Imagine you were able to take a picture of your hard drive and come back to it whenever you wanted to. This is what an 'image' is. You can create your own computer images, and any computer can be used with these images. We also take your security very seriously, and we selected storage technologies that we feel provides you with exceptional confidentiality, integrity, and availability. When you first store your files they undergo a process called chunking - think splitting up - with each chunk being encrypted with it's own private key and being distributed across a storage network. Also each file is replicated in its entirety in at least 2 locations, so if one location goes down you still have access to your files.
Every time you start up a remote computer the login password is reset with a secure random password. So not only is it one less password for you to keep safe, the password also goes stale when you are finished with the remote computer. To further secure your confidentiality, we have also applied a password policy to the remote computers that will lock any user out after multiple failed attempts to prevent against any brute force attacks.
We built in security features to every computer to provide you with a safe experience when using our service. When you join In One Motion, your first computer starts up from a secure trusted platform v(TPM). From there, each computer that you select will have access to your files that is secured by it's own private/public RSA key pairs. No one else will have access to your files. Also every remote computer has been isolated at the network layer to protect your privacy. And when your finished we completely delete the virtual disk attached to the computer, so if someone else uses the same computer there is no way to recover your files.
In One Motion was built using a mature coding framework that has a robust set of security features built right into it. We scan this codebase for vulnerabilities before we publish any updates - everytime. We also continously monitor the underlying web servers for updates and patch accordingly. Finally, we apply health checks and self healing to every web server so we can preserve the availability of the service to you, should our webservers crash.
Real world analogy: when you go to the airport, you most likely bring your passport to prove your identity. A static IP address and SSL certificate do the same thing. We reserve a global static IP address on your behalf and create a record in our DNS. You can also request a signed certificate to identify the remote computer. Together they create a secure circle of trust, so you can have the confidence that you are logging into the right remote computer everytime.
Protecting your credit card information is mission critical for both parties, and what better way of protecting your information than never seeing your information at all? We never see or store your payment information. So you can rest assured that your information is properly protected.
We also take extreme caution with handling your other personal information. While it may present more marketing oppurtunities to extract more personal information from you - for example requesting cell phone numbers - we as a company feel that protecting your privacy is more important. This is why we take the approach of collecting the least amount of data possible, in order to best serve you. For example this is why we only ask for your first name when signing up, and your password is stored as a one-way hash.