Imagine All the Convenience of Cloud Computing, Without the Risk of Using Data Centres.
The Problem
It’s a hard truth: data stored on public servers is never safe.
Every server farm is a high-value target, a jackpot for hackers and cybercriminals waiting to raid it. Just one breach can unleash the private data of millions in an instant—one fatal slip, and everything is compromised.
Consider these recent catastrophic breaches:
-
Uber - Hackers infiltrated its Amazon Web Services account, laying bare the personal information of 57 million users.
-
Timehop - Hackers caused a data breach impacting 21 million users, entirely due to a cloud computing vulnerability.
Average Cost of Cloud-Based Breaches:
Locally hosted cloud solutions are no safer—they’re just a different flavour of vulnerable. Research shows that breaches in traditional private cloud setups cost nearly as much as public cloud disasters, with almost zero difference. But the drawbacks don’t stop there: these so-called ‘private clouds’ are crippled by design, chaining users to a specific location. Access is restricted to the building or campus where the servers are housed—a setup that slams the door on any kind of remote access.
Want to access your data off-site? Forget it. Secure communication with anyone outside the network? Not happening.
And if that weren’t enough, maintaining an internal server cluster is an enormous burden—requiring specialised staff and burning through funds at an unsustainable rate. For even the largest enterprises, traditional private cloud solutions are a dead end.
*IBM and Ponemon Institute 2021 Cost of a Data Breach Report
The Risks of SMS and Software Encrypted Messaging Apps
When using traditional SMS, your messages are not encrypted. Telecom providers store them on their servers, making them accessible to the companies themselves and, potentially, to unauthorised entities. These systems are prone to interception by hackers via SIM swapping or man-in-the-middle attacks. A notable example is the Pegasus spyware attack, which exploited SMS vulnerabilities to infiltrate devices of activists and journalists, enabling surveillance without their knowledge.
While messaging apps such as WhatsApp and Signal use end-to-end encryption to protect message content, they are far from foolproof for those prioritising privacy.
These platforms still collect metadata, such as who you communicate with and when. For WhatsApp, this information is accessible to its parent company, Meta (formerly Facebook), which has faced scrutiny for data misuse. In one high-profile breach in 2019, a vulnerability in WhatsApp allowed attackers to remotely install spyware on devices, leading to the exploitation of journalists.
Moreover, both apps rely on their servers to relay messages. This introduces a potential single point of failure where attackers—or even internal bad actors—could target server infrastructure to compromise communication.