Opensource File Encryption Tool For Protecting You From NSA
It’s the age of surveillance what made the Use of Encryption
 so widely that it has become a need of law enforcement agencies, cyber 
criminals as well as every individual. But, encryption is not so easy. 
To solve this problem, a 23-year old Cryptocat developer
 Nadim Kobeissi is ready to release a simple solution to deliver strong 
encryption at the HOPE hacker conference in New York later this month, 
which may soon come as an extension for Google Chrome web browser, Wired
 reported.
The encryption program is dubbed as miniLock, which is a free and
 open-source browser plugin designed to let anyone encrypt and decrypt 
files in seconds using a drag-and-drop interface with practically 
unbreakable cryptographic protection.
“The tagline is that this is file encryption that does more with less,” says Kobeissi, activist and security consultant. “It’s super simple, approachable, and it’s almost impossible to be confused using it.”
Drag-and-drop interface here means, miniLock offers an 
area where files can be dropped into the program for encryption and 
encrypts the data in such a manner that leaving recipient, nobody—not 
even law enforcement units or government intelligence agencies—could 
able to decrypt and read it. 
The encryption program miniLock can be used to work with all type of 
files, from multimedia to documents and even items stored on a USB drive
 and encrypts files for secure storage on Dropbox or Google Drive.
miniLock encryption program relies on asymmetric encryption,
 just like PGP (Pretty Good Privacy), which requires two separate 
cryptographic keys, public key and private key, for encrypting and 
decrypting the information. Users share the public key with the one who 
wants to send them files securely, while the private key is always with 
the user protected and concealed.
But, in case of miniLock, user needs to enter a passphrase—a strong one 
with as many as 30 characters or a lot of symbols and numbers—from which
 the program will derive a public key, called a miniLock ID, and a 
private key, which is never been seen by the user and gets vanished when
 the program get closed. Both generated keys are same every time the 
user enters the passphrase. 
This trick of generating the same keys again and again in every session,
 makes the application usable on any computer without getting worry 
about the safety of storing the sensitive private key. 
Additionally, the automatic generation and management of the public and 
private keys are exactly what makes the miniLock program easy to use 
even by an average user who always looks for a simple as well as secure 
solution to protect their information when sending it over the web.
“No logins, and no private keys to manage. Both are eliminated. That’s what’s special,” says Kobeissi. “Users can have their identity for sending and receiving files on any computer that has miniLock installed, without needing to have an account like a web service does, and without needing to manage key files like PGP.”
This is why, the type of protection the program is providing cannot be descrambled even by law enforcement and government intelligence agencies, which makes it one of the most secure kinds of encryption program. 
Because miniLock uses an elliptic curve cryptography flavour of 
encryption, MiniLock IDs are 44 characters long, while PGP’s public keys
 often reach almost a page with random text. This small size of keys 
makes the sharing possible through different communication channels such
 as a Twitter post or even a phone SMS message. 
The full technical explanation of miniLock’s elliptic curve will be presented by Kobeissi at the HOPE conference
 in New York, starting July 18. He will present a beta version of the 
miniLock program at the New York conference, as the encryption program 
he proposes is currently in its experimental stage of development. 
miniLock as an extension for Google Chrome
 web browser won't initially be released, instead the code will be soon 
available for review on GitHub, so that the flaws and loopholes are 
eliminated before the release of the tool in Chrome Web Store.
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.