Download Shareware and Freeware Software for Windows, Linux, Macintosh, PDA

line Home  |  About Us  |  Link To Us  |  FAQ  |  Contact

Serving Software Downloads in 956 Categories, Downloaded 50.174.746 Times

Whitenoise Strong Encryptor 3.0

  Date Added: January 07, 2017  |  Visits: 449

Whitenoise Strong Encryptor
Full screenshot

Report Broken Link
Printer Friendly Version


Product Homepage
Download (49 downloads)



Autonomous Privacy Project

The only one that can insure your privacy is you.

One simple application lets you secure your own files with strong Whitenoise encryption. Whitenoise technologies are patented globally including Canada, US, China, India and the European Union.

Protect data from hackers. Save important data with strong encryption. Send safely by email. Store files securely. Upload secure files to the cloud. You control your own private key with pass phrases. Service providers do not have copies.

Make the key unique and private by choosing two pass phrases. These pass phrases perturb the application key schedule (>25,000 bits) as subkeys. Use different pass phrases with different people or files.

When passwords are used with existing technology the strength of the resulting perturbed key is weakened to the strength of the password because of a multiplicative process.

With Whitenoise, client passphrases are converted to prime number binary equivalents and become subkeys to make the generic key schedule unique to the user and their private secret.

The generic key schedule is comprised of 10 subkeys. When additional subkeys derived from your pass phrases are added this actually makes your unique client private key stronger. This secret is specific to this unique file encryption. Different pass phrases can be used in different contexts. No one else in the world knows what your private super key is. (See the following presentation to learn how Whitenoise keys are made.)

Requirements: No special requirements
Release Date: December 12, 2016
Platforms: Windows 2000, Windows XP, Windows 8, Win7 x32, Win7 x64, WinOther, WinServer, WinVista , Windows 10
Keyword: Authentication Blackberry Cia Cloud Accelerator Ddki Distributed Key Systems Diva Ecc Encryption Identity Management Intrusion Detection Keys Nsa Pki Privacy Rsa Secure Cloud Secure Email Secure Storage Security Whitenoise
Version 3.0 Changes: Autonomous Privacy Project
Users rating: 0/10

License: Freeware Size: 36.56 MB
USER REVIEWS
More Reviews or Write Review


WHITENOISE STRONG ENCRYPTOR RELATED
Utilities  -  SIDEN 0.1.0
SIDEN is a distributed network discovery tool used for intrusion detection research. The current SIDEN architecture allows you to simulate coordinated/distributed network probes by a group of attackers. SIDEN has been tested successfully on the...
20.48 KB  
Screen Savers  -  Kid-Key-Lock 1.7
Kid-Key-Lock's purpose is to lock specific keyboard keys/combinations and specific mouse functions. Kid-key-lock can be used to prevent accidental presses of the right mouse click, double click, and key combinations such as Alt-F4, Alt-Tab, the...
754 KB  
Programming  -  Distributed Information System (NZDIS) 1.0
New Zealand Distributed Information Systems (NZDIS) Distributed, heterogenous, agent-based framework for intelligent/semantic information and services integration.
118.49 KB  
Utilities  -  pam_require 0.7
pam_require is a simple Pluggable Authentication Module (PAM) for Linux (and maybe other systems which use PAM). pam_require is an account module that allows you to require a special user or group to access a service. Example /etc/pam.d/ssh:...
8.19 KB  
Programming  -  libMAGE 0.1.4
libMAGE (Multi-Agent Grid Engine) is a C++ library that provides basis for constructing distributed autonomic systems (running on grids and clusters), that are able to adapt to processor and memory load and node failures.
665.6 KB  
Security  -  OpenFIM 1.0
OpenFIM is an implementation of the authentication process involved in Federated Identity Management using secure SOAP. The server software has been developed using MySQL and PHP. The client software has been implemented in PHP, Java, .NET, and Perl.
 
Miscellaneous  -  MACL 1.1
MACL - My Access Control List, was originally intended as a slimmer "Tiny ACL for PHP".It is written from scratch with an optional simple and demonstrative user authentication system for easy creation of loosely coupled systems.It is based on...
10 KB  
E-Mail Marketing  -  FollowUpStarter 4.5 build 2310
Is your business slowing down because of recession? It is expensive to prospect and to develop new customers from scratch. Advertising, sales calls or telemarketing, and the customer's vendor approval processes all make new client development time...
6.72 MB  
Security Tools  -  CAT Passwords Manager 4.0
Internet/Intranet Strong Authentication and Identity Management solution for SMEs, Etnetrprises and ISPs providing eAuthentication Services to hosted web sites. In the near future, businesses that do not have a secured web site will not exist....
31 KB  
Security Tools  -  Encryption And Decryption 2.0
Encryption freeware that allows you to protect the privacy of your email messages, instant messages, chat messages, documents, sensitive files by encrypting them with AES 256-bit key encryption. Encryption and Decryption is encryption freeware for...
4.42 MB  
NEW DOWNLOADS IN SECURITY TOOLS, FILE SECURITY
Security Tools  -  Privacy Eraser Free 6.4
Privacy Eraser is an all-in-one privacy suite that protects your privacy by cleaning up all your Internet history tracks and past computer activities. It supports popular web browsers such as Internet Explorer, Microsoft Edge, Mozilla Firefox,...
9.41 MB  
Security Tools  -  WinGPG 1.0.1.1
WinGPG developed by Scand Ltd. is a tray-based classical Windows application and a classic GPGv2 distribution (we use the cryptography from the official site without making any modifications). It supports the following operations:...
9.39 MB  
Security Tools  -  USB Lockit 1.0
USB Lockit - Password Lock USB Drive. Protects the USB drive with your photos, audios, videos and other files from prying eyes on Android & Windows. Once the drive is locked, nobody can access your files. All in 3 Easy Steps: 1. To lock...
11 KB  
Security Tools  -  Overwrite Program 1.4
Overwrite Program is a program that overwrites empty space on disk, data and metadata. The operating systems and programs automatically write and delete data on disk, for example text editors may save copies of the document for recovery and...
407 KB  
Security Tools  -  Security Camera Viewer 5.2
If you have one or more IP cameras, then you also need software that is able to receive and display a video stream from these devices. Most likely you will also want to monitor access to the rooms in automatic mode. A modern security system should...
29.53 MB  
File Security  -  Absolute Folder Hider 1.3
The product can hide and protect folders on your computer to ensure security of your privacy. It is very useful if you want to keep your files away from peoples's prying eyes. The hidden folders are invisible in Windows Explorer and can not be...
986.33 KB  
File Security  -  Auto File DRM Encryption Tool 5.2.5.4
Auto File DRM Encryption Tool was developed with EaseFilter Encryption Filter Driver(EEFD) SDK. The tool can encrypt the file transparently in file system level, it allows you to embed the digital rights management( DRM) data to the encrypted...
3.35 MB  
File Security  -  Motion Detection - Webcam Monitoring 2.4
The motion detection feature will turn your PC into a complete security system, allowing you to keep an eye on your surroundings even when you are away. When motion is detected, the app will perform predefined actions such as recording from...
20.43 MB  
File Security  -  Smart ID Scan 2.0
Smart ID Scan helps you protect your most valuable personal information. You might actually be surprised when you run a Smart ID Scan and find out how much personal information is easily available to hackers in the documents or files on your PC....
2.64 MB  
File Security  -  SSuite Agnot StrongBox Security 2.2.2
Now this is what I call real security!... You may use any one of nineteen, industrial and military strength, encryption ciphers to secure your most precious private information. There is BlowFish, TwoFish, CAST-128, Cast-256, DES, 3DES, ICE,...
4.67 MB