Why Does The Crypto Bone
Protect Your Privacy?We're living in an online world that is severely damaged by universal surveillance.
Our every-day lifes in this world depend on complex and obscure services being run by companies, which leave us with little alternatives to giving up our privacy.
In doing so, they also have substantially reduced our freedom. The freedom to share thoughts with other people confidentially.
It's time to take back our freedom and to have secure communications without the fear of surreptitious intrusions into our privacy. Secure communication is a right, not a generous concession.
It's time to take control yourself.
Why is it so hard to find a useful solution?
Ordinary users are no encryption experts, and they don't intend to spend the time to become one. Secure communication should be a matter of course for everyone, not just for those who are familiar with cryptography.
On the other hand, there is no simple solution for secure communications, ready to go. And the reason is simple: a solution is useful only, if it is secure, if it can defend against the numerous threats lurking around in the online world. Designing such a secure solution is hard, because the threats are complex and constantly changing.
This fact makes people believe, that they have to trust the internet giants to deliver and run secure communication for them, using apps they don't control nor understand. Many just give up and decide to send their messages unprotected. Sometimes with sore conscience, but what else should they do?
The Crypto Bone is here to change that.
A well-designed encryption tool under your control
Because all computers we use today are complex things and they can be attacked in may ways, it will be prudent to delegate all the hard work of message encryption to a device - the Crypto Bone - that is prepared to work reliably as an isolated, well-designed tool with minimal complexity.
People who have tried to use encryption, often find themselves in the desperate situation of managing all the different and confusing encryption keys. Key management is a really hard job and should better be done by a separate device, designed for that task. But it's also very important that you as the owner of the Crypto Bone remain in control of what happens.
In short, the Crypto Bone will make your life easier because it offers you a choice, you didn't have before: to escape the universal surveillance in a way that you control yourself.
The Crypto Bone:
- can be operated using a graphical user interface on your main computer,
This GUI program does not require special skills or knowledge.
- does not require that you remember complex passwords, because you control the keys physically that are needed to run the Crypto Bone,
- performs all message encryption and decryption inside an isolated environment that is not exposed to the numerous insecure processes on your computer,
- frees you from keeping track of all the different message encryption keys to be used,
- stores all message encryption secrets in its own protected data base,
- is reliable, usable and secure.
Make yourself familiar with the Crypto Bone
If you think the Crypto Bone can help you to protect your privacy, you may be interested in more detailed information about this project.
If you don't have any external device apart from your own computer, you can still run the Crypto Bone on your local Linux machine with the ALL-IN-ONE mode of the software.
Once you've installed any of the packages provided on the download page you can run a software-based Crypto Bone within seconds.You can download the complete Crypto Bone software including the "cryptobone2" GUI control program from the download page, where you can find detailed information about the installation and the first steps after installation.
If you are interested in the technical aspects of the Crypto Bone's inner workings this explanation is for you.
Finally, there is comprehensive analysis of the Crypto Bone's security.