Posts by Category: Privacy Resources

Threema – Seriously Secure Mobile Messaging

February 22, 2014

Threema – Seriously Secure Mobile Messaging
https://threema.ch/

Threema is a mobile messaging app that puts security first. With true end-to-end encryption, you can rest assured that only you and the intended recipient can read your messages. Unlike other popular messaging apps (including those claiming to use encryption), even they as the server operator have absolutely no way to read your messages. Features include: a) End-to-end encryption – All encryption happens on your device, and asymmetric cryptography ensures that only the intended receiver can read your messages; b) Synchronize contacts – Find your friends on Threema automatically by synchronizing your contacts. Or add them manually if you prefer – it’s your choice; c) Share media – Send photos, videos and your current location with the same encryption grade as your text messages; and d) Scan IDs – Don’t trust any third party with key exchange — scan your friends’ IDs right within the app the next time you meet them. This has been added to the tools section of Research Resources Subject Tracer™ Information Blog. This will be added to Privacy Resources Subject Tracer™.

1300 views

TrueVault – HIPAA Compliant File Storage

February 21, 2014

TrueVault – HIPAA Compliant File Storage
http://www.TrueVault.com/

Secure API to store health data. HIPAA compliance made easier for healthcare applications. Fetures include: a) Built for Developers – Store and search protected health information (PHI) in any file format with a simple RESTful API. No pre-defined schemas to follow; b) HIPAA Compliant – They handle all of the technical requirements mandated by the HIPAA Security Rule. Typical integration takes days and saves months of dev time; c) BAA + Insurance – TrueVault will sign a Business Associate Agreement (BAA), and protects customers under a comprehensive Privacy/Data Breach insurance policy; d) Startups – TrueVault was built to help startups simplify the complexities of HIPAA. TrueVault will save you hundreds of dev hours. Focus on building your software’s core functionality, and let TrueVault protect your data at HIPAA-security levels; e) Mobile Apps – Store your app’s protected health data in TrueVault. They take care of HIPAA so that you can focus on creating healthcare apps on any platform; f) Web Apps – You don’t have to worry about setting up and maintaining your own HIPAA compliant application stack. TrueVault will handle the Physical and Technical Safeguards required by HIPAA; and g) Wearable Health Tech Devices – Emerging technology dances the line between consumer health data and PHI. Sharing data with a HIPAA-defined Covered Entity (such as a doctor) makes the data PHI and it needs to be protected at HIPAA-security levels. This will be added to Privacy Resources Subject Tracer™.

1664 views

Secure Virtual Data Room

February 19, 2014

Secure Virtual Data Room
http://www.sharefile.com/virtual-data-room/

A virtual data room from Citrix ShareFile allows you to easily control, share and track your secure documents — it’s your complete due diligence solution. Their web-based virtual data room allows parties around the world to access documents easily and securely with complete audit trails. Features include: a) Security – SSAE 16 audited datacenters Watermarking Encrypted storage & transfer; b) Ease of Use – No training required, Completely web based, Q&A section; c) Reporting, Analytics, Audit trails, Scheduled reports; d) Support – Dedicated account manager, Unlimited telephone support, Free demos & webinars; e) Power Tools – Desktop Widget, Enterprise Sync, Plugin for Microsoft Outlook; and f) Contact – Telephone, Live chat, Email. This has been added to the tools section of Research Resources Subject Tracer™ Information Blog. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to Privacy Resources Subject Tracer™.

1973 views

WireOver – Send Big Files Really Securely

February 14, 2014

WireOver – Send Big Files Really Securely
http://www.wireover.com/

WireOver is a desktop application for sending and receiving files. It’s easy to use, can transmit files of any size very fast, and uses end-to-end encryption. WireOver’s end-to-end encryption ensures that only your recipient can access the files you send, making it much more secure than most file sending tools. WireOver can transfer over your local network and the Internet, and it runs on Windows, Mac, and soon Linux. Who is WireOver for? a) Creative professionals who deal with video, audio, or images. If you’re mailing a hard drive or USB stick, try WireOver instead; b) Business professionals like attorneys, accountants, financial services and medical professionals. If you move sensitive documents or client information, use WireOver for transfering with complete privacy and security; c) Law enforcement and sensitive government agencies, who can’t afford security issues; d) Engineers and scientists who move large datasets; e) IT professionals who don’t want to manage their own transfer instrastructure like FTP servers and f) Individuals who value their privacy and want an easy-to-use tool without limits. This has been added to the tools section of Research Resources Subject Tracer™ Information Blog. This will be added to Entrepreneurial Resources Subject Tracer™. This will be added to Privacy Resources Subject Tracer™.

1395 views

You Are Being Watched Online

February 13, 2014

You Are Being Watched Online
http://www.makeuseof.com/tag/youre-watched-online/

Yes, everything you do online is being tracked. Your searches, the videos you watch, transactions, social events, even crime. Scandalous crimes. With a little help, especially with their guides, you’re still able to remain anonymous on the Internet. But understanding how you’re being tracked is an important lesson, as are the little things you can do to maintain your privacy. This will be added to Privacy Resources Subject Tracer™.

1182 views

iSecureDocument – Send Documents To Anyone Secure and Safe

February 10, 2014

iSecureDocument – Send Documents To Anyone Secure and Safe
http://www.isecuredocument.com/

Looking to send important documents like bank statements, W2s, paystubs, tax papers, legal documents, or others? iSecureDocument has a secure, safe and simple system to send documents. Its quick and easy.  Sending
files through regular email can be unsafe. Use iSecureDocument to protect your documents from getting into unwanted hands. Businesses – Provide your customers with a simple of way of sending documents securely. Peace of mind for your customers means more business for you. Indivuduals – Whether sending tax papers to your accountant, bank statements to finance your home or legal documents to your lawyer, send securely, with complete peace of mind. This will be added to Privacy Resources Subject Tracer™. This has been added to the tools section of Research Resources Subject Tracer™ Information Blog. This will be added to Entrepreneurial Resources Subject Tracer™.

1079 views

GNU Privacy Guard (GnuPG)

December 24, 2013

GNU Privacy Guard (GnuPG)
http://www.gnupg.org/

GnuPG is the GNU project’s complete and free implementation of the OpenPGP standard as defined by RFC4880 . GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories. GnuPG, also known as GPG, is a command line tool with features for easy integration with other applications. A wealth of frontend applications and libraries are available. Version 2 of GnuPG also provides support for S/MIME. GnuPG is Free Software (meaning that it respects your freedom). It can be freely used, modified and distributed under the terms of the GNU General Public License. This will be added to Privacy Resources Subject Tracer™.

1241 views

SecretInk – Create a Message That Automatically Self-Destructs After Reading

December 23, 2013

SecretInk – Create a Message That Automatically Self-Destructs After Reading
https://secretink.co/

SecretInk is a platform for sending secure messages that self-destruct immediately after being read. You can send passwords, account information or just plain fun messages and rest assured that no 3rd parties will read them. SecretInk sends all messages over HTTPS so your message text never touches the network unencrypted. Since they use end-to-end encryption, your message will never be readable by your work, ISP or third party mail hosts. Once a message is opened it is permanently deleted from their database. They never retain a copy and your message will be gone forever. They really believe in the power of secret messages, so they have built SecretInk to send SMS and e-mails for free! You can send messages to any phone number in their supported countries for free and it will be just as secure as every other SecretInk message. No one but the recipient will ever be able to read it. SecretInk is a new product made by PowerInbox. PowerInbox sees the next generation of email as collaborative, real-time, and interactive. The PowerInbox team is committed to bringing the app experience to email. PowerInbox’s interactive email plug-in allows users to perform real-time interactions inside emails from sites such as Facebook, Twitter, and LinkedIn. This will be added to Privacy Resources Subject Tracer™.

1331 views

I2P Anonymous Network

December 06, 2013

I2P Anonymous Network
http://www.i2p2.de/

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. Many applications are available that interface with I2P, including mail, peer-peer, IRC chat, and others. The I2P project was formed in 2003 to support the efforts of those trying to build a more free society by offering them an uncensorable, anonymous, and secure communication system. I2P is a development effort producing a low latency, fully distributed, autonomous, scalable, anonymous, resilient, and secure network. The goal is to operate successfully in hostile environments – even when an organization with substantial financial or political resources attacks it. All aspects of the network are open source and available without cost, as this should both assure the people using it that the software does what it claims, as well as enable others to contribute and improve upon it to defeat aggressive attempts to stifle free speech. Anonymity is not a boolean – we are not trying to make something “perfectly anonymous”, but instead are working at making attacks more and more expensive to mount. I2P is a low latency mix network, and there are limits to the anonymity offered by such a system, but the applications on top of I2P, such as Syndie, I2P mail, and I2PSnark extend it to offer both additional functionality and protection. I2P is still a work in progress. It should not be relied upon for “guaranteed” anonymity at this time, due to the relatively small size of the network and the lack of extensive academic review. It is not immune to attacks from those with unlimited resources, and may never be, due to the inherent limitations of low-latency mix networks. I2P works by routing traffic through other peers with all traffic encrypted end-to-end. For more information about how I2P works, see their Introduction. This will be added to Privacy Resources Subject Tracer™.

1622 views

How To Encrypt (almost) Anything Article

November 23, 2013

 

 

How To Encrypt (almost) Anything Article
http://www.pcworld.com/article/2025462/how-to-encrypt-almost-anything.html

An excellent article discussing how to encrypt almost anything by Alex Castle of the business security section in PCWorld. This will be added to Privacy Resources Subject Tracer™.

1714 views