We have already shown you what we have developed. So now it is time to tell you how it is used as a part of your casual workflow with signed documents and encrypted messages. Read on to get the idea.
Designing the electronic circuitry or creating a good looking device were very interesting tasks to do. Yet, to produce the first fully-working prototype, there were many things we needed to address. This Thursday we will have a look at some of these.
Last week, we have shown you the internal electronic circuitry board and the decisions why we choose to create Cryptoucan™ in the first place. Today we are going to show you our thoughts when designing the device exterior.
For those who have been wondering what is this Cryptoucan™ all about, wonder no more. We are ready for medium-scale batch production and you will be able to get your own Cryptoucan™ soon. Read on to find out how we designed the integrated circuitry.
As we have shown during the last few weeks, there are certain confidentiality, integrity and authenticity problems with email communication. We have already shown, that there is some decent cryptography available today that can improve the security of email communication. The only unsolved problem left is how to secure your cryptographic keys when you cannot trust your own computer. Good thing is, you can secure your digital identity even in case your personal computer gets compromised. Read on to learn what we have designed.