{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":698703186,"defaultBranch":"main","name":"Quanty22","ownerLogin":"Quanty22","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2023-09-30T17:47:20.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/146573209?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1696096171.0","currentOid":""},"activityList":{"items":[{"before":"8abba65ff3573ee90db555071010fd4a6dc803fb","after":"daf410925a200fa1e0384372804255e9bcf0c996","ref":"refs/heads/main","pushedAt":"2024-02-24T12:34:36.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"Quanty22","name":" 8(to)7","path":"/Quanty22","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/146573209?s=80&v=4"},"commit":{"message":" README.md","shortMessageHtmlLink":" README.md"}},{"before":"c425385907bb664182712a9ce182b2afdf26cb35","after":"8abba65ff3573ee90db555071010fd4a6dc803fb","ref":"refs/heads/main","pushedAt":"2024-01-03T21:36:56.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"Quanty22","name":" 8(to)7","path":"/Quanty22","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/146573209?s=80&v=4"},"commit":{"message":"Q&A on White Noise compression","shortMessageHtmlLink":"Q&A on White Noise compression"}},{"before":"6377ee9d304823eb47d07aadcd0a6679519bf1bf","after":"c425385907bb664182712a9ce182b2afdf26cb35","ref":"refs/heads/main","pushedAt":"2023-12-15T21:02:06.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"Quanty22","name":" 8(to)7","path":"/Quanty22","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/146573209?s=80&v=4"},"commit":{"message":"Curious about how 8(to)7 Post-Quantum Encryption can revolutionize the world?","shortMessageHtmlLink":"Curious about how 8(to)7 Post-Quantum Encryption can revolutionize th…"}},{"before":"f84940e709af37b665f3a4cf30898a357cc89774","after":"6377ee9d304823eb47d07aadcd0a6679519bf1bf","ref":"refs/heads/main","pushedAt":"2023-11-03T20:50:55.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"Quanty22","name":" 8(to)7","path":"/Quanty22","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/146573209?s=80&v=4"},"commit":{"message":"Read to proceed","shortMessageHtmlLink":"Read to proceed"}},{"before":"e297979c18b9ee7eea934c3c0f34c57cfd2e998b","after":"f84940e709af37b665f3a4cf30898a357cc89774","ref":"refs/heads/main","pushedAt":"2023-11-03T20:44:28.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"Quanty22","name":" 8(to)7","path":"/Quanty22","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/146573209?s=80&v=4"},"commit":{"message":"Global policy on encyption","shortMessageHtmlLink":"Global policy on encyption"}},{"before":"795e6f052bea35a5167c96fc4cac0685ac81b941","after":"e297979c18b9ee7eea934c3c0f34c57cfd2e998b","ref":"refs/heads/main","pushedAt":"2023-11-03T20:35:33.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"Quanty22","name":" 8(to)7","path":"/Quanty22","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/146573209?s=80&v=4"},"commit":{"message":"Global policy 8-7 on Encryption","shortMessageHtmlLink":"Global policy 8-7 on Encryption"}},{"before":"033dd7418ffd9bc3d538605dfc03c483685e80ee","after":"795e6f052bea35a5167c96fc4cac0685ac81b941","ref":"refs/heads/main","pushedAt":"2023-11-03T20:32:52.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"Quanty22","name":" 8(to)7","path":"/Quanty22","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/146573209?s=80&v=4"},"commit":{"message":"README.on global policies on Encryption","shortMessageHtmlLink":"README.on global policies on Encryption"}},{"before":"a2fcf7a89cc6b88dfeed6ff9a6ed2eeac4fc5fd7","after":"033dd7418ffd9bc3d538605dfc03c483685e80ee","ref":"refs/heads/main","pushedAt":"2023-11-03T00:00:11.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"Quanty22","name":" 8(to)7","path":"/Quanty22","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/146573209?s=80&v=4"},"commit":{"message":"README.md","shortMessageHtmlLink":"README.md"}},{"before":"77a63ba33a20bb5338d607916ad44193ac0892dc","after":"a2fcf7a89cc6b88dfeed6ff9a6ed2eeac4fc5fd7","ref":"refs/heads/main","pushedAt":"2023-11-02T23:58:56.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"Quanty22","name":" 8(to)7","path":"/Quanty22","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/146573209?s=80&v=4"},"commit":{"message":"README.md","shortMessageHtmlLink":"README.md"}},{"before":"8d41ffee48dc97e2282fc893920b9775b66de8f3","after":"77a63ba33a20bb5338d607916ad44193ac0892dc","ref":"refs/heads/main","pushedAt":"2023-10-04T15:41:48.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"Quanty22","name":" 8(to)7","path":"/Quanty22","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/146573209?s=80&v=4"},"commit":{"message":" README.md","shortMessageHtmlLink":" README.md"}},{"before":"ebe3854d956c58a75918de1e7be3b3ea1c87d487","after":"8d41ffee48dc97e2282fc893920b9775b66de8f3","ref":"refs/heads/main","pushedAt":"2023-10-01T18:35:13.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"Quanty22","name":" 8(to)7","path":"/Quanty22","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/146573209?s=80&v=4"},"commit":{"message":"Update README.md","shortMessageHtmlLink":"Update README.md"}},{"before":"9ff87e485bf05dff2c4b9873a43831388b01a456","after":"ebe3854d956c58a75918de1e7be3b3ea1c87d487","ref":"refs/heads/main","pushedAt":"2023-10-01T17:25:45.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"Quanty22","name":" 8(to)7","path":"/Quanty22","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/146573209?s=80&v=4"},"commit":{"message":"Update README.md","shortMessageHtmlLink":"Update README.md"}},{"before":"46b1227ddcfd844223f0d1e543499a108ffe2ad8","after":"9ff87e485bf05dff2c4b9873a43831388b01a456","ref":"refs/heads/main","pushedAt":"2023-10-01T09:14:38.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"Quanty22","name":" 8(to)7","path":"/Quanty22","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/146573209?s=80&v=4"},"commit":{"message":"Update README.md\n\nEight to Seven - Encryption as a Service\r\n\r\nIntroduction\r\nWelcome to the Eight to Seven GitHub repository! This repository houses the open-source code and resources for the Eight to Seven Encryption as a Service platform. Eight to Seven is a cutting-edge encryption solution that aims to revolutionize data protection and privacy.\r\n\r\nAbout Eight to Seven\r\nAt Eight to Seven, we believe that encryption is the key to safeguarding sensitive data in an increasingly digital world. Our platform offers a strong and efficient approach to thwart cyber attacks and protect your valuable information from unauthorized access.\r\n\r\nKey Features\r\nHigh-Speed Quantum Encryption: Our technology enables molecular transformation through DNA, ensuring unparalleled levels of protection.\r\nFor the Encrypted data, Our solution employs new generations of encryption algorithms with advanced data archiving encryption enhanced by transformation in the form of high-entropy information bundles.\r\nSmooth Integration: Eight to Seven facilitates secure collaboration and seamless integration with third-party systems across various industries.\r\nIndustry-specific Solutions: We provide tailored encryption solutions for industries such as healthcare, retail, automotive, education, fintech, and government.\r\nContact us for deploying and or support on your upcoming 8)To)7 project\r\n\r\nGetting Started\r\nTo get started with Eight to Seven, follow these steps:\r\n\r\nDemo: Experience the power of Eight to Seven by requesting a demo on the official website.\r\nFull Version: Upgrade to the full version of Eight to Seven for comprehensive data protection and advanced encryption capabilities.\r\nContributing\r\nWe welcome contributions from the open-source community to enhance the Eight to Seven platform. If you have any bug reports, suggestions, or feature requests, please open an issue or submit a pull request.\r\n\r\nLicense\r\nThis project is licensed under the GPL License. Feel free to explore and examen the code for your own projects or contribute to the Eight to Seven platform.\r\nWe will also open two communication channels\r\n1-Public\r\n2-Semi public (ask to join if you are a Researcher or Professor in Cryptography who wants to contribute to our code.)\r\n\r\n\r\nThis a a new way of Encryption so for all your questions \r\nContact\r\nFor more information about Eight to Seven, visit our website or contact us directly at quanty22@eighttoseven.com.\r\nWe consider 8(to)7 as an authentic 100% post-quantum encryption","shortMessageHtmlLink":"Update README.md"}},{"before":"864b49cd8e4fe6a31b44a74414a04681f9a4b0fc","after":"46b1227ddcfd844223f0d1e543499a108ffe2ad8","ref":"refs/heads/main","pushedAt":"2023-10-01T09:12:39.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"Quanty22","name":" 8(to)7","path":"/Quanty22","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/146573209?s=80&v=4"},"commit":{"message":"Update README.md","shortMessageHtmlLink":"Update README.md"}},{"before":"1aed27a09daa2ce6a1c71b3335d2f5df3a8b7774","after":"864b49cd8e4fe6a31b44a74414a04681f9a4b0fc","ref":"refs/heads/main","pushedAt":"2023-09-30T18:12:37.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"Quanty22","name":" 8(to)7","path":"/Quanty22","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/146573209?s=80&v=4"},"commit":{"message":"Update README.md","shortMessageHtmlLink":"Update README.md"}},{"before":"18d8196d86736d5580ce82bc755f41b8a09afdec","after":"1aed27a09daa2ce6a1c71b3335d2f5df3a8b7774","ref":"refs/heads/main","pushedAt":"2023-09-30T18:10:38.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"Quanty22","name":" 8(to)7","path":"/Quanty22","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/146573209?s=80&v=4"},"commit":{"message":"Update README.md","shortMessageHtmlLink":"Update README.md"}},{"before":"cb58152f375a756b1fe27a6e8e2eeefc6c1f2b54","after":"18d8196d86736d5580ce82bc755f41b8a09afdec","ref":"refs/heads/main","pushedAt":"2023-09-30T18:04:12.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"Quanty22","name":" 8(to)7","path":"/Quanty22","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/146573209?s=80&v=4"},"commit":{"message":" README\n\nIn today’s digital age, protecting sensitive data has become a critical concern for individuals and organizations around the world. With cyberattacks on the rise and vulnerabilities in cloud services, there is a growing need for robust encryption solutions that can safeguard valuable assets. This is where Eight to Seven comes in. With their cutting-edge technology and innovative approach, they are revolutionizing the field of encryption as a service.\r\n\r\nHigh-Speed Quantum Encryption:\r\n\r\nAt the core of Eight to Seven’s offering is their high-speed quantum encryption technology. With the ability to encrypt data at your fingertips, they provide a seamless and efficient solution for securing sensitive information. By leveraging the power of quantum mechanics, Eight to Seven ensures that your data remains protected from unauthorized access. This advanced encryption technique surpasses traditional encryption methods, offering enhanced security and peace of mind.\r\n\r\nCountering Cyber Threats:\r\n\r\nThe digital landscape is fraught with various cyber threats, such as spear phishing, cloud vulnerabilities, and ransomware attacks. Eight to Seven’s encryption solution offers a strong and effective approach to countering these attacks. By encrypting data, they add an additional layer of security, making it virtually impossible for hackers to decipher the information. This helps to prevent data breaches, maintain privacy, and protect against reputational damage.\r\n\r\nSeamless Integration and Industry Applications:\r\n\r\nOne of the key strengths of Eight to Seven is their ability to facilitate secure collaboration and integration across multiple parties and industries. Whether it’s in healthcare, retail, automotive, education, fintech, or government, Eight to Seven ensures that sensitive data such as client details, intellectual assets, and confidential files remain protected.\r\n\r\nHealthcare Scenario:\r\n\r\nIn the healthcare industry, patient data security is of utmost importance. Eight to Seven’s encryption solution ensures that sensitive patient information, including medical records and billing details, remains confidential and secure. By implementing robust encryption, healthcare providers can prevent unauthorized access to patient data and safeguard against potential healthcare data breaches. This not only protects patient privacy but also helps healthcare providers comply with regulations like HIPAA, avoiding costly penalties and damage to their reputation.\r\n\r\nRetail Scenario:\r\n\r\nWith the growing reliance on online transactions, retailers handle vast amounts of customer data that needs to be protected. Eight to Seven’s encryption safeguards customer information and payment details, reducing the risk of fraudulent activities. By encrypting this data, retailers can maintain customer trust, enhance brand reputation, and provide a secure online shopping experience. Additionally, meeting compliance requirements such as PCI DSS ensures that the retailer is safeguarding customer data according to industry standards.\r\n\r\nAutomotive Scenario:\r\n\r\nAs vehicles become more connected and autonomous, the need for data security increases. Eight to Seven’s encryption technology protects sensitive information about vehicle performance, location data, and personal data from unauthorized access. By encrypting this data, automotive companies can minimize the risk of cyberattacks targeting vehicle systems, ensuring the safety and privacy of both drivers and passengers. Additionally, encrypted data helps manufacturers comply with regulations and build customer trust in the security of their vehicles.\r\n\r\nConclusion:\r\n\r\nIn a world where data breaches and cyber threats are a daily occurrence, the importance of encryption cannot be overstated. Eight to Seven stands at the forefront of encryption as a service, delivering high-speed quantum encryption that protects sensitive data and safeguards valuable assets across multiple industries. With their innovative solutions and commitment to data security, Eight to Seven is redefining the landscape of encryption and ensuring a safer digital future for all. Whether in healthcare, retail, automotive, or beyond, the benefits of implementing Eight to Seven’s encryption solution are clear: enhanced security, compliance with regulations, protection against reputational damage, and peace of mind knowing that sensitive data remains confidential and secure.","shortMessageHtmlLink":" README"}},{"before":null,"after":"cb58152f375a756b1fe27a6e8e2eeefc6c1f2b54","ref":"refs/heads/main","pushedAt":"2023-09-30T17:49:31.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"Quanty22","name":" 8(to)7","path":"/Quanty22","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/146573209?s=80&v=4"},"commit":{"message":"Create README.md","shortMessageHtmlLink":"Create README.md"}}],"hasNextPage":false,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAEA-8TlgA","startCursor":null,"endCursor":null}},"title":"Activity · Quanty22/Quanty22"}