Communication
Introduction.
Over the past few decades, technological advancements have provided us with many tools that make our lives easier. Computers, the internet, mobile phones, and tablets have become part of our reality. Along with the development of these technologies, many instruments have emerged that allow for the control of our activities, analysis of our behavior, and direct access to many of our confidential data, including those related to our business activities, strategic plans, or know-how. In these conditions, industrial espionage has taken on a completely new dimension.
The huge problem is the shockingly low level of skill in operating these devices by their users. Most people cannot properly configure a phone or use a computer. Yes, we are also talking about those who are proud, “advanced” users of top devices and play with their “toys” every day. They obviously only use some of their functions, having no idea about their capabilities or the threats they generate.
You may think it’s fiction, but just check what permissions the programs installed on your smartphone have to realize the scale of this problem. Know that by installing many popular applications or activating those natively embedded in the operating system, you consent (probably unwittingly) to their full access to many pieces of information that no one would probably want to publicize consciously.
These applications, and consequently their creators, often an entire staff of people (not to mention various services), can read your SMS/MMS, email. They know what, to whom, and when you wrote through an internet messenger, they know your calendar, your payment card numbers, passwords for electronic banking. They can browse, edit, and independently add new contacts, you give them access to photos and videos and other files you store on your devices. You allow them to use the camera without your knowledge. The standard is recording sound from the immediate surroundings through the microphone, and not only when you call someone. Applications continuously collect data about your location, using data from GSM base stations, Wi-Fi networks, and GPS/GLONASS.
If you add to this the ability to make phone calls independently and analyze data about your body through sensor-equipped accessories that you may use and realize that by correlating data from other users’ devices, one can very precisely determine who, where, and when you meet, what you do and what you talk about, you will probably start to wonder if it would be worth doing something to protect the most confidential data concerning your company.
Still have doubts whether these data are really collected? And what do you think, where does the map navigator in your “cell” know exactly where the traffic jams are and how long you will stand in them? Now you know - among others, from you!
Business communication rules.
Below you will find a brief description of the communication methods accepted by us. This small primer will allow you to take the first steps towards increasing the level of security, confidentiality, and anonymity of transmitted documents and information. You can also use it in contacts with other entrepreneurs and in private life. Remember that we only describe here some issues that are important from our point of view. This article does not exhaust the subject.
- We limit the use of phones.
We use phones exclusively for short conversations that do not contain significant information. This applies to both mobile and landline phones as well as VoIP.
- We use Signal Private Messenger for communication.
You can install the application for free on smartphones with Android and iOS systems. It allows for voice and video calls, sending text messages and files in the end-to-end encryption standard with a key inaccessible even to the creators of this software. Currently, it is the best and most time-tested open-source software that provides such a high standard of security and confidentiality. We do not use other messengers.
- We encrypt email messages.
We reject the possibility of sending and receiving unencrypted messages, regardless of the servers from which the mail is sent (the same applies to shared files). To facilitate, we recommend our clients create a mailbox on the protonmail.com server and use it to correspond with us. Protonmail, even in the free version, offers an absolutely uncompromising and secure system of automatic encryption of messages sent between its users. It is the safest service of this type in the world, additionally offering all its users VPN. The entire platform is, of course, built on Open Source software. You can use Protonmail on any computer and devices with Android and iOS systems.
- We care about comfort during meetings.
When participating in meetings, we want the place where they take place to provide an appropriate level of privacy. We do not agree to conduct business conversations in public places, such as pubs, restaurants, hotel lobbies, sports clubs, saunas, etc. During important meetings, we put phones aside. Meetings cannot be attended by outsiders. We do not talk over alcohol, as well as with people under its influence. The same applies to other psychoactive substances.
- We anonymize some activities.
In certain special situations, we may decide that part of the communication, as well as internet activities related to the implementation of a given project, will take place exclusively using the Tor network.
- We record important arrangements.
We keep written records of all business arrangements to ensure transparency throughout the cooperation process. It is available to all interested parties during the execution of the order. After its completion, depending on the type of order, it remains as a document confirming the fulfillment of obligations or is commissionally destroyed. We prefer the latter variant.
This is a key element of our strategy. What we work on remains between us and our contractors. We expect our business partners to reciprocate. If it is not necessary to ensure the smooth implementation of the project, we do not want our contractors to disclose strategically important information to us. Neither to us nor to anyone else!
- We do not agree to publicize our work.
We do not agree to publish information about our cooperation in the media and on social networking sites. We forbid posting any information about the members of our team without written consent. This applies to both our personal data, photographs, and other information concerning our organization. We do not seek publicity. We are not interested in popularity. We do not need to experience recognition and do not boast about what we do. We know our role and know that after completing the order, we will leave without fanfare and fireworks. And that’s what we really like