Skip to main content


Showing posts from July, 2016

Ric's Entreprenuer and Inventor Tips for 28th July 2016

Some more tips to pass on:
Stump procrastination with the restart phrase "The next minute is the first minute of the rest of the day." I use this to jump start myself out of a procrastination loop. Sometimes research becomes an endless loop of distractions and next thing you know you are feeling like your day is wasted. Just stop, refocus and cut the wasted time out of your mind.Never miss an opportunity to give warm thanks to someone who has gone out of their way for you. Risking that you made a big thing out of nothing is never as powerful as someone hearing your genuine thanks for making an effort with you.There is a time to be angry but rarely is it warranted more than a few times a year. If you are careful to be angry only when it really matters then people will recognise that the situation is really serious and generally try and fix it. If you are regularly blowing up, people will write you off as a grump. This happened to me this week. Frustration with a situation boi…

The Upside of Mentoring

When I first started helping fellow inventors way back in 2010, it was a way to say thank you to the 2 million Australians who shared their Monday and Saturday nights with me to watch the Australian Story episode covering our win against Microsoft in that year.

Spending Friday mornings, listening to fellow inventors, trying to help them get going and maybe get a patent was a little way of saying thank you to the rest of Australia who shared their support and time.

But something weird also started to happen. By about the 40th person I started to really deeply understand the inventing process. Not because I studied it, but because in explaining something you have to think deeply about it, and next thing you know many of the things that I just did out of repetition started to make so much more sense.

Its's almost as if, when you really want to understand something, you make an effort to help others understand it and voila you really do start to become an expert at it.

Unfortunately …

Can the real Password-less Tech please stand

Two years ago I introduced what I thought was the first password-less logon system in history.

Since that time there have been dozens maybe hundreds of claimers to that throne. Anyone with a thumb print sign-on, or an app that opens their website on a PC is claiming to be password-less.

Well here are some things to consider:

If a web site supplies an app that uses Apple's fingerprint sign-on as a log on capability, is this password-less?
No. If you still have to use a password on ANY of your devices to access your account, you are not password-less. Your password is still stored on their enterprise network and can still be hacked. Password-less means just that... NO PASSWORD.

Just an FYI, Apple's fingerprint scanner is only a surrogate for your password... it just gets sent to the site in the background as a result of you using your thumbprint.. so it is definitely NOT password-less.

Some new technology (such as PING) asks you to open your phone and access a security app every …

Quantum computing and cryptography.. some light reading

Here are some references from one of Australia's leading crypto experts who recently shared his expertise with us at Haventec. All I can say is that we are entering a dangerous new world.
Really great explanation of real life Qubit building scenario
Explains the growing concern for cryptographers over Quantum computers cracking/ brute force capability
A report from Feb 2016 outlining specific implications of quantum computing an specific cryptographic uses.

Digi.Me allowing personal control of your own data. But can the model work?

Just had a friend send me a link as follows: bags $6.1M to put users in the driving seat for sharing personal data TechCrunch article. What a great little project with incredibly ambitious plans. From what I can tell here is their approach... Google gets to leverage their incredible user base by offering services in return for looking over the shoulder of their users and monetizing what they find out, usually by advertising. asks users upfront to trust them with your personal data and then goes about hawking it or distributing it with your express approval. If it is used by a company for income then they may sure you as the user gets a benefit.. but the basic difference is that Google asks for forgiveness after the fact of sharing your data (while assuring us they will "do no evil") and asks for permission... up front.
This approach will be a long haul. But it's a big prise.
Could Haventec do this with their Digital Wallet product? Maybe. 

A fundamental communications, networking and data sharing security fabric

An influential and strategic thinking guru who is also a friend of Haventec asked us a thought provoking question:

"have you developed a new and more fundamental communications, networking and data sharing security fabric within which blockchain applications and other applications can securely operate."
In typical nerd fashion I replied that: It's simply a way for people to securely connect to enterprise networks without sharing any personally identifiable information,A way to share private information only when and where they want to, and to have control over how that information is used and stored.And finally a way to help ensure that computers on any network can have confidence in the other computers they are connected and talking to... oh, and to allow other application to piggyback that capability so they too can be sure that there is no one faking their identity and misusing the trust that is assumed and indeed essential on any important network. On reflection fabri…

Some Competitive Clarity for Haventec

Because Haventec has branched out from a core of Authentication to secure personal data management and Blockchain applications, it may be a bit confusing to work out what space the company is focussed on and who and who are not Haventec competitors.

First of all it is important to understand how Haventec's three core products fit together.
Haventec Authentication enables users to securely connect to even high security enterprise networks without storing any personal information on the network. Plus it does not rely on thumbprints or facial recognition or any other device specific capability. You can use a multitude of user identity methods but the key thing is that nothing hackable gets stored on the server or network so it solves the biggest issue facing enterprise C suite decision makers… how to limit breach risk.
Haventec Digital Wallet moves sensitive information off corporate networks onto users devices but secures them by physically separating the location of the data (on us…
Real Time Web Analytics