With CISPA on the rise, as well as other surveillance conducted by governments and big business, many people feel the need to find more security in their online experience. This page is dedicated to bringing you the best privacy tools on the internet, to protect your personal information and safeguard your data against snoopers and spooks.

 Crypto -
Do you have important trade secrets that you would like to protect? How about personal information such as passwords, financial/tax info or even those risque photos of your wife she surprisingly let you take when she had one to many glasses of wine. The solution? CRYPTO.

 In Short, cryptographic programs allow you to store information within the program using extremely complex algorithms to password protect any file you store within the program. Sometimes, it is good to use multiple encryption programs on sensitive data such as trade secrets for business and personal information.  For example: create a Truecrypt partition, then encrypt THAT partition using Kremlin - Some great crypto programs I use are:

1) Truecrypt - Safeguard your data against snoopers and/or adversaries. You create a partition, which is basically a locked folder for storing files that you can protect with a password. You can even add an image to the unlocking process for extra security measures. So a would be snoop would need to enter the password AND attach the correct picture in order to unlock your partition. You can also create a hidden partition within a partition, so an adversary forcing you to open your Truecrypt file can be duped as you open the "false" partition, which you will fill with non random files you don't care if people see.

Main features:
Algorithm Designer(s) Key Size
(Bits)
Block Size (Bits) Mode of Operation





AES J. Daemen, V. Rijmen 256 128 XTS
Serpent R. Anderson, E. Biham, L. Knudsen 256 128 XTS
Twofish B. Schneier, J. Kelsey, D. Whiting,
D. Wagner, C. Hall, N. Ferguson
256 128 XTS
AES-Twofish   256; 256 128 XTS
AES-Twofish-Serpent   256; 256; 256 128 XTS
Serpent-AES   256; 256 128 XTS
Serpent-Twofish-AES   256; 256; 256 128 XTS
Twofish-Serpent 



Kremlin Encrypt - http://www.kremlinencrypt.com/

Not only does Kremlin feature secure encryption with such algorithms as Blowfish, and RC4, Kremlin does more: Kremlin builds a wall around your computer.
In its most secure setting, Kremlin uses 160 bits of encryption key. It means that if one billion computers were each searching one trillion keys per second, it would take over 1019 years to recover a file encrypted with Kremlin. That's 10,000,000,000,000,000,000 years, much more than the life of the universe! Kremlin is so secure that the U.S. Government considers it a munition! To snoops, Kremlin is a deadly weapon.
Kremlin builds a wall around your data
  • When you log off, Kremlin clears sensitive areas of your hard disk and wipes all records of your activities.
  • Kremlin automates the process of securing your computer by scheduling itself to secure portions of your hard disk and all used memory when you log off your computer or your computer becomes idle.
  • Kremlin can automatically encrypt files and directories when you log off your computer and decrypt them when you log back on, providing a transparent way to protect your files from nosy intruders.
  • Kremlin provides a full-featured and secure text editor that automatically encrypts your documents. You can e-mail a secret memo to a co-worker from within Kremlin Text.
  • You can securely remove files from your computer by dragging them to the Kremlin Secure Recycle Bin (Windows) ot Kremlin Secure Delete (Mac OS).
  • Kremlin is cross-platform. You can encrypt your information on the PC and decrypt and use it on the Mac and vice versa.


If you are interested in more information on cryptography then I suggest heading over to this Cryptology Research website. 

A great book on the history of cryptography is "Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age" by Author Steven Levy.  The Book is extremely insightful and gives you an in depths analysis on the rise of crypto as well as some key players in the movement.


 


0 comments:

Post a Comment