WHITENOISE MEDIA STREAMING DEMO FOR WINDOWS
This demonstration is Windows based and works with Media Player Classic 32-bit which is an open source media player. The following needs to be done only once.
Download and install the Media Player Classic from https://mpc-hc.org/. You must select the 32-bit version even if your computer is capable of running 64-bit. This is also included in the following link. Install 32-bit Media Player Classic.
Whitenoise Media Streaming Demo - Download and unzip the file to your desktop.
Extract all the files to your desktop. It will create a folder called Whitenoise_Media_Demo_32-bit_setup.
Open Whitenoise_Media_Demo_32-bit_setup and install the 32-bit Media Player Classic by right clicking on MPC-HC.1.7.11.x86 and Run as an Administrator.
From Whitenoise_Media_Demo_32-bit_setup Click on the Codec folder and install the Codec (filter) for Media Player Classic - Codec > klmcodec116. Again, right click and Run as an Administrator.
Right Click on Whitenoise Media Player Setup and Run as an Administrator to install it.
Copy StreamDemoSetup to an external USB key. Extract the executable to the root drive of the USB and install it. It will create a WN Media Key to play encrypted media. You will see a Keys folder when it is installed.
Open Media Player Classic 32-bit and play a WN media file wnm that is included in the folder.
If the key on the USB is in the computer the file will play. If the key is not present it will not play. If the USB key is removed while encrypted media is playing the buffer will clear and the video will stop because the key for decryption is not present.
Confirm that media files are encrypted by trying to compress them with winzip. Perfect encrypted is perfectly random. You cannot compress a WN media file. The result zip file will be the same size as the original.
KEY CREATION AND SPEED TESTER for WINDOWS
Create exponential one-time-pads of any size. Test the speed on different Windows machines. The algorithm goes as fast as the processor is able.
All presentations, demonstrations and white papers are linked to this page.
Archived Presentations (not in alphabetical order)
- Stop WikiLeaks full description
- DIVA IFSEC Future of Security Grand Finalist - Raytheon sponsor
- AT&T Certifies Secure File Interchange 2
- WNL a 2010 Grand Finalist Global Security Challenge
- United Nations April 2010 standards presentation: Harmonizing identity and privacy
- WN Speed and Randomness Tester Academic use only
- European Technical Standards Presentation Workshop Jan 2012 Sophia Antipolis, France
- Nokia Innovative Ideas Challenge
- Technical Advisory Committee questions Washington DC
- Whitenoise Vision for international harmonization of identity and privacy
- National Operational Requirements Document
- Government rescinds policy requiring PKI for secure services
- Whitenoise is a sponsor for the BCIT smart grid
- US National Leap Year Summit 2009
- White House Invites Whitenoise to Cyber Security Leap Year Summit
- US Operational Resource Document
- In Denial:Code Red 2 nd Annual Critical Infrastructure Conference
- Government Mandated Identity Management Keys a protocol
- AT&T Invites Whitenoise Laboratories (Canada) Inc to Join
- Sierra Wireless Stops Identity Theft and Secures Networks
- Sierra Wireless Stops Media Theft and Secures Cargo
- Paper on Whitenoise 3 Byte Substitution (PDF)
- Dr. Issa Traore
- Dynamic Distributed Key Infrastructures
- A Scalable Identity Management and Authentication Architecture
- In Denial: Code Red Digital Winter - The Failure of Critical Infrastructures
- Stop Credit Card and Identity Theft
- Dynamic I dentity Verification and Authorization
- Bringing in Legacy Appliances into Secure Networks
- The Security Summit Contest Presentation
- Tunnel Distributed Keys distributing more distributed keys at the data link layer
- Total Cost of Ownership Comparison
- Telecom/Enterprise Service Offering Secure File Interchange
- Subsequent Telecom/Enterprise service offerings
- The Value Chain for the Telecom Industry
- Secure File Interchange Total Cost of Ownership Total Cost of Ownership Comparison Public Key Infrastructure versus Identity Based Encryption versus Pretty Good Privacy versus Dynamic Distributed Key Infrastructures
- PKI Research Materials
- Critical Insights and Differentiators of Whitenoise Csinger
- Hard Disk Drive Encryptor and Streaming Demo - zip
- Download the BCIT Whitenoise encrypted media file for a demo
- BCIT_VIDEO_Encrypted with Whitenoise
- Secure File Interchange 2 with AES- pps
- Computer File Security Narrated Demo - pps
- Secure File Interchange Narrated Demo - pps
- Secure File Interchange Administrator functions - pdf
- WN Speed and Randomness Tester
Randomness is an important element of encryption. Take any of the trial or commercial applications and test the encrypted files. Go to the following web site and follow the testing directions. This site uses radioactive decay as a random data source as a product. http://www.fourmilab.ch/hotbits/ At this site you can rapidly (just a minute or two) perform at least 6 tests evaluating the randomness of encrypted data. Compare the results of these tests with the Whitenoise random data file attached with the results achieved with a chunk of encrypted data using any process you currently employ, or compare the results against those achieved on the Hotbits site. Testing results from extensive randomness testing against the NIST test suite is available from the University of Victoria.