The Data Krypter™ Modules The Data Krypter™ consists of a base version and various optional modules each of which can be purchased separately. This user's guide describes all the modules, so some of it will not apply to you if you have not purchased all the modules. To see which modules you purchased, click on Active Modules near the bottom right of the main window. The base version does this: a) encrypts files b) encrypts folders c) encrypts blocks of text d) two ways of encrypting: symmetrical or asymmetrical e) when encrypting a file/folder the name can also be encrypted f) when encrypting a file/folder the original can be securely erased g) create new public/private keys (asymmetric encryption) h) is quantum proof Each of the following functions can be purchased as a separate module: a) Data Recovery: to recover your master password, symmetric secret keys, private/public keys so you can decrypt data With this module you can: i) setup your personal set of security questions which would be used to recover your master password ii) record all the symmetric secret keys you ever used to encrypt some data. If you have forgotten or lost a secret key, all the past ones can be tried to see which one can decrypt the data. This process will take less time if you know the approximate date the data was encrypted. iii) record the creation key which was used to create all of the public/private keys you ever used. A process similar to that for symmetric secret keys can recover encrypted data. To setup your security questions, do this: 1. Click on the 'Recovery' icon. 2. Re-enter your master password. 3. Answer at least 3 of the standard recovery questions. 4. Enter at least 1 of your own questions and provide the answer. 5. You must answer at least 5 questions in total. 6. Click OK. If you lose your master password, recover it like this: 1. Make at least 5 attempts to sign into the Data Krypter. 2. You'll be shown the recovery questions - answer them all. 3. Click OK. 4. If all the answers are correct you'll be shown your master password. 5. Click OK. 6. Sign into the Data Krypter using the password. b) Secure Email: to send/receive encrypted emails (not available yet) When this module is ready it will: i) keep track of all your contacts and their public key ii) send emails asymmetrically automatically encrypting it using the public key of the receiver. iii) send emails that are encrypted symmetrically iv) receive emails that are encrypted symmetrically and then ask you for the secret key to decrypt it v) receive emails that are encrypted asymmetrically and then automatically decrypt it using your private key c) Password Manager: to keep track of all passwords you use to sign into your online accounts. You'll be able to find the password for a certain website you want to sign into. A demo/trial version has all modules but there are some limits:
If your demo/trial version expires before you enter the activation code, all of the data you previously encrypted can still be decrypted. (i.e. no data will be lost) However, any new data you encrypt can be decrypted only by someone with a full version. This means that encrypted data can be exchanged between individuals and only one of them must have the full version. |