What is Seven Alpha (7A)

| Main Page | Home | Purchase | Practical Use | 3 Keys | 7A Detail Map | Legal References |

FAQ (Frequently Asked Questions)

  • Does Seven Alpha include Cloud Storage?

    No. Not as a part of the core service. Vendors using Seven Alpha may provide Cloud Storage, but key services do not provide mass storage of data or files. Frankly, this is because the framework disclaims any and all content themed sexually oriented, and most content people store even if personal and lawful, contains that data. We do not want to be a time capsule for your grandfather's pics of your grandmother. If you need that, contact one of the many other services for that purpose and party on.

  • What is stored in the Key Database

    Serial numbers, tokens for product sku invoices, and other data and products which are formatted for the Seven Alpha API. Vendors must supply this information if they want to register products via the API.

  • Are all licenses perpetual or transferrable

    No. Certain rights may be flagged as such, like Founder / Sponsor Honors as a transferrable honorarium, which add value to being a start-up or venture patron, but most license models are terminated lease on end of contract which occurs when the registered party ceases to be alive permanently. That we offer options that can be conveyed to family or transferred to related accounts by sanguinality disclaim the sale of such honors and title, while affording a great benefit to venture micro-capital offers.

  • What is the purpose of Access and Archive Rights?

    Access rights allow use and control of account content, while Archive tools afford access based on strict terms such as warrant or specific application data obligated by law. When a question at law arises, such as first use, creation dates, etc - these data points can be essential to settle matters and are routinely distributed and deleted in five years by most providers. Retained data is goverend by COPPA, and beginning January 1 2020 strict rules governing this will come into effect in the United States similar to GDPR in the European Union. The tools also provide a way to register and log any executed "right to be forgotten" in full or part, if exercised by our clients, and may be used to clear this information in compliance with European Union law by the end user or their estate at-law, unlike most other services today. This compliance feature again benefits API users.

  • Why Centralize my Data?

    Networks adapt to risk. In the past, the threat of your data being gathered and sold or retained, or shipped to jurisdictions which do not regulate its retention prior deletion in the country it was gathered in or from, did not pose a threat to individual users. Violent and abusive stalkers also did not enjoy the privileges of large corporations reluctance to permanently ban them and reliance on difficulty to refuse to do so.

    Threats have changed, and personal computer services are also not trustworthy third-parties for information tokens. A trusted third-party to hold and verify users and data is a form of risk management. Paired with disclosure and transparency for the end-user, and 'right to be forgotten' to control or delete data specifically, creates a form of private social media space essential to electronic commerce and trust with export capabilities for virtual products (Serial Numbers, et al).

    As long as you control your data, and can physically tokenize the access tool for unsophisticated (family) use in case of emergency, this is a good and necessary evolution of security against systematic and large-scale identity and traffic data collection now supporting many "free" services in exchange for carte blanche access to your communications and activity at your computer, phone, or Internet device. Since all Seven Alpha members adhere to a DO NOT TRACK policy, this means your data in your own account is the only record you need to be concerned with and a complete view of all network records associated with your account which do not belong to the application of a Seven Alpha host, and such data is not eligible for sale or access as a condition of their participation in the network. Paired with the variable IP and user identity matrix in the Seven Gates (mesh network), application providers are not privy to user activity or their home IP or other identifying information.

    This "blind trust" of user accounts from a trusted network resolves most of the tracking issues associated with abuse of privileged connection information in the same way a global VPN affords anonymous users. To these clients, the ability to effectively ban a user without an IP ban is more valuable than any loss of potential revenue from scraping connection data which could potentially become a COPPA (2020) violation later.

  • What is Logical Storage Block Data?

    Volume Block Storage, sometimes called "attached storage" is a file mounted as a file system, much like a 'virtual hard drive'. The term "logical" means this is not a 'physical' drive or device, but instead a file which can be moved from place to place (like a block of data), and remains secure and locked during transport independent of the encryption (or lack thereof) in a specific channel. While this can be used for cloud storage, it is also useful to hold very small credentials and keys, database files, and other records not designed for flat-file access.

    The 'object' that is locked by the system and requires the 'keys' to open in our model is a similar logical encrypted block data object, designed to be secure when not in use or access. Stealing an entire machine with the data block on it will not, therefore, allow access to a party without the keys and secret. Additionally, the encryption is multi-layer multi-cipher, making decryption by brute force under ideal circumstances still very difficult and limited by physical storage media regardless of computing power. In combination with the rotation of keys regularly, this prohibits long-term brute-force attacks from potentially compromising a secure data store even in the hands of a hostile power or state.

    Because the object holds other tokens to access the distributed data system, it further negates the chance of data access by forcing a single or multiple keys and a secret known to the client, without the additional secret and keys retained by the service. It is not a virtual drive for customers to store data or files on. Instead, it is the 'master gate' which client requests must pass to execute changes on a secure network of very strong cryptographic trust. In the Seven Alpha Network, the unit functions as a single openstack universal link to other data servers (gates).

  • How does this differ from Kerberos?

    Kerberos is a Massachusettes Institute of Technology project that handles hand-off security between two servers to a third server, effectively obscuring your key using a single link implicit trust between a ticket-office and a back-office server. Kerberos does not manage any data or access privileges, authenticate other aspects of accounts atomically, nor provide network-wide ban capability to select areas or multiple sub-nets. No code is shared with the Kerberos project in Seven Alpha.