Blog

Cryptoucan™ usage: PIN management

Written by Dominik Joe Pantůček on 2018-08-02

While using an external cryptographic token brings your overall security to the next level - as the keys cannot be stolen from possibly compromised personal computer, it takes more than that to ensure it is not just a false sense of security you get. It is - at least - necessary to protect the keys against an adversary that gains physical access to your Cryptoucan™. And that is where strong PIN protection can be very useful.

...

Cryptoucan™ usage: Initialization

Written by Dominik Joe Pantůček on 2018-07-26

Thorough the last few months, we have shown you a lots of mathematical theory, we have tackled the problems of secure online communication and of data confidentiality and authenticity in general and we have revealed we are working on a device that should enable casual computer users to increase their overall data security with respect to all imaginable aspects. Read on to see one of our first prototypes securing the email communication.

...

Cryptoucan™ usage: privileged operations

Written by Dominik Joe Pantůček on 2018-07-19

Last time we have shown you some basic Cryptoucan™ usage. Read on to learn something about the administrator access to Cryptoucan™ and see how the device can be used for performing some privileged operations like key generation or user PIN reset.

...

Cryptoucan™ usage: basic operations

Written by Dominik Joe Pantůček on 2018-07-12

We have already shown you what we have developed. So now it is time to tell you how it is used as a part of your casual workflow with signed documents and encrypted messages. Read on to get the idea.

...

Cryptoucan™ development: Electronic refinements

Written by Dominik Joe Pantůček on 2018-07-05

Designing the electronic circuitry or creating a good looking device were very interesting tasks to do. Yet, to produce the first fully-working prototype, there were many things we needed to address. This Thursday we will have a look at some of these.

...