Blog

Cryptoucan™ usage: Initialization

Written by Dominik Joe Pantůček on 2018-07-26

cryptoucan

Thorough the last few months, we have shown you a lots of mathematical theory, we have tackled the problems of secure online communication and of data confidentiality and authenticity in general and we have revealed we are working on a device that should enable casual computer users to increase their overall data security with respect to all imaginable aspects. Read on to see one of our first prototypes securing the email communication.

...

Cryptoucan™ usage: privileged operations

Written by Dominik Joe Pantůček on 2018-07-19

cryptoucan

Last time we have shown you some basic Cryptoucan™ usage. Read on to learn something about the administrator access to Cryptoucan™ and see how the device can be used for performing some privileged operations like key generation or user PIN reset.

...

Cryptoucan™ usage: basic operations

Written by Dominik Joe Pantůček on 2018-07-12

cryptoucan

We have already shown you what we have developed. So now it is time to tell you how it is used as a part of your casual workflow with signed documents and encrypted messages. Read on to get the idea.

...

Cryptoucan™ development: Electronic refinements

Written by Dominik Joe Pantůček on 2018-07-05

cryptoucan

Designing the electronic circuitry or creating a good looking device were very interesting tasks to do. Yet, to produce the first fully-working prototype, there were many things we needed to address. This Thursday we will have a look at some of these.

...

Cryptoucan™ development: Design of the device shell

Written by Dominik Joe Pantůček on 2018-06-28

cryptoucan

Last week, we have shown you the internal electronic circuitry board and the decisions why we choose to create Cryptoucan™ in the first place. Today we are going to show you our thoughts when designing the device exterior.

...