By Jason Wittick • May 18, 2016

What does ‘Value’ mean to you?


Everyone values different things to different degrees, so the concept of value is entirely subjective and typically relative by definition.  As threats emerge, people adapt their behaviour and habits to protect what is valuable to them, but the digital age has triggered a major shift in how individuals decide and categorize what they value.

Value was a more tangible, objective construct in the past. A physical quantity of one thing would be exchanged for a physical quantity of something else, but in all cases … the actual transactions were based on trading physical artifacts of different but comparative value. Commerce was an entirely physical process and goods had to be owned before they were traded. More recently, seeking convenience has accelerated the digitizing of commerce and encouraged consumers to conduct more and more trade through a proxy like a Debit card or Internet account … making the actual transactions more ethereal and require an extra element of trust. Since no-one is present to actually watch the transactions inside a computer or over the internet, consumers and merchants alike each trust that their proxy and processing service providers are secure and accurate.

Traditionally, assets such as personal or land titles have been among the most valuable of all, each representing a physical location or item, respectively. For high-value assets like land, an individual owns a title while a bank owns the debt used to purchase it. No-one ever actually owns the land itself, but the associated value and debt-service responsibilities transfer to whoever holds or owns that title. If ownership of property is in question, “who” is in dispute can be just as important as “what” is being disputed. The digital age has caused people to become increasingly disconnected from their respective assets and reliant upon a card and code combination proxy for proving they are who they claim to be. Delegating your identity to a set of credentials can present an opportunity for assuming that identity and claiming the assets associated to it. Essentially, we own our identity and it’s our identity owns all our assets and liabilities.

Since a person’s identity is so much more valuable than what they own, identity has become the most coveted commodity of all. If a thief can steal someone’s identity, they can assume ownership of their assets without any of the risks of actually stealing the assets themselves. Why bother defeating security measures to steal something when it is far easier to steal someone’s identity and simply assume ownership of the same? Fingerprint swirls and DNA are typically considered entirely unique identification because they manifest from random processes, but an individual’s identity and information is completely ambiguous while it resides in an electronic environment. Once it has been stolen, identity can be nearly impossible to prove after the fact because we may lose the very means to do so.

We all take the easy road or pick the low-lying fruit whenever we can. It’s natural to do what’s easiest and strive for things to be as convenient as possible, but convenience is a double-edged sword.  While enhancing our efficiency and doing more in less time may sound good, too much convenience can distract us and foster the development of dangerous habits and behaviour. Encryption, passwords and other hardening or security strategies can help to protect our identity, but ultimately … avoiding too much convenience and limiting our exposure is the only guaranteed way of reducing complacency and preserving our assets. Convenience is pervasive, though, and it is not always easy or desirable to avoid it completely.

Luckily, there is a revolutionary data security solution available called DataStealth. It provides all the convenience without the risk of exposure because DataStealth secures the information within your infrastructure so well that even if it is stolen, it is computationally impossible to reproduce, use, or share.

DataStealth Overview

Once your actual data is not available or accessible … even the best hackers cannot steal what is not there. Contact Datex today and learn what DataStealth can do for you!


 Watch the video, learn more.  DataStealth in 60 seconds.

 Watch Now