<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Categories | XQ Message Forum — XQ Message Forum</title>
        <link>https://community.xqmsg.com/</link>
        <pubDate>Sun, 12 Apr 2026 22:18:08 +0000</pubDate>
        <language>en</language>
            <description>Categories | XQ Message Forum — XQ Message Forum</description>
    <atom:link href="https://community.xqmsg.com/categories/security-model/feed.rss" rel="self" type="application/rss+xml"/>
    <item>
        <title>Encryption and Decryption Process</title>
        <link>https://community.xqmsg.com/discussion/66/encryption-and-decryption-process</link>
        <pubDate>Wed, 14 Apr 2021 01:03:13 +0000</pubDate>
        <category>Security Model</category>
        <dc:creator>Brian Wane</dc:creator>
        <guid isPermaLink="false">66@/discussions</guid>
        <description><![CDATA[<p>Encryption Process:&nbsp;</p><p>Once a message is created, it must be encrypted. XQ&rsquo;s process begins with retrieving quantum entropy from the XQ quantum server to either be used as the secret key for the encryption or as a seed for generating a new key pair. After the quantum entropy is received, the encryption is configured using a selected cryptographic library, such as OpenSSL. Next, the user is validated via the subscription server, returning a pre-auth token. The account is either confirmed via confirmation email or via API call with associated PIN from email and pre-auth token. Once the account is activated, the pre-auth token is submitted to the subscription server to receive an access token. The key is then submitted to the server with the access token and the recipient address. An encrypted packet is received which is then submitted along with the same access token to the validation server. The packet is verified and a locator token is returned, which will be used by the recipient to request the key.</p><p><br /></p><div>
    <div>
        <a href="https://lh3.googleusercontent.com/JvcQ0pgKNQHyeOytjsGM_QbUmIafDA1gE72A0h-z0jSG7dGfJsMr6zFQAOFS1q3TMvxyvmyYTXds2yCl1CmPXuUoEmisxjBH38py2IANOwCqd4yQY_O3VO1RsJPKdffdLqIHg8o" rel="nofollow noopener" target="_blank">
            <img src="https://lh3.googleusercontent.com/JvcQ0pgKNQHyeOytjsGM_QbUmIafDA1gE72A0h-z0jSG7dGfJsMr6zFQAOFS1q3TMvxyvmyYTXds2yCl1CmPXuUoEmisxjBH38py2IANOwCqd4yQY_O3VO1RsJPKdffdLqIHg8o" alt="JvcQ0pgKNQHyeOytjsGM_QbUmIafDA1gE72A0h-z0jSG7dGfJsMr6zFQAOFS1q3TMvxyvmyYTXds2yCl1CmPXuUoEmisxjBH38py2IANOwCqd4yQY_O3VO1RsJPKdffdLqIHg8o" />
        </a>
    </div>
</div>
<p><br /></p><div>
    <div>
        <a href="https://lh6.googleusercontent.com/dX2xN-6co9Hk7lzRQAEzdUXLDEIAs0a0DMu2rDqSue7rYj49s68t0RhsWoaqmmq3W4KkLc9DnNOgCgFTGG3h5KK9zCg2iw68GPyjtxO1IV6MLgrE1fZmZh0Bzu3Q7ku3IznRoGk" rel="nofollow noopener" target="_blank">
            <img src="https://lh6.googleusercontent.com/dX2xN-6co9Hk7lzRQAEzdUXLDEIAs0a0DMu2rDqSue7rYj49s68t0RhsWoaqmmq3W4KkLc9DnNOgCgFTGG3h5KK9zCg2iw68GPyjtxO1IV6MLgrE1fZmZh0Bzu3Q7ku3IznRoGk" alt="dX2xN-6co9Hk7lzRQAEzdUXLDEIAs0a0DMu2rDqSue7rYj49s68t0RhsWoaqmmq3W4KkLc9DnNOgCgFTGG3h5KK9zCg2iw68GPyjtxO1IV6MLgrE1fZmZh0Bzu3Q7ku3IznRoGk" />
        </a>
    </div>
</div>
<p></p><p><br /></p><p>Decryption:&nbsp;</p><ol><li>Client receives encrypted message and the token</li><li>Client makes request to XQ backend and passes access token and the token extracted from the message</li><li>Backend checks that access token received is valid and checks that the user who sent the token is a valid user and allowed to view the message</li><li>After user is validated as a recipient, backend sends encryption key to that client</li><li>Client uses encryption key to decrypt the data.&nbsp;</li></ol><p><br /></p><div>
    <div>
        <a href="https://lh3.googleusercontent.com/MyrjHBpp5UJODiL7Rh2vJkwVgFHALCipoO5f1v58mncYWmzPtGjyCsFuhb2ylRnoEVfXBl0CeeHBlesz4rHIPzFw43hWluEJOcvmoTUM41JgF48EJ9o7cchugBaj1Wamidw7srU" rel="nofollow noopener" target="_blank">
            <img src="https://lh3.googleusercontent.com/MyrjHBpp5UJODiL7Rh2vJkwVgFHALCipoO5f1v58mncYWmzPtGjyCsFuhb2ylRnoEVfXBl0CeeHBlesz4rHIPzFw43hWluEJOcvmoTUM41JgF48EJ9o7cchugBaj1Wamidw7srU" alt="MyrjHBpp5UJODiL7Rh2vJkwVgFHALCipoO5f1v58mncYWmzPtGjyCsFuhb2ylRnoEVfXBl0CeeHBlesz4rHIPzFw43hWluEJOcvmoTUM41JgF48EJ9o7cchugBaj1Wamidw7srU" />
        </a>
    </div>
</div>
<p><br /></p>]]>
        </description>
    </item>
    <item>
        <title>Zero Trust Model</title>
        <link>https://community.xqmsg.com/discussion/65/zero-trust-model</link>
        <pubDate>Wed, 14 Apr 2021 00:44:03 +0000</pubDate>
        <category>Security Model</category>
        <dc:creator>Brian Wane</dc:creator>
        <guid isPermaLink="false">65@/discussions</guid>
        <description><![CDATA[<p>Zero Trust is a new security architecture where users do not need to trust the system. The Zero Trust approach is used in services such as Blockchain-based transaction systems. XQ Message is the first Internet-scale data protection solution to incorporate a Zero Trust security model.</p><p>XQ key generation and distribution system operate outside the security of a mobile or cloud app. XQ only handles policy-based key distribution (never the data). Moreover, regulated enterprises have the option of running XQ&rsquo;s software in their own AWS account or server.&nbsp;&nbsp;</p><p>Another important aspect of XQ is that edge based processing model enables every transaction to have a different key.&nbsp; When combined with XQ&rsquo;s out-of-band key distribution, application developers and enterprises benefit from a level of data protection that is unparalleled in Internet-scale systems.</p>]]>
        </description>
    </item>
    <item>
        <title>XQ vs Zscalar</title>
        <link>https://community.xqmsg.com/discussion/73/xq-vs-zscalar</link>
        <pubDate>Fri, 20 Aug 2021 00:19:28 +0000</pubDate>
        <category>Security Model</category>
        <dc:creator>Brian Wane</dc:creator>
        <guid isPermaLink="false">73@/discussions</guid>
        <description><![CDATA[<p>Zscalar is a virtualized VPN&nbsp;while&nbsp;XQ is virtualized software encryption.</p><p>Zscalar is a managed vpn to compete with cisco. Though virtual,&nbsp;it&nbsp;is controlling and connecting access to the network, not protecting data at the data access level.</p><p>XQ uses zero-trust to protect the data itself, not the network access as in the case of Zscalar. XQ additionally provides management&nbsp;of content&nbsp;only readable by people/apps/endpoints&nbsp;who&nbsp;are supposed to read it. The&nbsp;content itself is encrypted in a distributed&nbsp;data approach whereas&nbsp;Zscalar&nbsp;is not aware of who or how data is accessed after it arrives at the end destination.&nbsp;</p><p>Zscalar and XQ can work as&nbsp;complements to each other.</p>]]>
        </description>
    </item>
    <item>
        <title>API Key and Bearer Tokens</title>
        <link>https://community.xqmsg.com/discussion/71/api-key-and-bearer-tokens</link>
        <pubDate>Sun, 20 Jun 2021 16:20:23 +0000</pubDate>
        <category>Security Model</category>
        <dc:creator>Brian Wane</dc:creator>
        <guid isPermaLink="false">71@/discussions</guid>
        <description><![CDATA[<p>QUESTION: Do we need both an API key and a bearer token?&nbsp;I tried just sending the bearer token but didn&#39;t have success - outside of potentially setting scopes on the API key, it doesn&#39;t seem like there&#39;s any added security when the API key has the power to authorize as any identity using `/authorizealias`.&nbsp;It seems like we should have some way to enforce the identity of the bearer and not proliferate API keys?</p><p>ANSWER: The API keys are a requirement on our public instance ( and are pretty standard when dealing with 3rd party integrations ), but can be made optional on enterprise deployments by changing the server configuration. However, you will lose a level of traceability since aside from scoping, the API keys are used for identifying the application that is making that call.</p>]]>
        </description>
    </item>
    <item>
        <title>Zero Trust and KMS</title>
        <link>https://community.xqmsg.com/discussion/70/zero-trust-and-kms</link>
        <pubDate>Sun, 20 Jun 2021 16:14:58 +0000</pubDate>
        <category>Security Model</category>
        <dc:creator>Brian Wane</dc:creator>
        <guid isPermaLink="false">70@/discussions</guid>
        <description><![CDATA[<p>The XQ Key Cache can support multiple policies such as IP location, time and tokens.&nbsp;Thus the XQ Key Cache can be configured in any network only to communicate with approved IP addresses.</p><p><br /></p><p>XQ is different than standard envelope encryption as it uses a Zero Trust security model.&nbsp;For example with AWS envelope encryption users need to &ldquo;trust&rdquo; AWS to storing their master key.&nbsp;In contrast with XQ users can have Zero Trust in AWS as they have their own key distribution server which they can operate in AWS, Azure or even a physical server.&nbsp;</p><p><br /></p><p>While XQ seems similar to existing HSM or KMS based key management solutions it is optimized for scale and simplicity while utilizing a true Zero Trust Architecture.&nbsp;With XQ, edge based key distribution &ldquo;distributes&rdquo; the computational load while the ability to deploy an array of XQ Key Caches ensures scale and no single point of failure. When combined with a ZTA based identity-based authorization model, XQ is far more elegant for Smart Energy and Transportation systems.&nbsp;</p><p><br /></p><p>The XQ Key Cache is a fully self-contained key distribution and logging solution but can be combined with HMS/KMS solutions for hybrid solutions.&nbsp;XQ can be used to support frontend IoT sensors and data lakes while KMS would be used only for long term archiving of keys.&nbsp;Thus the use of KMS and cost would be reduced.</p>]]>
        </description>
    </item>
    <item>
        <title>Quantum-Safe Encryption</title>
        <link>https://community.xqmsg.com/discussion/64/quantum-safe-encryption</link>
        <pubDate>Wed, 14 Apr 2021 00:26:22 +0000</pubDate>
        <category>Security Model</category>
        <dc:creator>Brian Wane</dc:creator>
        <guid isPermaLink="false">64@/discussions</guid>
        <description><![CDATA[<p>Any type of cryptographic algorithm requires a multi bit key to encrypt data. Longer keys are exponentially more difficult to crack. With any type of cryptographic cipher, the problem arises in the transmission of the key between the sender and receiver, as well as key strength. In addition, the ability to verify authenticated identity across open systems and to transparently verify the actions taken against the data that traverses such open systems.</p><p><br /></p><p>XQ generates quantum-safe keys that are virtually impossible to crack via brute force attacks while also providing the capability to manage encryption keys via a secure tokenization process.&nbsp;</p><p><br /></p><p>XQ does not require current technology stacks to be uprooted and replaced, but instead is categorized as a Quantum-Safe Encryption as a Service (QEaaS) solution that is layered on top of existing security controls to enhance security via stronger encryption and secure key management. Users and applications can encrypt data on edge devices either via XQ&rsquo;s applications or via use of XQ&rsquo;s APIs and SDKs.</p><p><br /></p><p>Only users who are valid recipients of the message can receive the decryption keys. As a result, a user who is not a valid recipient of the message will not be able to retrieve keys, even in the event that the user possesses an XQ token from within the message. The user may have the token, but will not be able to get the encryption key off the server due to the token validation. Therefore, encryption keys are only retrievable by valid recipients of the message.&nbsp;</p><p><br /></p><p>XQ also provides the capability of message tracking and revocation. All messages are tracked by their status, as well as IP address of accessing recipient. If a message is sent accidentally or the recipient is deemed not longer valid, the sender can revoke the message. In the event that the recipient uses the token to try to retrieve the encryption key, it will not be possible due to the message previously being revoked.</p>]]>
        </description>
    </item>
    <item>
        <title>XQ SMART Architecture</title>
        <link>https://community.xqmsg.com/discussion/63/xq-smart-architecture</link>
        <pubDate>Wed, 14 Apr 2021 00:14:29 +0000</pubDate>
        <category>Security Model</category>
        <dc:creator>Brian Wane</dc:creator>
        <guid isPermaLink="false">63@/discussions</guid>
        <description><![CDATA[<p>XQ transforms the apps you already use to make them more secure. We eliminate the single points of failure exposed by cloud SaaS applications. Companies can either adopt our plug-and-play business communication suite or allow developers to have zero trust data protection through an API.</p><p><br /></p><p>XQ has developed a new data protection concept that combines the best features of file encryption and VPNs into one service.&nbsp; With XQ, data is encrypted at the edge device (phone, PC, IoT Gateway) and then routed to one or more destinations.&nbsp; The encrypted data is wrapped in a meta-tag which serves as a pointer to the policies set by the data owner.&nbsp; The policies and keys for access and authorization is sent to a key cache.&nbsp;</p><p><br /></p><p>The XQ backend cache only forwards keys and never touches the data nor knows anything about the edge devices except identity and authorization unless explicitly added to the metadata. All events are automatically logged and geo-tagged to meet compliance requirements as well as instantly detecting data exfiltration attempts. To meet emerging privacy laws such as CCPA and GDPR,&nbsp; XQ provides the option to regulated entities of running their own key cache on a cloud or physical server.</p>]]>
        </description>
    </item>
   </channel>
</rss>
