Documentation

The Documentation will be put on the web in stages.

In many countries journalists and human rights workers are under threat from the authorities who wish to know what the journalists have written.  The contents of what has been written can cause the journalists or human rights workers to be killed.  In these countries it would be prudent for the journalists to keep their work encrypted.  The encrypted work requires knowledge of the passwords which could be beaten out of the journalists or human rights workers.  A good journalist will keep a record of different sources in order to verify the accuracy of the story.  The sources could be compromised by passwords to encrypted files being extracted from the journalist/human rights worker under torture.  If the journalist human rights worker cannot know what the password is then no amount of torture can extract the password.

In some countries having the wrong religious literature on your computer equipment will result in death if the computer has been seized and viewed by a religious vigilante.  In these countries the literature must be encrypted for a person's safety.

The program has the ability to load and edit keyboards to help ensure that passwords cannot be known.  A  loaded keyboard can be destroyed.  No keyboard no password.  A keyboard can be loaded here to be used later when accessing a password file or can be loaded at the time of entering a password to a password data file.

The keyboard has another important use.  The strength of an encrypted work depends on three things

  1. The strength of the encryption algorithm and its resistance to weaknesses.
    1. met by choosing encryption algorithms that have been well researched and passed by the cryptography community as a strong encryption algorithm
  2. The length of the encryption password
    1. The longer the password the more difficult for the encryption to be cracked by a brute force attack
  3. A Byte has 256 different possibilities.  Many passwords can only use a fraction of these 256 different possibilities.
    1. The larger the fraction of 256 different possibilities each byte of a password can use the stronger the password can be.
  4. The randomness of an encryption password
    1. The more random the password the more difficult it is to guess
  5. The probability of an encryption password being in password cracker
    1. A password cracker used by a large organisation can have a very large database of phases and words that have been published somewhere.
    2. A password cracker database can check through its database extremely quickly and the probability of a long password being found is no different to that of a shorter password.


The use of a password that is not in a password cracker's database requires a random password.  Long random passwords are extremely difficult to remember unless they are practised being used frequently.  The use of a Screen keyboard enables the typing of awkward characters and enables the typing of long random passwords.  By having different keyboards which can be created and saved the creation of difficult to remember random passwords is made easier.  At the same time remembering of a typed keyboard password can be made very difficult if not impossible to remember.


Another important point is that people find it difficult to navigate computer programs from user descriptions.  Many people can recognise a computer program they have used.  Many of these same people have great difficulty describing the program to someone else.  This is useful in that it adds difficulty and thus makes it difficult for a human rights person to describe program usage description under duress.

TrueCrypt Password pre

before e_crypt7.exe version 1.2lin?x

Programs like Truecrypt, Veracrypt, Drivecrypt and others which work on encrypted partitions/containers need long random passwords for security. 
  • The password must be random enough not to be in a password cracker's dictionary. 
  • The password must not be stored any where to prevent someone finding it. 
  • The password needs to be protected from a keyboard logger.
  • The password needs to be created in such a way as to be random but capable of being remembered and easily forgotten under duress.
The instructions at TrueCrypt Password pre will fulfill that requirement.
TrueCrypt Password post

e_crypt7.exe version 1.2lin?x should be updated

e_crypt7.exe version 1.2lin?ae and later applies
Programs like Truecrypt, Veracrypt, Drivecrypt and others which work on encrypted partitions/containers need long random passwords for security. 
  • The password must be random enough not to be in a password cracker's dictionary. 
  • The password must not be stored any where to prevent someone finding it. 
  • The password needs to be protected from a keyboard logger.
  • The password needs to be created in such a way as to be random but capable of being remembered and easily forgotten under duress.
The instructions at TrueCrypt Password post will fulfill that requirement.
Password Manager Many websites have a requirement for a login password.  Each website needs a different password.  With so many websites it becomes impossible to remember all the passwords.  Thus there becomes a need for a password manager.  A password manager
need long random passwords for security. 
  • The password must be random enough not to be in a password cracker's dictionary. 
  • The password must not be stored any where to prevent someone finding it. 
  • The password needs to be protected from a keyboard logger.
  • The password needs to be created in such a way as to be random but capable of being remembered.
  • The password manager needs to be able to hold not so sensitive passwords and thus
    •  be in plain site
    • easily accessible
    • not easily forgotten under duress
  • The password manager needs to be able to hold sensitive passwords and thus
    •  not be in plain site
    •  easily so easily accessible
    • easily forgotten under duress.
The instructions at Password Manager will fulfill that requirement.
1 Add to Password List to do
2 New Password List to do
3 Copy Password to do
4 GetPassword for ClipBoard to do
5 Print Password to do
6 Change Password to do
7 Create Long Password to do
View Text (One Time Pad) to do
(One Time Pad) to do