Blog

Cryptoucan™ is here

Written by Dominik Joe Pantůček on 2018-08-23

After a year of hardware and software development, we have finally created something. And that something is definitely worth the effort. The last week was really hectic and so there is just a little sneak peek into what has just arrived from the factory. Read on to see it!

...

Cryptoucan™ usage: signing emails

Written by Dominik Joe Pantůček on 2018-08-16

Now that we have introduced Cryptoucan™ and explained how to prepare it for daily usage, it is time to show how to use it for an operation many people perform quite often - sending signed email messages. Read on to see how to do it!

...

Cryptoucan™ usage: personal information

Written by Dominik Joe Pantůček on 2018-08-09

Sometimes it can be useful to have more than just cryptographic keys on your Cryptoucan™. And as the standards give us some possibilities to store some basic information in the device, we have implemented this functionality as well.

...

Cryptoucan™ usage: PIN management

Written by Dominik Joe Pantůček on 2018-08-02

While using an external cryptographic token brings your overall security to the next level - as the keys cannot be stolen from possibly compromised personal computer, it takes more than that to ensure it is not just a false sense of security you get. It is - at least - necessary to protect the keys against an adversary that gains physical access to your Cryptoucan™. And that is where strong PIN protection can be very useful.

...

Cryptoucan™ usage: Initialization

Written by Dominik Joe Pantůček on 2018-07-26

Thorough the last few months, we have shown you a lots of mathematical theory, we have tackled the problems of secure online communication and of data confidentiality and authenticity in general and we have revealed we are working on a device that should enable casual computer users to increase their overall data security with respect to all imaginable aspects. Read on to see one of our first prototypes securing the email communication.

...