Reply to post: The common flaws in ALL encryption technologies to date are :

Australia wants tech companies to let cops 'n' snoops see messages without backdoors

FooCrypt

The common flaws in ALL encryption technologies to date are :

The FooKey METHOD :

http://foocrypt.net/the-fookey-method

The common flaws in ALL encryption technologies to date are :

1. Typing on a KeyBoard to enter the password

2. Clicking on the Mouse / Pointer device that controls the location of the cursor

3. Some person or device looking / recording your screen as you type the password

4. The human developing a password that is easily guess, or can be brute forced due to its length

5. Sharing the password with a third party to decrypt the data

6. Storing the encrypted data in a secure location so no unauthorised access can be made to either the key(s) to decrypt the data or the encrypted data itself

FooCrypt, A Tale Of Cynical Cyclical Encryption, takes away the ‘BAD GUYS’ by providing you with software engineered to alleviate all the above.

1,2,3 are mitigated by the FooKeyBoard, Auto Key Press and a simple combination of colors modifying the Cypher Key Control Text Window. The TopeSecretCypherKeyControlText Preference Setting enables your to have a such a configuration. All the Text is hidden until you click and drag the cursor over a text area revealing only the portion of the text window you choose.

4 is mitigated by the simple configurability of FooCrypt, the accept random data from an unlimited number of sources and following FooCrypt's DEFAULT settings of utilising a length up to the maximum

5 is mitigated by FooCrypt’s ability to intemperate any binary data as a source for creating a FooKey, hence sharing the FooKey, can be obfuscated by an act as simply as sending the third party :

A Photo

A Music file

A Document

A URL to a data source on the Internet / Intranet

The possibilities are endless

Then, all the third party has to do, is utilise FooCrypt’s Import Window Memory Binary Features, to recreate the FooKey.

Modifications to the imported binary import can be made with ease with FooCrypt’s XY features, enabling identical cursor position for character modifications to the binary import

6 can be mitigated by always storing your encrypted data on an encrypted media device, thus even if your media device is physically stolen, the thief needs to break the disk encryption, and then try to break FooCrypt’s Cyclical Encryption. FooKey’s are always stored on physical media, encrypted in a single layer of encryption. FooKey’s can easily be encrypted by the User with a FooKey, hence, layering the FooKey in multiple layers of encryption.

No one to date has been able to by pass or break into a file encrypted with the FooKey method.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon