Terra Privacy -- Dynamically generated whitelists

Discussion in 'other anti-malware software' started by hawki, May 26, 2017.

  1. Michael Wood

    Michael Wood Registered Member

    Joined:
    May 27, 2017
    Posts:
    42
    Location:
    Fort Lauderdale, FL
    Our software specifically stops in-memory trojans from being able to directly communicate with command and control centers after they've already injected themselves into a trusted system process. This is the most common type of trojan responsible for most serious breaches.
     
  2. Michael Wood

    Michael Wood Registered Member

    Joined:
    May 27, 2017
    Posts:
    42
    Location:
    Fort Lauderdale, FL
    Can you kindly share the name of the software you use that consistently blocks in-memory trojans after they've successfully injected themselves into trusted system processes or your browser? To the best of our knowledge, Hacker Deterrent Pro is unique in this regard. Any additional info would be helpful.
     
  3. Michael Wood

    Michael Wood Registered Member

    Joined:
    May 27, 2017
    Posts:
    42
    Location:
    Fort Lauderdale, FL
    We are confident that our price will be seen for the bargain it is after we post independent, third-party tests documenting that our product provides protection that you cannot get anywhere else, including the supposed "Deluxe" cybersecurity suites with list prices in excess of $100/year. These tests will be conducted after the new interface is completed so that the lab we hire to conduct the test can provide videos that match what the user will see on his/her own screen.
     
  4. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    See PM
     
  5. Michael Wood

    Michael Wood Registered Member

    Joined:
    May 27, 2017
    Posts:
    42
    Location:
    Fort Lauderdale, FL
    If you could elaborate, that would be appreciated.
     
  6. _CyberGhosT_

    _CyberGhosT_ Registered Member

    Joined:
    Mar 2, 2015
    Posts:
    457
    Location:
    MalwareTips "Your Security Advisor"
    And again the market you are referring to at that price ($100/year) is the Enterprise market brother, surely you know this.
    Being born in Fla. I know expenses, Fla is one of the most expensive sates to live in and run a business, but you can't apply that type of price tag being an unknown to your software on the global market, as you will soon learn.
     
  7. _CyberGhosT_

    _CyberGhosT_ Registered Member

    Joined:
    Mar 2, 2015
    Posts:
    457
    Location:
    MalwareTips "Your Security Advisor"
    He made this same statement to me, I figure with the pedigree he seems to have
    he's not stupid and should know that this software is not as unique as he might think.
    I don't wish him any ill, but something is not sitting right, remember I said this today :thumb:
     
  8. Michael Wood

    Michael Wood Registered Member

    Joined:
    May 27, 2017
    Posts:
    42
    Location:
    Fort Lauderdale, FL
    Norton Premium's list price is $109.99. It's for home/family use -- not enterprise. That's one example.
     
  9. Michael Wood

    Michael Wood Registered Member

    Joined:
    May 27, 2017
    Posts:
    42
    Location:
    Fort Lauderdale, FL
    We will soon release independent authentication on the uniqueness of our approach, and the uniqueness of our effectiveness as well. We will be publishing independent confirmation during the launch of the commercial release.
     
    Last edited: Jun 18, 2017
  10. _CyberGhosT_

    _CyberGhosT_ Registered Member

    Joined:
    Mar 2, 2015
    Posts:
    457
    Location:
    MalwareTips "Your Security Advisor"
    Cool, and we look forward to this next step in your journey, Like I said I wish you no ill will. Good Luck :thumb:
     
  11. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    But does your software protect the whole system or just the browser?
     
  12. Michael Wood

    Michael Wood Registered Member

    Joined:
    May 27, 2017
    Posts:
    42
    Location:
    Fort Lauderdale, FL
    Allow me to first clarify what type of protection we offer. Our software specifically severs direct trojan connections to hackers' command and control centers.

    This protection is for the entire PC. We use three unique forms of whitelisting to accomplish this:
    • Transient Whitelisting: Protects browser traffic.
    • Name-Based Whitelisting: Protects app traffic.
    • Triple-DNS Whitelisting: Protects operating system traffic.
     
  13. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Okay, so how is that different then a good firewall and on point 3 how is that different the HeimdalSecurity?
     
  14. Michael Wood

    Michael Wood Registered Member

    Joined:
    May 27, 2017
    Posts:
    42
    Location:
    Fort Lauderdale, FL
    Take Transient Whitelisting as one example of an entirely unique approach. Transient Whitelisting protects browsers. This whitelist starts off with zero entries when the browser is opened. Then, it automatically adds the webpages you enter into the address bar (e.g. "cnn.com" or "foxnews.com") and it automatically adds the sites these pages pull content from. Every time you leave a webpage, the webpage and all its content sites are automatically removed from the whitelist. Such that when you close the browser, the whitelist automatically returns to zero.

    So what does this accomplish? This means that your browser can only communicate with the currently opened pages and their respective content sites -- all other browser traffic remains blocked. In other words, browser-injected trojans are blocked and browser-imitating trojans are blocked without requiring a single blacklist.

    Why do we remove entries from the whitelist? This protects the user in case they wrongly visit a malicious site. The moment the page is closed, the site is automatically removed from the whitelist -- cutting off any possibility of a permanent back door.

    There are other unique advantages, such as ensuring that the browser's address bar matches the loaded webpage. If a hacker tries to fake the address then this phishing technique is automatically blocked. For a demo see: https://terraprivacy.com/phishing-attacks/

    Transient Whitelisting starts off from scratch and dynamically generates itself on-the-fly, in real-time, as the user surfs the net. It's an entirely different approach.

    Hacker Deterrent Pro includes five unique technologies, all working synergistically together:
    • Transient Whitelisting
    • Name-Based Whitelisting
    • Triple-DNS Whitelisting
    • Transparent Traffic Control
    • Heisenberg Health Monitor
    For more info on the Transient Whitelisting, kindly see the following video: https://youtu.be/G6I3oHMTwGY
     
  15. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    HI Michael

    One other question. I do use HMPA, and it injects it's DLL into every process. Would that be a problem? Also curious when you will support Opera?

    Pete
     
  16. _CyberGhosT_

    _CyberGhosT_ Registered Member

    Joined:
    Mar 2, 2015
    Posts:
    457
    Location:
    MalwareTips "Your Security Advisor"
    Hey Pete, if it is any help I have tried this (for a night) and as you know I use VS and HMPA CTP 4 and FF, I had no issues
    at all. I think Opera is based off of chrome ? not sure, but if it is you may want feedback from someone who uses chrome that may help you better. PeAcE
     
  17. mekelek

    mekelek Registered Member

    Joined:
    May 5, 2017
    Posts:
    518
    Location:
    Hungary
    tried it with Yandex, that is Opera/Chromium based, added the extension and added it as a custom browser and it worked.
     
  18. _CyberGhosT_

    _CyberGhosT_ Registered Member

    Joined:
    Mar 2, 2015
    Posts:
    457
    Location:
    MalwareTips "Your Security Advisor"
    +1 :thumb:
     
  19. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Thanks guys. Curious what your thoughts are about the protection. _CyberGhosT_ I think you know my setup. Do you think it would anything?
     
  20. _CyberGhosT_

    _CyberGhosT_ Registered Member

    Joined:
    Mar 2, 2015
    Posts:
    457
    Location:
    MalwareTips "Your Security Advisor"
    I am waiting for it to receive its accolades before I jump into the water, too many
    vales for me, too many unknowns too server side. Try it and take a deep look it cant hurt.
    I cant recommend much more than that at this point. Thanks for asking :thumb:
     
  21. simmersK00L

    simmersK00L Registered Member

    Joined:
    Mar 20, 2013
    Posts:
    323
    Location:
    USA
    just installed HDP in my virtualbox win7. CF10 blocked the install, so I unblocked HDP, then EAM/BB blocked the install, so I allowed it. HDP installed, and now running from SUA. HDP seems to be running ok. Seeing what others have reported. GUI somewhat awkward especially in vbox as I can only make so many screen adjustments. I do like quickly seeing what / where is connecting and the "lock" icon. I whitelisted a couple locked domains but the unlocking feedback seems not to be forthcoming. I see a heading for "two-factor browsing" but not sure what that means. I saw a locked connection to eff.com, and I assume that connection was caused by privacy badger chrome extension, but no indication / verification of that. Good news I didn't see any shocking (malware) connections. I'm going to uninstall for now, wait for next version and might put it on my primary hardbox. As for the price... :doubt: as noted above I've seen worse. I have BDIS_2017 running on one box and it's up for renewal in July, BD wants $89 :gack: & :argh:.
     
  22. Moose World

    Moose World Registered Member

    Joined:
    Dec 19, 2013
    Posts:
    905
    Location:
    U.S. Citizen
    Salutations/Greetings!:geek:

    Just wondering how Terra Privacy hold up and/or do against variouses ransomware like
    Xdata,Cerber,Satana,Cryptolocker,Crypto Wall,Petya,Jigsaw ect..?:eek:

    Or does it just focus on direct trojan connections to hackers' command and control centers only? And about worms and really bad adware?

    And is there any kind of conflicts with other ransomware solutations like Heilig Defense RansomOff and AppCheck Anti-Ransomware?

    https://www.ransomoff.com/
    https://www.checkmal.com/


    Kind Regards,:confused:
     
    Last edited: Jun 19, 2017
  23. Michael Wood

    Michael Wood Registered Member

    Joined:
    May 27, 2017
    Posts:
    42
    Location:
    Fort Lauderdale, FL
    There are many great backup solutions to protect against ransomware. Therefore, Hacker Deterrent Pro was designed to address the number one unsolved issue. According to Verizon's Data Breach Investigation Report, the number one hacking method is the installation of persistent trojans on PCs which directly link the PC to the hacker's command and control center. Hacker Deterrent Pro focuses exclusively on blocking these backdoor connections so that the user's digital life is kept out of hacker's hands. To date, we haven't run into any issues with adding this layer of protection on top of other security software such as antivirus, etc.
     
  24. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590

    Thank you.
     
  25. Michael Wood

    Michael Wood Registered Member

    Joined:
    May 27, 2017
    Posts:
    42
    Location:
    Fort Lauderdale, FL
    Our software addresses the number one hacking method, the opposite of a "niche." Many users are surprised at what they find blocked when they run the free trial. Genuine protection against the most common form of hacking is needed by all.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.