DOWNLOAD FOR WINDOWS OS
English, French, Portugese and Mandarin
Download, unzip and click setup.exe
There is no cost for this utility ever!
Secure Email Attachment Video Demo & Installation and User Guide for the Whitenoise Email Encryptor
Vendors, bloggers, social media users and media are welcome to post a download link on their site or forward the following link between persons within the United States and Canada without restriction otherwise it is regulated technology. Whitenoise is proven and patented globally including the United States, Canada and China. Tactical cyber war is a reality.
Autonomous Privacy Project - the only one that can guarantee your privacy and data on your devices and your communications with email is yourself.
The Whitenoise encrypted e-mail attachment utility allows users to send securely encrypted e-mail attachments to recipients even if the recipients do not have the Whitenoise e-mail encryption software. Simply send them the link to the decryptor - http://www.wnlabs.com/downloads/FREE_Decryptor.zip. Agree to pass phrases by another means i.e. a different email, phone or conversation.
You create your own private, unbreakable 25,000-bit-plus, one-time-pad key.
Nobody has ever broken Whitenoise - not any government, not Anonymous, not univerisities, not Black Hat and not Defcon. They go silent when you say "demonstrate any claims to the contrary." The Black Hat challenge clock from this contest is still running and dynamic, moving target, one-time pad offsets keep changing. http://www.wnlabs.com/news/DEFCON_Black_HAT_Challenge_Clock.php
Because the Internet and social media are breeding grounds for fake news, fake science and trolls of all kinds there is always always an ongoing challenge to anyone or any institution to demonstrate the ability to break a Whitenoise key publically on a platform like You Tube. A Whitenoise and DIVA multi-factor, multi-channel (when used with PKI), challenge means that a hacker has to break two keys simultaneously and one of them is a dynamic one-time-pad which is changing constantly every few seconds. This utility will give access to data to test theories.
The FREE Autonomous Privacy Project software has been certified by the Association of Software Professionals and the free software has been code signed by a third party authentication service (Microsoft affiliate) DigiCert.
Currently when passwords are used with existing technology the strength of the resulting perturbed key can be weakened to the strength of the password.
With Whitenoise, client passphrases are converted to prime number hexadecimal equivalents. They become subkeys to perturb the key schedule included to create a key that is unique to the user and their private secrets. The key schedule is far greater than 25,000-bit strength. This approach also increases resulting entropy as well. Contrary to expectations, as one adds more subkeys the resultant key stream becomes more random. Study the following presentation to learn how Whitenoise keys are made. (Note: the pass phrases can also be used to get non-perfect square seeds in the same techniques used in the VDEE product.)
The passphrases are used either as additional subkeys to perturb a key schedule or add to a key schedule. Password strength is a measure of the effectiveness of a password in resisting guessing and brute-force attacks. This paradigm is far stronger than the recommended strong password protocol recommended by Microsoft. There are no password crackers that can break two pass phrases simultaneously. The problem is exponentially more complex. And, any attempt at breaking passwords would result in the file being deleted after a defined number of failed attempts.
--
A Whitenoise key is comprised of a variable number of prime number length subkeys that are populated with random data. Each corresponding bit is XOr'd between subkeys to create a deterministic but random key. Only the subkey structure and offsets need to be saved to recreate this key.
As seen in the graphic below the smallest key that can be made by Whitenoise using the smallest prime number length subkeys is 110 billion bytes long and is greater than 1600 bits in strength. Note this is not the size of the subkeys on the generic master key.
With the Email Attachment Encryptor above we added two pass phrases to perturb the key and make it unique.
These two pass phrases first serve to authenticate the user because this is their private secret.
Adding the pass phrases (converted to hexadecimals) as subkeys to perturb a key schedule strengthens the user's resultant private, unique, unbreakable, one-time-pad key.
In our example:
The length of the key is determined by multiplying the lengths of the subkeys together.
With additional pass phrases (subkeys) of 31 and 37 bytes the smallest possible Whitenoise key now becomes 31 X 37 X 110,280,245,065 = 126,491,441,089,555 bytes long.
The strength of a key is determined by adding the lengths of the subkeys and multiplying by 8 bits per byte.
The key is (3 + 7 + 11 + 13 + 17 + 19 + 23 + 27 + 29 + 31 + 37 bytes) times 8 bits per byte =
397 X 8 bits per byte = 3176 bit strength
Note: the Email Attachment Encryptor has a key schedule greater than 25,000 bits in strength. Your pass phrases perturb this schedule to create your unique, unbreakable key.
Note: stream ciphers are inherently 10X stronger than block ciphers.
http://www.wnlabs.com/pdf/How_is_a_key_made.pdf
See how a key schedule is perturbed
Use of encrypted files as attachments to email is more secure than encrypting an entire email. This is because all of the email formatting information is available to criminals to attack your privacy.The decryptor utility is freely available from our web site so that you can safely communicate with anyone anywhere. The sender, who is using the Whitenoise encryption utility, securely encrypts files using a dual password key. The recipient learns the pre-arranged dual passwords by other means like telephone, a separate e-mail message, or from a previous conversation. Upon receiving the encrypted file(s), the recipient clicks on the encrypted file, inputs the dual password keys and decrypts the message or documents. These files are once again in their original form and can be read or stored.
The button with the computer icon in the application will let you copy the address where anyone can go and download the decrypting utility for free. This will be for first time uses who are receiving an encrypted file. Go to your email application. Paste the decryptor link in the email for your colleague or friend. Write a cordial note to your friend. Attach the encrypted file and send it. That’s it.
Initial User Name = user
Initial Password = pass
GUI Shots