With CISPA on the rise, as well as other surveillance conducted by governments and big business, many people feel the need to find more security in their online experience. This page is dedicated to bringing you the best privacy tools on the internet, to protect your personal information and safeguard your data against snoopers and spooks.
Crypto -
Do you have important trade secrets that you would like to protect? How about personal information such as passwords, financial/tax info or even those risque photos of your wife she surprisingly let you take when she had one to many glasses of wine. The solution? CRYPTO.
In Short, cryptographic programs allow you to store information within the program using extremely complex algorithms to password protect any file you store within the program. Sometimes, it is good to use multiple encryption programs on sensitive data such as trade secrets for business and personal information. For example: create a Truecrypt partition, then encrypt THAT partition using Kremlin - Some great crypto programs I use are:
1) Truecrypt - Safeguard your data against snoopers and/or adversaries. You create a partition, which is basically a locked folder for storing files that you can protect with a password. You can even add an image to the unlocking process for extra security measures. So a would be snoop would need to enter the password AND attach the correct picture in order to unlock your partition. You can also create a hidden partition within a partition, so an adversary forcing you to open your Truecrypt file can be duped as you open the "false" partition, which you will fill with non random files you don't care if people see.
Main features:
Kremlin Encrypt - http://www.kremlinencrypt.com/
If you are interested in more information on cryptography then I suggest heading over to this Cryptology Research website.
A great book on the history of cryptography is "Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age" by Author Steven Levy. The Book is extremely insightful and gives you an in depths analysis on the rise of crypto as well as some key players in the movement.
Crypto -
Do you have important trade secrets that you would like to protect? How about personal information such as passwords, financial/tax info or even those risque photos of your wife she surprisingly let you take when she had one to many glasses of wine. The solution? CRYPTO.
In Short, cryptographic programs allow you to store information within the program using extremely complex algorithms to password protect any file you store within the program. Sometimes, it is good to use multiple encryption programs on sensitive data such as trade secrets for business and personal information. For example: create a Truecrypt partition, then encrypt THAT partition using Kremlin - Some great crypto programs I use are:
1) Truecrypt - Safeguard your data against snoopers and/or adversaries. You create a partition, which is basically a locked folder for storing files that you can protect with a password. You can even add an image to the unlocking process for extra security measures. So a would be snoop would need to enter the password AND attach the correct picture in order to unlock your partition. You can also create a hidden partition within a partition, so an adversary forcing you to open your Truecrypt file can be duped as you open the "false" partition, which you will fill with non random files you don't care if people see.
Main features:
- Creates a virtual encrypted disk within a file and mounts
it as a real disk.
- Encrypts an entire partition or storage device such as USB flash drive or hard drive.
- Encrypts a partition or drive where Windows is installed (pre-boot authentication).
- Encryption is automatic, real-time (on-the-fly) and transparent.
- Parallelization and pipelining allow data to be read and written as fast as if the drive was not encrypted.
- Encryption can be hardware-accelerated
on modern processors.
- Provides plausible deniability, in case an adversary
forces you to reveal the password:
Hidden volume (steganography) and hidden operating system.More information about the features of TrueCrypt may be found in the documentation.
Algorithm | Designer(s) | Key Size (Bits) |
Block Size (Bits) | Mode of Operation |
---|---|---|---|---|
AES | J. Daemen, V. Rijmen | 256 | 128 | XTS |
Serpent | R. Anderson, E. Biham, L. Knudsen | 256 | 128 | XTS |
Twofish | B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, N. Ferguson |
256 | 128 | XTS |
AES-Twofish | 256; 256 | 128 | XTS | |
AES-Twofish-Serpent | 256; 256; 256 | 128 | XTS | |
Serpent-AES | 256; 256 | 128 | XTS | |
Serpent-Twofish-AES | 256; 256; 256 | 128 | XTS | |
Twofish-Serpent |
Kremlin Encrypt - http://www.kremlinencrypt.com/
Not only does Kremlin feature secure encryption with such algorithms
as Blowfish, and RC4,
Kremlin does more: Kremlin builds a wall around your computer.
In its most secure setting, Kremlin uses 160 bits of encryption key. It means that if one billion computers were each searching one trillion keys per second, it would take over 1019 years to recover a file encrypted with Kremlin. That's 10,000,000,000,000,000,000 years, much more than the life of the universe! Kremlin is so secure that the U.S. Government considers it a munition! To snoops, Kremlin is a deadly weapon.
In its most secure setting, Kremlin uses 160 bits of encryption key. It means that if one billion computers were each searching one trillion keys per second, it would take over 1019 years to recover a file encrypted with Kremlin. That's 10,000,000,000,000,000,000 years, much more than the life of the universe! Kremlin is so secure that the U.S. Government considers it a munition! To snoops, Kremlin is a deadly weapon.
Kremlin
builds a wall around your data
- When you log off, Kremlin clears sensitive areas of your hard disk and wipes all records of your activities.
- Kremlin automates the process of securing your computer by scheduling
itself to secure portions of your hard disk and all used memory
when you log off your computer or your computer becomes idle.
- Kremlin can automatically encrypt files and directories when
you log off your computer and decrypt them when you log back on,
providing a transparent way to protect your files from nosy intruders.
- Kremlin provides a full-featured and secure text editor that
automatically encrypts your documents. You can e-mail a secret
memo to a co-worker from within Kremlin Text.
- You can securely remove files from your computer by dragging them to the Kremlin Secure Recycle Bin (Windows) ot Kremlin Secure Delete (Mac OS).
- Kremlin is cross-platform. You can encrypt your information on the PC and decrypt and use it on the Mac and vice versa.
If you are interested in more information on cryptography then I suggest heading over to this Cryptology Research website.
A great book on the history of cryptography is "Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age" by Author Steven Levy. The Book is extremely insightful and gives you an in depths analysis on the rise of crypto as well as some key players in the movement.
0 comments:
Post a Comment