A Message From Our Founder
Hello,
My name is Charles Malone. First of all, I want to thank you for visiting this website, one of several projects I'm working on.
This project began in 2011, when my Texas Department of Public Safety(DPS) law-enforcemnt landlord was extensively perusing through and capturing my personal files via his "secure" WiFi network. He also said he had worked at The Pentagon and self-proclaimed himself to be a computer genius. He was until I came along. I'm happy to say he was royally upset when I figured out a now simple mechanism to block his access. It locked up his Windows system while he was trying to copy more of my data. I know because I heard him yelling and banging on his keyboard wondering what had happened. This began my objective to discover, design, and create the ultimate data security configuration for Windows.
I have been researching data security tools for over 10 years now, began prototype development a few years ago, and have been able to create prototypes of tools for Free Public WiFi use for Windows systems, and will be evolving this to other operating systems in the future. I have been self-funding this research and development for over 10 years, and now I’m requesting crowdfunding so that I can transition this into a full product. For full transparency, I’ve had experiences in a government whistle-blower situation where I was retaliated against, because I didn’t like my teammates illegally vaping near my desk, which was giving me breathing congestion. There are many other experience examples that will be described on this website, but the short version is, each of them have contributed in some way to my progress towards creating data security tools for using “free” WiFi. Let me give you some hypothetical examples.
What if you were a lawyer going into court for a trial you “know” is a slam-dunk win for your client. You sit down with your client doing pretrial prep, setup your laptop, connect to the WiFi network, then you notice your opponent has a young person(male or female doesn’t matter) with an ill-fitting suite, madly typing on a laptop. The trial starts and part-way through the presentations, this person does a fist-pump and then gains the attention of his employer, your opponent. They both look at the laptop screen, get excited, then suddenly, change their trial tactics, that completely blow your arguments out of the water. Getting to the point, you loose—horribly. Because that person was rifling through the content on your laptop, including your notes and files regarding the present trial. It literally could be that quick to have your data compromised. Windows was not designed for security, it was designed for open collaboration.
Here’s another example scenario. What if you were a worker in technology business, a financial or other high-dollar organization maybe with a lot of sensitive intellectual property, or maybe you work in a state or federal government organization, and you are taking your laptop to a nearby coffee shop to grab some coffee and do some work. But you didn’t notice that you were followed when you left your office building, all the way to and into the coffee shop. You get some coffee, maybe a danish too, and grab a table by a window. Your attacker sits over in a corner, sets up their laptop, and logs onto the network waiting for you to get online. Long story short—a special project you’ve been working on for many months has been compromised, very similar to the trial lawyer example above. Very quickly, very efficiently, and you never notice the attacker in your computer grabbing your data. You only find out about the compromise weeks or months later when your boss calls you into his office and asks why so-and-so company or country got information you were working on. Maybe your opponent(s) beat you to market, published the information online, or some other end-run that you and others can’t explain, but it cost you your job, your company or government millions of dollars if not more. Two examples are enough, I think you get the idea.
I’ve been in similar scenarios to these, but under different circumstances. I’m a victim multiple times over and I finally got tired of being a victim. My technical computer industry skill-set includes computer programming in various languages, automation, refactoring/reverse-engineering computer environments for operational and performance tuning, to make processes run faster, and I’ve been doing these things for over 20 years through my whole career(though I started working in computers during High School). I have created an initial tool to solve the problems of the two scenarios presented above, because it seems to be the most common type attack that pretty much everyone using Windows is susceptible to. I have come up with other follow on ideas for other tools that can be useful as well.
I request your assistance with crowdfunding, or distribution of my request to your friends or associates who might be in a better situation to offer this type of funding. I’ve been able to down-size my living situation in recent years by a desire to unload unneeded possessions. Frugal living is not a bad thing like some people think it is.
The initial product is targeted to Windows and use of Free Public WiFi. Other future products are to be determined, but I have documented a number of ideas all mostly targeted to the end users of WiFi and/or routers whether at home or in public. This website has/will have a number of other help resources and best practices that I have evolved over the 10+ years span of research. Including tips for using Windows, WiFi on phones, router setup, observations of how to recognize when a system is being attacked, and many other things I hope everyone will find some use for.
If nothing else, then I politely thank you for reading this message even if you choose not to help with funding. I don’t know yet the time frame for full product availability, though the majority of the initial full prototype is complete with primarily user interface specifics, packaging, distribution, and licensing left to be completed as the main items in the list of things still to be worked out. The WiFi security tool will be a subset of the full prototype.
I'm hoping the first product launch will make this project self-sustaining. The first product release is a WiFi defense tool that I've tested in a more complex prototype, but realized it needed to be simplified to make it much more manageable by anyone of any technical skill level. Ironically, I interviewed in 2022 with a company who landed something around $13 Million dollars of venture capital to develop "Secure" WiFi hotspots for businesses, WHICH CAN'T BE DONE! The problem is NOT the hotspots! They are susceptible to something I refer to as "phone-home" attacks or malware, which circumvents EVERY firewall! Its Windows, and other operating systems! If you don't configure them properly, you're at risk. And EVERY Windows system by default has features enabled that should be removed, especially for the individual users who don't know how to manage their own computers.
If you can assist, please do help. If you can spread the word about this project, please do so. If you can get together with friends and family to make lots of little donations, please do so. If you can afford larger donations, please do so as well. All donations will be much appreciated. but please only make donations through legitimate donation mechanisms I list here. And please only donate what you yourself can afford.
Thank you very much for your interest in my project! I look forward to helping as many people as possible worldwide, so we can reduce or eliminate the $400 Billion plus in annual data, identity, and financial losses(last U.S. losses I've seen) by many people who should never have to go through it.
Please Support Our Effort
SpotFund.com: Please
CLICK THIS LINK(spot.fund/DataSecurityBootCamp) to donate with Spotfund.com. Please also share this link with friends and associates.
Support This Project: Please contact us at
donate -At- datasecuritybootcamp.com to donate. Please also share this address with friends and associates.
Other Donation Methods TBD: