Invisible Secrets 2.1

  • Thread starter Thread starter Wayne D
  • Start date Start date
W

Wayne D

"The only way to secure your data, and make it readable only to
authorized persons, is to use strong cryptography and a password long
enough to resist any brute-force attacks... But is this enough ?...

Many cryptographic programs just transforms data into an unreadable
encrypted data saving it as an usual file. If someone takes a look at
that file, will soon understand that it is an encoded message - since it
doesn’t have any meaning - and will try to break the code.

Invisible Secrets 2.1 offers you the possibility to encrypt and hide
files in other files (carriers) which are not suspect of encryption.
First, Invisible Secrets will encrypt the sensitive data using a
specified password and cryptosystem (algorithm). After the encryption,
the hypertext will be inserted in the carrier. The resulted carrier
(which contains the real message) can be attached to an email message
(which is a fake message), or published on a web page near hundreds of
other pictures (or other carriers) from where the addressee (the only
person who knows which is the right image) can download it without
revealing his/hers identity.

*Download Invisible Secrets 2.1
FREE edition Features :

*Easy-to-use yet a powerful wizard-interfaced encryption/steganography
program.

*It is also very flexible: The user can develop his own algorithms or
carriers and integrate them very easy in the program

*Two Carriers: JPG (without any data length restriction) and BMP (source
data proportional with the size of the image).

*Data compression before the encrypt/hide process

*Mail the resulted carrier after the process or place it somewhere on the
Internet through a FTP Connection.

*A very well organized FTP Servers Library

*Secured algorithms and carriers libraries through activation keys "

http://www.invisiblesecrets.com/ver2/index.html

Regards

Wayne D
 
Wayne D said:
"The only way to secure your data, and make it readable only to
authorized persons, is to use strong cryptography and a password
long enough to resist any brute-force attacks... But is this
enough ?...

Many cryptographic programs just transforms data into an
unreadable encrypted data saving it as an usual file. If someone
takes a look at that file, will soon understand that it is an
encoded message - since it doesn’t have any meaning - and will
try to break the code.

Invisible Secrets 2.1 offers you the possibility to encrypt and
hide files in other files (carriers) which are not suspect of
encryption. First, Invisible Secrets will encrypt the sensitive
data using a specified password and cryptosystem (algorithm).
After the encryption, the hypertext will be inserted in the
carrier. The resulted carrier (which contains the real message)
can be attached to an email message (which is a fake message),
or published on a web page near hundreds of other pictures (or
other carriers) from where the addressee (the only person who
knows which is the right image) can download it without
revealing his/hers identity.

*Download Invisible Secrets 2.1
FREE edition Features :

*Easy-to-use yet a powerful wizard-interfaced
encryption/steganography program.

*It is also very flexible: The user can develop his own
algorithms or carriers and integrate them very easy in the
program

*Two Carriers: JPG (without any data length restriction) and BMP
(source data proportional with the size of the image).

*Data compression before the encrypt/hide process

*Mail the resulted carrier after the process or place it
somewhere on the Internet through a FTP Connection.

*A very well organized FTP Servers Library

*Secured algorithms and carriers libraries through activation
keys "

http://www.invisiblesecrets.com/ver2/index.html

Regards

Wayne D


This whole program is not freeware?
http://www.invisiblesecrets.com/order.html
Single user license: $39.95 per license

I don't understand. Crippled?
 
Your right, really is a demo.

"Question : If I purchase this program and want to send hidden messages
to someone who doesn't have Invisible Secrets and doesn't want to buy it,
how can he/she unhide, decrypt and view my messages?

Answer :
The receiver can download and use the trial version of Invisible Secrets
4. The unhide and decrypt functions from the trial version will NOT
expire! After the 15 days of evalution the receiver will not be able to
encrypt or hide, but will be able to unhide and decrypt any message."

http://www.invisiblesecrets.com/faq.html

Regards

Wayne D
 
Back
Top