Technology
Developed Technologies
I have developed open source technologies, NarcoAnalytics and TaxTools and all of the services I offer are built on these. Keeping them open source keeps creates transparency with clients, as they can see the code, while keeping data fully private, as it is not included in the code itself and is stored on secure Linux systems.
For nerds: Both of these technologies have been built in python with pandas, NumPy and plotly libraries. The interface is built with plotly dash. Both of them are available on GitHub at the following link, https://github.com/denarianalytics. You can install the denari toolset with pip by using the command pip install denari.
NarcoAnalytics Technology
NarcoAnalytics, a Business Analytics toolset I developed to be so useful and easy to use that even drug dealers can use it. It has a vast array of analytic and graphical tools available.
TaxTools Technology
TaxTools is a toolset I developed for Tax Optimization. It currently works for the UK but is built to be easily transferable to other nations. The optimization tool can be used to optimize taxes. For example, with this toolset, you can find out the most optimal ratio of salary to dividend payouts to pay the least tax. TaxTools is built in way to be able to assess the impact of tax threshold changes minutes after their announcement.
Open-Source
My Technologies are entirely open-source. This means that that it is publicly available on GitHub and anyone can download, read, build, use and copy my code. This creates transparency and encourages innovation as the code can be checked by anyone with an internet connection and gaps in security and privacy can be flagged. Apps like Signal and systems like Linux are examples of open-source technologies. Open sourcing expands to other areas such as patents. In fact, Tesla’s patents are all currently open-source.
Open-source links Coming Soon. I am figuring out how to use a coding tool called Git which allows me to upload my code to GitHub instantly
Data Security and Privacy
With the rise in cybersecurity threats from external nations and centralisation of technology services in the west, my technologies have been built with data privacy and security in mind. We can even do business with a fully private option where you don’t share any data with me at all and I am currently developing a data scambler which would allow clients to scramble their data before sharing allowing me to analyse trends without ever seeing any real numbers. This option provides the highest level of trust as clients can be assured that their latest numbers can never be shared with any institution.
Linux Systems
Currently, I only use Linux systems to analyse client data. My choice of operating system is Parrot OS Security. It is a very secure and open-source operating system so you don’t need to worry about anyone snooping on your data.
Microsoft Windows machines are easily accessible. The best universities in cyber security such as the Pyongyang Informatics/Information Center (PIC), are based in North Korea where students become elite level hackers and have gone on to steal billions of dollars worth of crypto assets to fund their military hardware. Furthermore, even executed a nationwide cyberattack against the UK’s NHS in 2017 that saw ambulances diverted and patient records deleted. With the increase in cetralisation by western technology companies, people’s business data is becoming increasingly at risk of disruption and theft. China is also an Elite level Cybersecurity player but their interests are based more on espionage and data theft. Another big player in Cybersecurity is the USA. Their interests are similar to China’s in that they are predominantly interested in espionage and data theft, athough, the USA uses political tactics to attain data instead by using the Patriot Act. With this legislation, they can demand and attain information from any indiviudla in any nation who has political affiliations with the USA. The Patriot Act states that the USA can access data, without evidence, that it claims is terror affiliated, meaning that they can attain your data whenever they feel like it just by making a claim that they say is too sensitive to share details of. Swizerland is outside the EU and is not as easily leveraged by the Patriot Act as the UK and EU States. The USA also doesn’t have much leverage over Switzerland in the form of trade or energy security. Furthermore, the Swiss cultural emphasis of data privacy makes them the most trustable nation to defend against the threat of Chinese and North Korean data theft.
The problem is not that these countries are smart, because of course they’re smart, the problem is that our western leaders are dumb. Increased centralisation in the name of liberal agendas and increased government control is beginning to put your data at risk. I stay on top of these issues by using Swiss services and Secure Linux Machines, so rest assured, your data is safe with me.
pCloud
I use pCloud to transfer and store files and I recommend all clients to use it. pCloud is based in Switzerland where data privacy laws are extremely strict, making your data protected from the western centralisation of data.
The most useful advantage of pCloud is that it offers purchase options for cloud storage alongside the subscription model. In other words, you can buy storage space and own it for ever instead of having to pay the subscription unlike other popular cloud services such as OneDrive, iCloud and Dropbox.
Proton Mail
I use ProtonMail to send and recieve emails and I recommend all clients to use it. Like pCloud, Proton Mail is also based in Switzerland where data privacy laws are extremely strict. Furthermore, it is fully end-to-end encrypted, meaning that only our devices can see our email exchanges.