(sometimes we provide two download links because it may happen that the main server / link is overloaded or slow or non responding - the files are identical. Just choose one, save to the Desktop, double click to install)
Disclaimer: to our best knowledge this download comes from a website that is
safe (the last time we checked it, it was), but for your peace of mind (and better safe than sorry) we advise you to run an
antivirus on the downloaded file. Do not rely on MSWindows, Internet explorer, or on the electronic signature: a unsigned download is usually as safe as a signed one, signed just means the author paid Microsoft or Verisign for a stamp, it does not mean verified. Please kindly
report us problems with detail (click here to report), if any.
Autonomous Privacy Project - Secure your files with strong Whitenoise encryption. Whitenoise is patented globally including Canada, US, China, India and the European Union. Protect data from hackers. Save data with strong encryption. Send safely by email. Store files securely. Upload secure files to the cloud. You control your own private key with pass phrases. Cloud service providers do not ever have copies of your self directed encryption.
(
Free strong Whitenoise encryption for email and files. Protect comms & data)
Autonomous Privacy Project -
The only one that can insure your privacy is you.
One simple application lets you secure your own files with strong Whitenoise encryption. Whitenoise technologies are patented globally including Canada, US, China, India and the European Union.
Protect data from hackers. Save important data with strong encryption. Send safely by email. Store files securely. Upload secure files to the cloud. You control your own private key with pass phrases. Service providers do not have copies.
Make the key unique and private by choosing two pass phrases. These pass phrases perturb the application key schedule (>25,000 bits) as subkeys. Use different pass phrases with different people or files.
When passwords are used with existing technology the strength of the resulting perturbed key is weakened to the strength of the password because of a multiplicative process.
With Whitenoise, client passphrases are converted to prime number binary equivalents and become subkeys to make the generic key schedule unique to the user and their private secret.
The generic key schedule is comprised of 10 subkeys. When additional subkeys derived from your pass phrases are added this actually makes your unique client private key stronger. This secret is specific to this unique file encryption. Different pass phrases can be used in different contexts. No one else in the world knows what your private super key is. (See the following presentation to learn how Whitenoise
keys are made.)
wnlabs pdf/How_is_a_key_made.pdf
wnlabs products/emailenc.php
security, encryption, privacy, identity management, secure email, secure storage