CORA is ideally suited to the Cloud.

Many of us are uncomfortable with having our valuable data stored somewhere in 'the Cloud'.

  1. Not knowing "where" our data is.
  2. Having to trust the company storing our data.
  3. Trusting numerous employees who have access to our data on someone else's server.
  4. Risking cyber attacks from unscrupulous brainiacs.
  5. Once it is online, it is somewhere forever.

With these concerns, why is CORA ideally suited to the Cloud?

  • CORA blocs are distributed.
  • Keep one or more CORA blocs on your device.
  • Send one or more CORA blocs to 'the Cloud' (ideally CloudCORA).
  • If your device is compromised:
    • the hacker will have an impossible task of determining 'which' CORA blocs go together.

      Read more »

      • Every single file that is CORAfied (encrypted) results in 2 - 40 CORA blocs.
      • How would an attacker know how many or which CORA blocs go together?
      • A thief would have to try every permutation and that is only possible if they have the MUP (huge Encryption key) which they should never obtain.
      • If just 100 files are CORAfied, then that would result in between 200 and 4000 CORA blocs (if previous CORA blocs had been deleted, rather than accumulate).
        Consider just 200 CORA blocs:
        • Total number of permutations required to test 2-40 CORA blocs:
        • Let's say we make it a bit easier and don't require that the CORA blocs be entered in the proper order (nah), then the total number of combinations to test 2-40 CORA blocs is only:
          That's right, 1042 - unimaginable, and that's with only 200 CORA blocs.

    • the hacker would need to know where in the cloud your CORA blocs are stored for each CORAfied (encrypted) item.
    • the hacker would have to successfully breach each and every 'server' used in the Cloud.
    • before you delete or shutdown your Cloud based items.
    • For example, in CloudCORA if you use the "Emergency Stop" then your online CORA blocs become inaccessible.
  • In conclusion, not knowing where the CORA blocs are 'in the Cloud' is an incredible value add to your security. Furthermore there is no risk having CORA blocs in the Cloud since they are useless without the CORA blocs on your device, and your MUP (encryption key). is owned and operated by CORA Cyber Security Inc. (CORAcsi), a Canadian Corporation operating out of Windsor, Ontario Canada.

With CORA-X, we don't have to trust anyone with our data!

This why, if CORA is used properly, it is an unbreakable solution!

CORA-X lite is standalone program that can be installed on your computer and will lock/unlock your files/folders. It is secure and available free of charge from the Microsoft Store.

At this time, CORA-X requires Windows 10 or later.

The main advantages to using CloudCORA subscriptions are:

  1. Dispersed files: your MUP (encryption key) is dispersed, requiring at least 3 separate files which are loaded once into memory. These files should be dispersed onto 'different' devices. Having at least one of these files 'in the Cloud' makes hacking irrelevant.
  2. streams your dispersed file(s) and/or CORA blocs so that a copy isn't maintained on your computer.
  3. will not keep 'all' of your dispersed files, or CORA blocs; some will necessarily remain on your computer.
  4. This provides you will enhanced security and peace of mind, knowing that the fragments you keep in CloudCORA are useless by themselves!

Read more »

Originally CORA was designed and developed as a sole proprietorship named The author of CORA who is the Director and President of CORAcsi has enjoyed a vast array of professional experiences spanning Physics, law enforcement and teaching.

"CORA began in 2008 as a desire and inspiration to protect Mr. Latouf's personal data and software in a manner that was superior to encryption, which has been known for over a decade to be limited and breakable."

Mr. Latouf's fascination with data-security began with prime numbers and a prime number generator.

Recently the global community has discovered that factorization-based encryption will be antiquated by quantum computers.

CORA is a step beyond encryption because:

  1. It is probabilistic rather than factorization based.
  2. It is distributed; each encrypted item results in 2-40 CORA blocs. That's correct, even the number of CORA blocs involves permutations and combinations (probabilistic).
  3. CORA's encryption key is called a MUP (Multiple Use Pad). MUPs used by CORA-X lite begin at 1,000,000 bits in length (that right, 1 million bit encryption), and, no two MUPs need be the same length. The length of each MUP varies in accordance with our commitment to 'probabilistic encryption'.