This particular encryption solution is unlike any that I have seen. In my 21+ years of Security Engineering, I have written and deployed many encryption solutions throughout the world and have never seen the lack of latency, masking, noise reduction, and morphing that this solution provides. This method is unique and could be a “game changer”.
The next big leap in, say, three years will be the return to using rights-managed encryption, which is asserted any time that users create or modify files. In other words, driving encryption to the bottom so that any file that moves intentionally or accidentally is automatically protected by policy. In the mobile world, there are too many ways to move files to be able to protect everything by conventional means of perimeter defenses.