- Does Seven Alpha include Cloud Storage?
No. Not as a part of the core service. Vendors using Seven Alpha may provide Cloud Storage, but key services
do not provide mass storage of data or files. Frankly, this is because the framework disclaims any and all
content themed sexually oriented, and most content people store even if personal and lawful, contains that data.
We do not want to be a time capsule for your grandfather's pics of your grandmother. If you need that,
contact one of the many other services for that purpose and party on.
- What is stored in the Key Database
Serial numbers, tokens for product sku invoices, and other data and products which are formatted for the
Seven Alpha API. Vendors must supply this information if they want to register products via the API.
- Are all licenses perpetual or transferrable
No. Certain rights may be flagged as such, like Founder / Sponsor Honors as a transferrable honorarium,
which add value to being a start-up or venture patron, but most license models are terminated lease on
end of contract which occurs when the registered party ceases to be alive permanently. That we offer
options that can be conveyed to family or transferred to related accounts by sanguinality disclaim the
sale of such honors and title, while affording a great benefit to venture micro-capital offers.
- What is the purpose of Access and Archive Rights?
Access rights allow use and control of account content, while Archive tools afford access based on
strict terms such as warrant or specific application data obligated by law. When a question at law
arises, such as first use, creation dates, etc - these data points can be essential to settle matters
and are routinely distributed and deleted in five years by most providers. Retained data is goverend
by COPPA, and beginning January 1 2020 strict rules governing this will come into effect in the
United States similar to GDPR in the European Union. The tools also provide a way to register and
log any executed "right to be forgotten" in full or part, if exercised by our clients, and may be
used to clear this information in compliance with European Union law by the end user or their estate
at-law, unlike most other services today. This compliance feature again benefits API users.
- Why Centralize my Data?
Networks adapt to risk. In the past, the threat of your data being gathered and sold or retained,
or shipped to jurisdictions which do not regulate its retention prior deletion in the country it
was gathered in or from, did not pose a threat to individual users. Violent and abusive stalkers
also did not enjoy the privileges of large corporations reluctance to permanently ban them and
reliance on difficulty to refuse to do so.
Threats have changed, and personal computer services
are also not trustworthy third-parties for information tokens. A trusted third-party to hold and
verify users and data is a form of risk management. Paired with disclosure and transparency for
the end-user, and 'right to be forgotten' to control or delete data specifically, creates a form
of private social media space essential to electronic commerce and trust with export capabilities
for virtual products (Serial Numbers, et al).
As long as you control your data, and can physically
tokenize the access tool for unsophisticated (family) use in case of emergency, this is a good and
necessary evolution of security against systematic and large-scale identity and traffic data collection
now supporting many "free" services in exchange for carte blanche access to your communications and
activity at your computer, phone, or Internet device. Since all Seven Alpha members adhere to a
DO NOT TRACK policy, this means your data in your own account is the only record you need to be
concerned with and a complete view of all network records associated with your account which do not
belong to the application of a Seven Alpha host, and such data is not eligible for sale or access
as a condition of their participation in the network. Paired with the variable IP and user identity
matrix in the Seven Gates (mesh network), application providers are not privy to user activity or
their home IP or other identifying information.
This "blind trust" of user accounts from a trusted
network resolves most of the tracking issues associated with abuse of privileged connection information
in the same way a global VPN affords anonymous users. To these clients, the ability to effectively
ban a user without an IP ban is more valuable than any loss of potential revenue from scraping
connection data which could potentially become a COPPA (2020) violation later.
- What is Logical Storage Block Data?
Volume Block Storage, sometimes called "attached storage" is a file mounted as a file system,
much like a 'virtual hard drive'. The term "logical" means this is not a 'physical' drive or
device, but instead a file which can be moved from place to place (like a block of data), and
remains secure and locked during transport independent of the encryption (or lack thereof) in
a specific channel. While this can be used for cloud storage, it is also useful to hold very
small credentials and keys, database files, and other records not designed for flat-file access.
The 'object' that is locked by the system and requires the 'keys' to open in our model is a
similar logical encrypted block data object, designed to be secure when not in use or access.
Stealing an entire machine with the data block on it will not, therefore, allow access to a
party without the keys and secret. Additionally, the encryption is multi-layer multi-cipher,
making decryption by brute force under ideal circumstances still very difficult and limited
by physical storage media regardless of computing power. In combination with the rotation of
keys regularly, this prohibits long-term brute-force attacks from potentially compromising a
secure data store even in the hands of a hostile power or state.
Because the object holds
other tokens to access the distributed data system, it further negates the chance of data
access by forcing a single or multiple keys and a secret known to the client, without the
additional secret and keys retained by the service. It is not a virtual drive for customers
to store data or files on. Instead, it is the 'master gate' which client requests must pass
to execute changes on a secure network of very strong cryptographic trust. In the Seven
Alpha Network, the unit functions as a single openstack universal link to other data servers (gates).
- How does this differ from Kerberos?
Kerberos is a Massachusettes Institute of Technology project that handles hand-off security between
two servers to a third server, effectively obscuring your key using a single link implicit
trust between a ticket-office and a back-office server. Kerberos does not manage any data or
access privileges, authenticate other aspects of accounts atomically, nor provide network-wide
ban capability to select areas or multiple sub-nets. No code is shared with the Kerberos
project in Seven Alpha.