The Documentation will be put on the web in stages.
In many countries journalists and human rights workers are under threat from the authorities who wish to know what the journalists have written. The contents of what has been written can cause the journalists or human rights workers to be killed. In these countries it would be prudent for the journalists to keep their work encrypted. The encrypted work requires knowledge of the passwords which could be beaten out of the journalists or human rights workers. A good journalist will keep a record of different sources in order to verify the accuracy of the story. The sources could be compromised by passwords to encrypted files being extracted from the journalist/human rights worker under torture. If the journalist human rights worker cannot know what the password is then no amount of torture can extract the password.
In some countries having the wrong religious
literature on your computer equipment will result in death if the
computer has been seized and viewed by a religious vigilante. In
these countries the literature must be encrypted for a person's safety.
The program has the ability to load and edit keyboards to help ensure that passwords cannot be known. A loaded keyboard can be destroyed. No keyboard no password. A keyboard can be loaded here to be used later when accessing a password file or can be loaded at the time of entering a password to a password data file.
The keyboard has another important
use. The strength of an encrypted work depends on three things
The use of a password that is not in a password cracker's database requires a random password. Long random passwords are extremely difficult to remember unless they are practised being used frequently. The use of a Screen keyboard enables the typing of awkward characters and enables the typing of long random passwords. By having different keyboards which can be created and saved the creation of difficult to remember random passwords is made easier. At the same time remembering of a typed keyboard password can be made very difficult if not impossible to remember.
Another important point is that people find it difficult to navigate computer programs from user descriptions. Many people can recognise a computer program they have used. Many of these same people have great difficulty describing the program to someone else. This is useful in that it adds difficulty and thus makes it difficult for a human rights person to describe program usage description under duress.
When practising the tutorials it is worth using a Ramdisk. For further details of a ramdisk go here
before e_crypt7.exe version 1.2lin?x
Programs like Truecrypt, Veracrypt, Drivecrypt and others which work on encrypted partitions/containers need long random passwords for security.
e_crypt7.exe version 1.2lin?x should be updated
e_crypt7.exe version 1.2lin?ae and later applies
|Programs like Truecrypt, Veracrypt, Drivecrypt and others which
work on encrypted partitions/containers need long random passwords
|Password Manager||Many websites have a requirement for a
login password. Each website needs a different password.
With so many websites it becomes impossible to remember all the
passwords. Thus there becomes a need for a password
manager. A password manager
need long random passwords for security.
|1 Add to Password List||to do|
|2 New Password List||to do|
|3 Copy Password||to do|
|4 GetPassword for ClipBoard||to do|
|5 Print Password||to do|
|6 Change Password||to do|
|7 Create Long Password||to do|
|View Text (One Time Pad)||to do|
|(One Time Pad)||to do|
|Example of creating and using Password Data File|
Directory "password" created
encrypted SHA1 log file of directory "check"
|encrypted Double SHA1 log file of directory "check"|
"3 SHA1 Log" - checks directory against password encrypted log file
"4 Double SHA1 Log" - checks directory against encrypted double log file