VDEE - Virtual Disk Encryption Engine -FREE
Autonomous Privacy Project - the only one that can guarantee your privacy and data on your devices and your communications with email is yourself.
Vendors, bloggers, social media users and media are welcome to post a download link on their site or forward the following link between persons within the United States and Canada without restriction otherwise it is regulated technology. Whitenoise is proven and patented globally including the United States, Canada and China. Tactical cyber war is a reality.
http://www.wnlabs.com/products/harddrive.php or http://www.wnlabs.com/products/vdee.php
In one step you can protect your data, files and emails from hackers, unauthorized personnel, Black Hats, White Hats, foreign actors or even employers in "Bring Your Own Device BYOD environments."
A virtual container (silo) is created on your device and ALL data is automatically saved with strong encryption. There is NO change in device use. There is no integration with any other device applications.
If you lose your phone or tablet or notebook you are protected. If anyone can manage to get access into the device they cannot access data since you are the one that has the private secrets that augment the unique key in multi-factor authentication.
Email and all documents and files are automatically protected when the data files for related applications are in your virtual drive.
Your key is specific to your device. Each device will have a different key.
VDEE creates your unique, private, unbreakable, one-time-pad key. No one can access any data you have saved to your encrypted virtual drive because they have no access or knowledge to unique machine identifiers.
A Whitenoise keys is comprised of a variable number of prime number length subkeys that are populated with random data. Each corresponding bit is XOr'd between subkeys to create a deterministic but random key. Only the subkey structure and offsets need to be saved to recreate this key. There are different case specific means of creating unique, unbreakable keys far greater than 25,000 bits in strength.
Nobody has ever broken Whitenoise - not any government, not Anonymous, not univerisities, not Black Hat and not Defcon. They go silent when you say "demonstrate any claims to the contrary."
How are the keys created for the Virtual Drive Encryption Engine (VDEE)?
The first step of the procedure is the stripping of a MAC #, a machine component identifier, that is unique for every component.
This MAC number, which is a hexadecimal value, is then arbitrarily parsed into two values that are non-perfect square values. These two values will then serve as the seed values for the Whitenoise encryption process.
These two values replace the seed values used as the first step of the generic Whitenoise process that utilizes random, non-perfect square values generated from a random number generator on a computer or device.
The rest of the Whitenoise process proceeds along Whitenoise specifications and the resultant key template is stored on the machine where the program is being installed.
During install of an application or files, the application is installed in an encrypted fashion utilizing seeds derived from the target machines MAC# or other identifiers.
This process results in the application being installed on a specific machine with a specific and unique iteration of Whitenoise. Should a hacker copy the application for install on another computer or device, it will be unusable since it is encrypted for a specific machine. Any subsequent machines will have different MAC#s and therefore will not be able to generate the appropriate key need to decrypt the application during use.
At no point are keys in this specific process ever transferred.
This means that any remote hacking cannot get any information that may be opened or played on another device.
If your device is physically stolen you will notice it. And the thief still can't access the files on the device because they have no knowledge of your private secrets. Three attempts at unauthorized access in this scenario will result in the device being locked up or, by choice, the deletion and bleaching of your personal data.
Learn about the generic key creation process.