large-scale real-time analytics for everyone
PDF
The Allen AI Science Challenge
PDF
Data Mining in RTB
PDF
Обработка данных в RTB: быстро, дешево и на 98% точно
PDF
DNA Intelligent WAN Campus Day
PPT
Racunarske mreze
PPT
Internet
PPSX
2 racunarske mreze
PPT
Prezentacija o internetu
PPT
Računarske mreže
PPTX
Ppt on internet
Global wan prez-ru.mini
Large-scale real-time analytics for everyone
The Allen AI Science Challenge
Data Mining in RTB
Обработка данных в RTB: быстро, дешево и на 98% точно
DNA Intelligent WAN Campus Day
Racunarske mreze
Internet
2 racunarske mreze
Prezentacija o internetu
Računarske mreže
Ppt on internet
Ad

Similar to Global-WAN - The Swiss Neutral Data Haven (20)

PDF
Lieven Vermaele - SDNsquare - Flanders Belgium - Stanford Engineering - Mar ...
PDF
Waterfall Wonderware Joint Offering
PPTX
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
PPT
Firewall Webinar
PDF
WM press release VIP Tower - 122017
PDF
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
PDF
The Platform for the Industrial Internet of Things (IIoT)
PDF
Eseminar – Internet delle Cose
PDF
Developer Day 2014 - 4 - wind river - iot business and technology trends
PDF
Open Source for Industry 4.0 – Open IoT Summit NA 2018
PPTX
Nozomi-Networks-Corporate-Overview-Deck-2025.pptx
PDF
Project Grace - Towards a Secure Internet
PDF
IoT Security: Problems, Challenges and Solutions
PPTX
NUB3D - Company Presentation
PPTX
Nvis, inc. 03 18-2020 - final
PDF
Unidirectional Security, Andrew Ginter of Waterfall Security
PDF
Right FACE! -- Welcoming FACE to RTI for their June 2013 Meeting (PDF)
PPTX
Security in Optical Networks - Useless or Necessary?
PDF
Steps to Scale Internet of Things (IoT)
PDF
Transforming enterprise and industry with 5G private networks
Lieven Vermaele - SDNsquare - Flanders Belgium - Stanford Engineering - Mar ...
Waterfall Wonderware Joint Offering
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
Firewall Webinar
WM press release VIP Tower - 122017
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
The Platform for the Industrial Internet of Things (IIoT)
Eseminar – Internet delle Cose
Developer Day 2014 - 4 - wind river - iot business and technology trends
Open Source for Industry 4.0 – Open IoT Summit NA 2018
Nozomi-Networks-Corporate-Overview-Deck-2025.pptx
Project Grace - Towards a Secure Internet
IoT Security: Problems, Challenges and Solutions
NUB3D - Company Presentation
Nvis, inc. 03 18-2020 - final
Unidirectional Security, Andrew Ginter of Waterfall Security
Right FACE! -- Welcoming FACE to RTI for their June 2013 Meeting (PDF)
Security in Optical Networks - Useless or Necessary?
Steps to Scale Internet of Things (IoT)
Transforming enterprise and industry with 5G private networks

Recently uploaded (20)

PPTX
Tartificialntelligence_presentation.pptx
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
Modernising the Digital Integration Hub
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Hybrid model detection and classification of lung cancer
PPT
What is a Computer? Input Devices /output devices
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
The various Industrial Revolutions .pptx
PDF
August Patch Tuesday
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Getting Started with Data Integration: FME Form 101
PPTX
1. Introduction to Computer Programming.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Tartificialntelligence_presentation.pptx
WOOl fibre morphology and structure.pdf for textiles
1 - Historical Antecedents, Social Consideration.pdf
cloud_computing_Infrastucture_as_cloud_p
Modernising the Digital Integration Hub
Zenith AI: Advanced Artificial Intelligence
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
Hybrid model detection and classification of lung cancer
What is a Computer? Input Devices /output devices
DP Operators-handbook-extract for the Mautical Institute
The various Industrial Revolutions .pptx
August Patch Tuesday
Group 1 Presentation -Planning and Decision Making .pptx
Getting Started with Data Integration: FME Form 101
1. Introduction to Computer Programming.pptx
Programs and apps: productivity, graphics, security and other tools
Enhancing emotion recognition model for a student engagement use case through...
Assigned Numbers - 2025 - Bluetooth® Document
gpt5_lecture_notes_comprehensive_20250812015547.pdf

Global-WAN - The Swiss Neutral Data Haven

  • 1. Global-WAN® Swiss Data Haven The Neutral Global Network Built on Post-Quantum Security for “The Internet of Things” global-wan.ch
  • 2. This document is aimed at helping people to understand the Global-WAN technology. Further information regarding the internals of TWD Industries AG's technology are available under a proper NDA, to selected partners. 2 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 3. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 3 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 4. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 4 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 5. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 5 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 6. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 6 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 7. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 7 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 8. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 8 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 9. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 9 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 10. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 10 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 11. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 11 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 12. Selected Partners can operate their own, fully-independent, unbreakable Global-WAN network. 12 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 13. The Problem “Nations have no friends, only interests” John Kornblum US Ambassador in Germany (2014) 13 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 14. US Vendors' Dilemma “How do you protect what you want to exploit?” Scott Charney, VP Trustworthy Computing, Microsoft 14 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 15. US Strategists' Dilemma “The Internet is the most transformative innovation since Gutenberg and the printing press, yet we're treating it as a war zone.” Jason Healey The Atlantic Council (US think-tank) 15 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 16. The Solution “To restore trust, there's no substitute to offering the real thing: forever unbreakable trusted security.” TWD Industries AG, 2007 16 | Copyright © 2014, TWD Industries AG. All rights reserved. Global-WAN
  • 17. Global-WAN Purpose & Distinctive Value Unique, By-Design 17 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 18. “Securing Phone, Fax, Radio, Video Conferencing, Web applications, unified communications, etc. with Forever-Unbreakable Trusted Encryption”. For * Individuals (consulting, politics, lawyers) * Enterprises (board, partners, R&D, branch) * Governments (Army, Police, energy grid, embassies, trading, etc.). 18 | Copyright © 2014 TWD Industries AG. All rights reserved. PURPOSE Global-WAN
  • 19. 19 | Copyright © 2014 TWD Industries AG. All rights reserved.
  • 20. EASE OF USE 20 | Copyright © 2014 TWD Industries AG. All rights reserved. Plug & Play and: - Compatible with all HARDWARE - Compatible with all SOFTWARE - Compatible with all Operating Systems (IBM, ORACLE, Apple, Microsoft, Linux...) Global-WAN
  • 21. Global-WAN 21 | Copyright © 2014 TWD Industries AG. All rights reserved.
  • 22. FOREVER SAFE 22 | Copyright © 2014 TWD Industries AG. All rights reserved. Security designed to last: - Proven as unbreakable forever (post-quantum) - Hides communication endpoints (where, who) - Hides application and user metadata Complete security: no “what, who, when, where”. Global-WAN
  • 23. Global-WAN Business Development Investment Opportunities 23 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 24. To accelerate its Development, TWD Industries AG invites International Investors 24 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 25. “With the right acts of digital sabotage, attack aircraft will be grounded, infrastructure disrupted and communications severed, reducing the enemy to a state of raging, pre-modern impotence.” The Economist 25 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 26. 26 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 27. “There's a market failure in cyber-security, made worse by the trouble firms have in getting reliable information about the threats they face.” The Economist, “Vulnerabilities - Zero-day game - Wielding a controversial cyber-weapon.” 27 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 28. 28 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 29. “To avoid lurid headlines about car crashing, insulin overdoses and houses burning, tech firms will surely have to embrace higher [security] standards.” The Economist "The Internet of things (to be hacked)" 29 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 30. 30 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 31. INVEST GLOBALLY In Emerging Markets and Established Markets: ● USA (“the NSA has destroyed trust”) ● EUROPE (badly needs resilience, growth) ● AFRICA (new infrastructure, sovereignty) ● ASIA (needs to foster independence) ● LATIN-AMERICA (won't trust the USA) 31 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 32. INVEST IN NATIONS Securing the CRITICAL INFRASTRUCTURE: ● Security (Army, Police, Finance, etc.) ● Assets (Water Supply, Airports, etc.) ● Energy (Pipelines, Nuclear Plants, etc.) ● Networks (Internet, GSM, 3G/4G, etc.) ● E-Admin (e-Votes, e-Medical, e-Fiscal) 32 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 33. INVEST IN PATENTS Let Global-WAN licence its patents and micro-chips to secure all these devices. 33 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 34. Architecture & Components Designed From Scratch (can't trust existing products) 34 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 35. SOFTWARE COMPONENTS G-WAN: A Server That Can be Trusted Designed To Build A Secure Platform: ● Less Code, Less Bugs, Higher Efficiency ● New Technologies (Parsing, Memory, etc.) ● No Vulnerability Found Since 2009 Launch Needed a Safe Server to release Secure Services. 35 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 36. Lorenz-Waterwheel Designed to Scale From [1-∞] CPU Cores. Lock-Free, Wait-Free, Multi-Threaded and Event-Based. 36 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN Connections MULTICORE SCALABILITY
  • 37. 37 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN MULTICORE SCALABILITY
  • 38. UBIQUITOUS PLATFORM G-WAN: Lightweight (200 KB) App. Server Designed To Run Everywhere: ● Smartphones (Low-Consumption, Low-Latency) ● Embedded (Control At The Lowest Level) ● Servers (Web, SaaS, PaaS, Clouds) With Scripts In 17 Programming Languages: (asm, C/C++, C#, Java, Scala, Go, Javascript, Lua, Perl...) 38 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 39. VERSATILE PLATFORM G-WAN: An Universal Stack Open to Third-Parties: ● Applications (C/C++, C#, Java, Obj-C, Perl) ● Middleware (HTTP/S, asynchronous scripts) ● Database (Key-Value, SQLite, ORACLE) ● Infrastructure (DNS, Email, Proxy, VPN, etc.) 39 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 40. ZERO CONFIGURATION G-WAN: An Unobstrusive Stack Why Configuration Files Are Bad: ● Confusing, User Errors, Buggy, Version Incompatibilities ● Mostly Redundant with existing File System Information ● Inadequate: Adaptive Options Are Much Safer / Efficient Safer, Faster, Simpler, No User Lock-In, No Planned Obsolescence, Able to Run on Unattended Systems. 40 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 41. ORACLE OPEN-WORLD 41 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 42. ORACLE OPEN-WORLD 42 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN Making The Impossible Become Routine ● G-WAN Accelerating ORACLE NoSQL ● In A Social Gaming Demo Of 100 Millions Bots ● All Moving In Real-Time (Heading, Speed, etc.) ● Queried by 45,000 Persons Joining The Game ● And Achieving A Whooping 1.2 Billion of TPS ● ...On A Mere 6-Core Desktop Machine!
  • 43. The Global-WAN Project Development Schedule 43 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 44. 44 | Copyright © 2014 TWD Industries AG. All rights reserved. Reaching The Harvesting Phase 3 years 2 years 5 plus years  Integration still dominating  Exploitation gains speed  Consolidation of development processes is key  Minimize team churn and grow it only slowly  Focus on integration  Only very few clients  Gain experience in automation  Build a strong team  Integration becomes less important  Exploitation takes lead and grows significantly  Quality becomes key topic  Long term employees perform best Information Integration Information Exploitation 1) Ramp-up phase, 2008 2) Consolidation phase 3) Harvesting phase, 2014 Global-WAN
  • 45. Productivity Standards Favourably Comparing With The Next Best: 45 | Copyright © 2014 TWD Industries AG. All rights reserved. Server Birth Files Blank Comment Code Total Nginx 2002 256 35,131 4,308 94,369 133,808 G-WAN 2009 171 11,198 42,706 56,766 110,670 G-WAN was written in less than half the time, and offers many more features in half the code of Nginx. Further, G-WAN's source code has 10x more comments than Nginx's code. Source Code Lines Global-WAN
  • 46. Why TrustLeap? The Need For Global-WAN on both Server and Client Sides 46 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 47. Unbreakable Security ● Future-Proof (Post-QUANTUM) ● Mathematically Proven (Can Be Trusted By All) ● Independent From Computing Power Used To Break It ● No More Need To Enlarge Encryption Keys ● No More Need To Change Encryption Algorithms ● Also Unbreakable Two & Three-Factor Authentication ● No Central Key Repository Needed (But Can Be Used) ● Mobiles / Embedded: Very Low Overhead (CPU / RAM) 47 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 48. The Value Of Trust Applications ● Corporate Asset Protection (Patents, Talks, Databases) ● Public Asset Protection (e-Votes, Medical Records, Legal) ● International Negotiations (United Nations, Contracts) ● Transaction / Archiving Certifications (Indisputable) ● Defence (Impenetrable Communications, Drones, etc.) ● Chips Would Be Ideally Used (Tampering, I.P. Protection) ● Legitimacy to Impose a Licensing Monopole (Exclusivity) 48 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 49. Trust Starts With Identity ● Email (Data Protection, Negotiations, Board Talks) ● Routers / Firewalls (How Safe Are Barriers If Broken?) ● Transactions (Trading, Contracts, Non-Repudiation) ● Storage (Confidentiality, Tamper-Proof, Full-Control) ● Defence (Remote Presence / Control, Chain Of Orders) ● I.P. Rights (What Worth Is A Proof That Can Be Spoofed?) ● Legal (Customers / Lawyers / Regulators Security Chain) 49 | Copyright © 2014 TWD Industries AG. All rights reserved. Global-WAN
  • 50. TrustLeap Worldwide Corporate HQ TrustLeap Paradiesli 17 CH-8842 Unteriberg SZ Switzerland Phone +41 (0)55 414 20 93 Fax +41 (0)55 414 20 67 Email contact@trustleap.com www.trustleap.com About TrustLeap TrustLeap, the security division of TWD Industries AG, protects digital assets with cryptanalytically unbreakable technology (safe against unlimited computing power as it is proven mathematically that no key leaks can be exploited). The TrustLeap secure platform leverages offers of enterprise, cloud, networking, digital media and financial services in global strategic markets. TrustLeap lets partners and users form dynamic ecosystems where duly accredited strangers can safely trust each-other. Establishing widespread trust enables organizations to secure their infrastructure, raise the value of their offers and safely market their digital assets. TrustLeap 50 | Copyright © 2014 TWD Industries AG. All rights reserved.