PARK RIDGE, IL / ACCESSWIRE / February 25, 2015 / WHAM Inc. (OTC:WFMC) - While every major news outlet across the world sounds the alarm with the ominous headlines "AMERICAN and BRITISH Spies Stole the Keys to the Encryption Castle", most of us don't have a clue of what that means to our privacy or security and if it is so bad - what can we do about it to protect ourselves? Here is some much needed background information along with a recap of the current events.

Gemalto is a chip maker specializing in manufacturing SIM cards used worldwide in over One Billion Smartphones. Gemalto also preloads these SIM cards with unique individual encryption keys and industry approved security software so that each Smartphone can uniquely identify itself when it communicates with any Network Providers or any other Smartphones. Nearly 90% of all SIM cards sold annually in the world are provided by Gemalto. Last year alone they produced over 2 Billion SIM cards. Not only do SIM cards allow you to connect to the network anywhere in the world - they allow you to keep track of all your services and billing times. SIM cards also store very important personal information on them. To talk to your SIM card, you need to know its unique encryption key and how to use the encryption program, which are pre-loaded at the Gemalto factory. What does the SIM card store for you? Along with the SMS text messages and SMS message the SIM card holds all your phone contacts, numbers, and the history of all your calls including dates and times. The SIM card also contains several pieces of information that relate to the security protocols, the network carrier, your Personal Identification Number (PIN), an unblocking code, and the services you use, like applications. Another very important piece of data is the last location of the phone and phone number called, which is often useful in locating missing people.

On Friday, February 20th, 2015, it was reported that whistleblower, Edward Snowden, just released new secret documents indicating that way back in 2010, AMERICAN and BRITISH Spies found a way to steal all the encryption keys on every SIM card made by Gemalto. That means they may have stolen basically all the unique individual encryption keys of over 7 Billion SIM cards or as it has been reported, "They Stole the Keys to the Encryption Castle." What can the NSA and Britain's GCHQ agents do with this? More than most people are aware. With these stolen encryption keys, intelligence agencies can monitor any mobile communications without first seeking approval from telecom companies and foreign governments. Having these keys also allows them to sidestep the need to get subpoenas, a warrant, or a wiretap, while leaving no trace on the wireless provider's network that the communications were ever intercepted. Bulk key theft additionally enables the intelligence agencies to unlock any previously encrypted communications. Essentially, the NSA and the GCHQ now have free-range access to mobile phone data any time they want to in the world. This applies to all voice calls and SMS text messaging data, they can now hear everything you say on your mobile phone and read all your SMS messages, but fortunately not your application data. Application data is stored separately in the phone's hard drive. 

WHAM's New Secure Mobile Voice and Instant Messaging application will keep all calls and messages private, secure and safe. Even if they copy and store all data coming to and from your Smartphone, the keys will only work on regular voice calls and regular SMS text messaging. WHAM's Secure Mobile application does not store keys anywhere. They are used only once on a single packet and then discarded never to be used again. In fact, WHAM doesn't even share keys with others in its secure mobile communication environment. On a typical WHAM Secure Mobile voice call, over 100 unique different keys are used during each second of the phone call, one for each of the fifty voice packets from the sender and one for each of the fifty voice packets from the receiver. While other secure voice systems offer one new secret key for each new call, WHAM's new Secure Mobile offers nearly 6000 unique random keys a minute, (100 keys X 60 seconds). WHAM also uses a different unique random secret key on every text message and message attachment: Word doc, Excel doc, PowerPoint, PDF, Image, Video or audio file.

In conclusion, using regular voice calls and SMS text messaging services is an old habit which may be hard to break. But in light of all the recent hacking news and now even with governments spying on everything you say or do, perhaps this is one old habit you should take time to break! Your safety and privacy come first!

About Us:

Woodman Holdings Asset Management Inc. (Wham Inc.) is a diversified holdings company established for the purpose of investing in or acquiring businesses and distressed asset classes. We operate in six business areas: Investments, Mobile Gaming, Proprietary Trading, Apparel, Fine Art and Secure Mobile Encryption Technology.

The company acquires businesses through mergers, stock exchanges, asset acquisitions or reorganization. We explore innovative financial solutions in order to facilitate global investments for wealth creation and life quality enhancement. We also provide connectivity between the capital markets and knowledge driven investors, profiteering from yielding investments. The operating principles that guide our organization, our conduct and our relationships are simple and are designed to create a different type of company, which honors God and people. The company has a disciplined approach to its actions and investments.

Forward-Looking Statement:

This Press release may include forward-looking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934. These statements are based on the Company's current expectations as to future events. However, the forward-looking events and circumstances discussed in this press release might not occur, and actual results could differ materially from those anticipated or implied in the forward-looking statements.

Contacts:

Wham Inc.
Investors Relations Department
Email: investorrelations@whamcorp.us 

For all general inquiries contact us via email at: info@whamcorp.us

 

SOURCE: Wham Inc.

Syntrol (CE) (USOTC:SNLP)
Historical Stock Chart
From Apr 2024 to May 2024 Click Here for more Syntrol (CE) Charts.
Syntrol (CE) (USOTC:SNLP)
Historical Stock Chart
From May 2023 to May 2024 Click Here for more Syntrol (CE) Charts.