Why Don’t You Clearly State Who the People Behind this Project Are?


To the people wondering, “who are the people behind Unseen.is?”

I put my name, Chris Kitze, on this project front and center. You can go look me up. I’ve been in the high tech field for many years and have put my personal money behind this project. I felt it was very important for everyone to know who was running this kind of system.

However, we will NOT publicize the names of the people on our tech team — for their safety. Let me explain.

You need to understand something about our project. The encryption we developed ourselves is now effectively working. The standard encryption most everyone else is using (that we believe has been broken) has been now replaced on Unseen with something proprietary that’s much stronger. We’ll continue to upgrade our security every step of the way. You’ll notice that everyone else just runs their service without any problems using “military grade encryption”? We’ve come to discover that military grade encryption means the military can break it, they have tools to do this quite easily.  This includes AES, RSA and SSL.

That means we’re now becoming targets of security agencies all over the world and here at Unseen we’ve been noticing that some of us have been getting more attention in this regard. To give you an example, several weeks ago we brought on a new product manager in Finland, Marko, who used to work at Nokia. Under my direction, he put up an Unseen company page on Linked In and added this page to his Linked In profile.

A few days later, his computer started acting strange and he noticed a large black GMC SUV parked outside his apartment in Finland. He went outside for a look and it had diplomatic plates…probably American because who else would import a big GMC to Finland. I’m guessing they broke into his wifi, the router and then his computer. It’s not that hard for them to do this and they have standard “toolkits” to do this kind of stuff. There’s really nothing for anyone to get from any of our computers. We don’t store any customer information and our plans are pretty much out in the open — we only care about helping good people keep their communications private and learn the truth.  We’re not helping people steal things, we just help them protect their own property.  For us, it’s mainly an inconvenience reformatting drives and cleaning things up.

Needless to say, we’ve had some of our personal computers hacked (none of the servers that contain your data) since we announced this project and it’s quite time consuming to redo our computers every few weeks.

Another factor is many of us are Falun Gong practitioners and a big reason we’re developing this tool is to bring the truth about the persecution to people in China. This ancient spiritual practice is heavily persecuted in China. Some of our developers still live in communist countries and their lives could be in peril if we disclosed publicly who they were. In fact, one person on our team spent time in prison for broadcasting the truth into China, from a place where it’s supposed to be legal to do this kind of thing. You can find out more about this persecution, which has been going on since 1999 and even includes live organ harvesting here: http://faluninfo.net

So that’s a little background on the people behind our service. How many of the people at other services would go to jail to help people learn the truth about something?

That’s about all I can offer you.  We’re a virtual organization with people all over the world and our company and its assets are now based in Iceland.  You’ll need to decide for yourself if you want to use our service or not.  We’re not going to force anyone to use Unseen.  No system is perfect, but we do promise to do the best by all of our users.


Read more

One thought on “Why Don’t You Clearly State Who the People Behind this Project Are?

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>