In today’s interconnected digital world, cybersecurity has become one of the most pressing challenges. From artificial intelligence vulnerabilities to third-party access risks, the modern landscape is rife with threats that compromise the security and privacy of personal and corporate communications. The author wrote previously for Stankevicius on DeepSeek, Italy’s Privacy Guarantor & OpenAI’s Allegations and Autonomous AI Agents – The Kraken Wakes?
Whether it’s the interception of sensitive messages, unauthorized data access, or the potential misuse of AI in breaching systems, the question of secure and reliable communication infrastructure has never been more urgent. Of special urgency are Reconnaissance soft targets probing our cyber infrastructure. This is a National Security issue as headlines have shown us entire hospital systems, banking systems and even pharmaceutical systems shut down.
Ransomware Attacks
According to Sean Blanton’s article Ransomware attacks in 2024 have caused over $40 billion in losses, affecting organizations across multiple sectors, including healthcare, government, manufacturing, and finance. The impact ranges from data breaches to operational disruptions, with personal and sensitive information frequently leaked on the dark web. Here are some notable examples:
- City of Columbus, OH: Rhysida stole 3TB of employee and citizen data, later leaked.
- Sumter County, FL Sheriff: Rhysida breached data of 150,000 citizens; ransom set at 7 Bitcoin.
- Keytronic: Black Basta disrupted U.S. and Mexico operations, causing $17 million in damages.
- Disney: NullBulge leaked 1TB of internal Slack data, including unreleased projects.
- UnitedHealth Group: BlackCat stole 6TB of patient data; company paid a $22M ransom.
- loanDepot: A breach affected 16 million customers, disrupting mortgage payments.
- Bucks County, PA: Hackers disabled 911 emergency systems.
HoloSail’s Decentralized Encrypted and Scalable Infrastructure Solution
Enter HoloSail Technologies, a company poised to redefine how we communicate and track information in real-time. With a bold promise to “Revolutionize Your Technology Experience,” HoloSail offers cutting-edge solutions that prioritize security, privacy, and real-time efficiency. At the heart of their approach is HoloStacks, a scalable, decentralized, and zero-trust infrastructure designed to safeguard every aspect of communication and data sharing.
For example: HoloStacks is a custom Zero-Trust, decentralized encrypted and scalable infrastructure solution. Zero-Trust, End-to-End Encrypted, Peer-to-Peer Connections enable seamless and secure data channels between you and your people. Encryption happens in real time, which means that your data won’t be intercepted or pass through a server before getting to you. Within HoloStacks, Haven products or other applications can function as individual modules or together as one ecosystem. No data ever leaves the ecosystem and can be shared via peer to peer encryped connections to others outside the HoloStack.
By leveraging end-to-end encryption, peer-to-peer connections, and real-time data analytics, HoloSail ensures that communications remain uncompromised – free from the prying eyes of third-party servers. Their dedication to secure video conferencing, customizable real-time dashboards, and 24/7 security monitoring makes them a trusted choice for businesses operating in high-security environments.
As the US faces a growing wave of cybersecurity concerns fueled by AI advancements and the increasing risk of data breaches, companies like HoloSail are stepping up to provide innovative solutions.
Interview
The author was privileged to sit down with John Walker, CEO of HoloSail Technologies, to discuss the company’s mission, its groundbreaking technology, and the broader implications of cybersecurity in today’s AI-driven world. The following interview was conducted on February 10th, 2025, and has been edited for clarity and brevity.
John Walker, CEO of Hollow Sail Technologies (Interviewee): My name is Johnny Walker -like the Scotch. I am the CEO of Hollow Sail Technologies. We specialize in decentralized computing off the cloud, without using blockchain. Our technology can be deployed on a cloud or on a local device, but we decentralize the data-transfer architecture so it remains highly cybersecure. We’re very proud of our product.
Autonomy vs. Human Oversight in AI
Dr. Cowin:
Because you specialize in cybersecurity, I would like to begin with a question about autonomy versus human oversight. What level of human oversight should be required for AI systems that make critical decisions?
John Walker, CEO of Hollow Sail Technologies (Interviewee):That is an excellent question, although the answer often leads to further questions. “AI” is somewhat of a misnomer—it is neither truly “artificial” nor genuinely “intelligent.” If we are talking about critical decisions, do we really want a machine with no empathy, no compassion, and no real-life experiences making those decisions? Wouldn’t it be better to have a human—someone who understands empathy, compassion, and ethical consequences – play a central role in critical decision-making?
Dr. Cowin:
So you advocate for keeping the human in the loop, ensuring there is always human oversight acting as a guardrail against 100% algorithmic, autonomous decision-making?
John Walker, CEO of Hollow Sail Technologies (Interviewee): Absolutely. You cannot remove humans from the loop entirely. If you do, you rely on “AI bias” or “machine learning bias,” which is not always correct. Even if you program the best possible ethical data into these models, there will inevitably be unforeseen situations. Humans must remain involved if we want truly ethical AI.
Dr. Cowin:
And, as you mention, large language models can sometimes collapse under their own synthetic data. Let’s move to privacy. With AI systems increasingly processing personal data, how can regular consumers ensure their privacy and data protection?
John Walker, CEO of Hollow Sail Technologies (Interviewee): This is a complicated issue. Our company, Hollow Sail Technologies, focuses on a decentralized architecture for computing. You can integrate AI into a decentralized framework, meaning your personal data stays protected—almost like locking it in a safety deposit box. If you need AI to access your data, you, as the data owner, decide what is exposed and when. This can be used by corporations for intellectual property, by banks, in healthcare systems, and even by the Department of Defense.
Biggest Cybersecurity Risks
Dr. Cowin:
What do you see as the biggest cybersecurity risks on the market right now, particularly for personal data?
John Walker, CEO of Hollow Sail Technologies (Interviewee): One of the biggest risks is that the majority of our personal data gets funneled into apps that use multiple third parties. Those third parties, in turn, connect to more third parties, creating an almost endless chain. We often do not read the terms of use, and we generally do not realize that once we input our data, we often relinquish ownership.
At Hollow Sail Technologies, we aim to restore “data sovereignty.” Any data that enters our architecture remains owned and controlled by you. For instance, consider the scandals where social media platforms sold personal data or shared it with large conglomerates without users’ explicit knowledge. In our model, it is not possible to access data you never consent to share.
Ransomware Attacks and Cloud Security
Dr. Cowin:
Ransomware attacks increasingly target cloud infrastructures. What strategies can companies adopt to prevent these breaches, which can be extremely difficult to resolve?
John Walker, CEO of Hollow Sail Technologies (Interviewee):
The cloud environment developed quickly as the volume of data exploded. Think back to dial-up modems – phishing and spam were much less of a concern because the data footprint was smaller. Once data became the “new gold,” vast cloud storage and data centers emerged almost overnight. In this hurried expansion, solutions to secure data comprehensively often lagged behind.
Our decentralized approach can be deployed over the cloud. Imagine having an umbrella in a storm: you still store data, but it remains segmented and protected in individual “safes.” Each “safe” is secure, and when you share data externally, you only share a specific piece through a controlled channel—no open door remains behind.
Geopolitical and National Security Implications
Dr. Cowin:
From a geopolitical standpoint, how vulnerable do you believe U.S. data centers are to potential adversarial nations?
John Walker, CEO of Hollow Sail Technologies (Interviewee): I speak with deep concern as a U.S. Marine Corps veteran and a 9/11 first responder. Our critical infrastructure – power grids, water systems, hospitals, telecommunications – could, in the worst-case scenario, be disrupted in minutes by sophisticated cyberattacks from adversaries. I see insufficient evidence that our current systems can fully prevent such an attack. We need more robust solutions, including truly decentralized architectures, if we want to mitigate these severe vulnerabilities.
The Danger of Third-Party Vendors
Dr. Cowin:
You mentioned the role of third-party vendors and how they can open security holes. Many of us have numerous apps connected to our accounts – sometimes without fully realizing the privacy implications. How does this reliance on third-party vendors increase security vulnerabilities in both private and public cloud environments?
John Walker, CEO of Hollow Sail Technologies (Interviewee): It creates a revolving door. Five or so major tech companies dominate the market; each has contracts with thousands of smaller third-party vendors, who themselves connect to further vendors. This cycle continues until it becomes extremely difficult to know who has access to your data.
Complicating things, these major companies also invest in cybersecurity firms that diagnose vulnerabilities but often do not fix the structural issues. Meanwhile, consumers and businesses remain exposed. Our decentralized model offers an alternative: data sovereignty, combined with secure, “one-way-out” data sharing.
Balancing Security Measures and Operational Efficiency
Dr. Cowin:
How can organizations strengthen security measures without disrupting operational efficiency?
John Walker, CEO of Hollow Sail Technologies (Interviewee): In our own solution, we are “agnostic” to the existing software ecosystem. Companies have spent years developing IT solutions on large-scale clouds (such as AWS and Google). We allow them to bring these solutions inside our architecture via APIs or Docker Swarm integration. This means they can continue using familiar tools while placing data in a “hollow safe,” which remains sovereign to them.
When you do need to send specific files or pieces of information outward, you move only that fragment—no critical data rides along. That is how we have eliminated threats like ransomware or phishing within our own operations. We have a fully featured suite of platforms – video meetings, file sharing, live streaming, logistics, and more – all running securely and decentralized.
Dr. Cowin:
Thank you, John, for a very informative discussion. In an era where almost everyone has received a data breach notification, it is helpful to learn about decentralized architectures as a potential solution. I appreciate your time and your clear explanations.
John Walker, CEO of Hollow Sail Technologies (Interviewee): Thank you for having me. I appreciate the opportunity to discuss these critical issues.
End of Interview
Below are eight specialized terms mentioned or implied in the interview, along with their definitions:
- Decentralized Computing (Off the Cloud): Refers to an architecture in which data storage and processing are distributed across multiple nodes or devices instead of relying on a single, centralized server or data center. “Off the cloud” specifically emphasizes that not all operations occur on external cloud services but rather in local or networked environments controlled by the user.
- Blockchain: A distributed ledger system that records transactions across numerous computers so that any involved record cannot be altered retroactively without the alteration of all subsequent blocks. It is often used in cryptocurrencies, although decentralized systems can be created without relying on blockchain.
- Data Sovereignty: The principle asserting that individuals or organizations retain ownership and control over their own data. It means data is stored, accessed, and shared in ways governed by the data owner’s explicit permissions and jurisdictional requirements.
- Machine Learning Bias (AI Bias): Occurs when algorithms produce systematically skewed outcomes because they have been trained on incomplete, unrepresentative, or prejudiced datasets. Bias can lead to incorrect or unfair decisions in automated systems.
- Ransomware: A type of malicious software designed to block access to a computer system or data until a sum of money is paid. Attackers often use encryption to hold an individual’s or organization’s files “hostage.”
- Docker container: A lightweight, portable, and self-sufficient unit that packages an application and its dependencies to ensure it runs consistently across different computing environments. Containers virtualize the operating system (OS) rather than the underlying hardware, making them more efficient than traditional virtual machines.
- Docker Swarm:A native clustering and orchestration tool for Docker containers. It enables multiple containerized applications to work together by automatically distributing them across a set of interconnected machines, facilitating easy scaling and deployment.
- Edge Computing: Moves data processing and storage closer to the location where data is generated. Instead of transmitting all raw data to a centralized cloud, edge computing devices handle critical operations locally, improving speed and reducing bandwidth usage.
- Third-Party Vendor Risk: Refers to the security and privacy vulnerabilities that arise when an organization’s data or applications rely on external service providers. These vendors may expose data to additional subcontractors or external services, multiplying the potential points of unauthorized access.
This article was written by Dr. Jasmin (Bey) Cowin, Associate Professor and U.S. Department of State English Language Specialist (2024). As a columnist for Stankevicius, she writes on Nicomachean Ethics: Insights at the Intersection of AI and Education. Connect with her on LinkedIn.