Magic Cipher Video: Additional Features

Looking for an App creating for your Windows or Mac Computer? What about an App for your iOS or Android Tablet or Phone, or A Web App? Bespoke, Custom, High Quality Applications. Contact Us

Magic Cipher Video: Steganography (Hiding Data in Images)

Looking for an App creating for your Windows or Mac Computer? What about an App for your iOS or Android Tablet or Phone, or A Web App? Bespoke, Custom, High Quality Applications. Contact Us

Magic Cipher Video: File and Folder Encryption

Looking for an App creating for your Windows or Mac Computer? What about an App for your iOS or Android Tablet or Phone, or A Web App? Bespoke, Custom, High Quality Applications. Contact Us

Version Numbering

Since the dawn of time I have been using one of the more traditional types of version numbering systems for all my software developments. Recently however I have ‘enhanced’ my methodology and now use something slightly different.

To the outside world not a lot will appear to have changed, the N.N.N methodology will still be used, albeit with a slightly different interpretation. Internally however I will be using the full version numbering system shown below:

Aside from building the release date and time into the version number and swapping out Revision Number for Restricted Release Number, the main benefits to me are building an ascending Feature Number and Fix Number into the version number.

These numbers will only ever increase, regardless of the program status changing from (for example) Version 1 to Version 2. This means that at a glance I can see how  features and fixes have been applied to this particular program since day one, without having to go to Version Control for this information.

Looking for an App creating for your Windows or Mac Computer? What about an App for your iOS or Android Tablet or Phone, or A Web App? Bespoke, Custom, High Quality Applications. Contact Us

Magic Cipher: Usage Scenarios and Examples

Example 1: One to One Private Communications

Bill and Ted are ready to start making plans for their next Excellent Adventure. Knowing that their email discussions could be intercepted and easily read, they use the Magic Cipher Shared Secret Generator with it’s Strength Meter to create a Shared Secret they can use together.

They type their discussions into Magic Cipher and email the contents as encrypted text directly from within Magic Cipher. They are now secure in the knowledge that no­-one can obtain access to their plans and attempt to put a spanner in the works!

Example 2: One to Many Private Communications

Bill and Ted decide they want to involve the Historical Babes in some of their plans, but not all. The four of them agree a Shared Secret and now Bill and Ted can communicate between themselves using their own Shared Secret and if they wish to include the Historical Babes they use the second Shared Secret previously agreed between the four of them.

Example 3: One to Many Private Communications over a Public Medium

Frodo is setting off on his next adventure and as is the fashion nowadays he wants to update the world with his travels via an online blog. With his new Macbook Pro this will be easy enough, however there is certain information he wishes only to be read and understood by Merry and Pippin who are holding the fort for him back in Hobbiton.

Before he sets off the three of them agree on a Shared Secret and as Frodo updates the world via his blog he uses Magic Cipher to append an encrypted entry on the end of his posts, in a separate paragraph, knowing that the world can see but not read or understand his instructions, which are only for the eyes of Merry and Pippin. Frodo uses the built in Virtual Keyboard to add a little bit of extra security to his posts.

Example 4: The Benefits of Cross Platform

Unfortunately, small, slim and gorgeous though it is, the Macbook Pro is just a little bit too big ­ and let’s face it, expensive ­ to take across Middle Earth, what with the danger from the Orcs and other dark forces.

At the last minute Frodo decides to switch to a small Linux notebook which he obtained free of charge with his mobile broadband card. Luckily Magic Cipher works as well on Linux as it does on macOS or Windows, so Frodo has no need to change his plans, or his choice of encryption software.

Example 5: Magic Cipher, Not Just for Men

While Frodo is off on his travels his wife, feeling lonely, takes a lover. Knowing that the local Hobbiton ISP takes quite an interest in emails to and from the villagers, they both use Magic Cipher to arrange their rendezvous. Even hobbits need loving.

Besides it was rather selfish of Frodo to disappear like that for months at a time ­ and who knows what he got up to with Sam on that epic journey?

Example 6: A Picture is Worth a Thousand Words …

Sat on his sofa safe back at home several months after his epic journey to Mordor, Frodo dreams of his next challenge. With Sam on board, who now lives several miles away in Bree, Frodo and Sam use the Steganography features of Magic Cipher to enable them to swap ideas and plans which they have hidden in pictures which they upload to their Facebook pages.

With no evidence that their pictures are anything more than rather boring pictures of Sams garden or Frodos wine collection, nobody has any clue that there is another adventure being planned. In fact nobody has any reason to suspect Sam and Frodo are even in communication regularly. Problem Solved!

Magic Cipher Video: Text / Email Encryption

Looking for an App creating for your Windows or Mac Computer? What about an App for your iOS or Android Tablet or Phone, or A Web App? Bespoke, Custom, High Quality Applications. Contact Us

Magic Cipher: The Story [1/2]

In 2007 I’d just launched my first application for the Mac, macVCR and I was looking for inspiration for my next project. I had long recognised the need for a simple and easy to use encryption program and hadn’t been able to find one. I decided my goal should be to create one.  Not only would this ‘scratch an itch’ it would hopefully go on to become a successful product in its own right.  If I needed this then so did others.

The problem was that I used, and still do, macOS, Windows and Linux on a regular basis, and so would some of my customers. If they, for example, use Windows now – they may use macOS in the future.  For this to be a worthwhile endeavour my product would have to run on those three major operating system platforms and provide transparency and compatibility between them. This was no longer a small project.

R10Cipher: Supported Operating Systems

To make this product a reality I chose Xojo as a development platform, or REALStudio as it was then known, and set to work creating R10Cipher.

The first thing I needed was a Vision Statement, something to guide me during development and help focus my thoughts. I settled on the following:

A Simple and Easy Method to Safely Encrypt your Email Correspondence and Document Files.  It’s like your emails and documents are carried by a SWAT team rather than being written on a Postcard !  R10Cipher is for Individuals. For Businesses. For You. For Me. For Mum and Dad. For Teachers. For Professionals. For Journalists. For Executives. For Everybody.  Because our Privacy and Security have never been more important.

The next thing I needed to do was decide on what encryption technology to use. AES was relatively new at the time and was still looked at suspiciously by many Americans following the whole ‘Clipper Chip‘ incident.  In the end I settled on a UK invented encryption technology called Blowfish.  Blowfish is a keyed symmetric block cipher which was invented by ‘Security Guru’ and renowned author Bruce Schneier in 1993. It provides excellent encryption and will continue to do so for the foreseeable future. Blowfish is free of patents and back doors, and Bruce has placed Blowfish in the public domain.

Version 1 of R10Cipher was released in 2008 and sold only a few dozen copies.  Using the feedback from these early customers Version 2 was released with some significant enhancements including drag and drop batch encryption of files and documents.

When Version 2 was released, Version 1 was featured as a free edition on the DVD Cover Disks for the glossy UK editions of MacFormat and MacWorld magazines, on consecutive months.  Since then I have agreed for it to be distributed on several foreign editions of the magazines.  Hundreds of new users were gained through the distribution of the free edition, and many of those went on to pay for an upgrade to Version 2.

Macworld and MacFormat Magazines featuring R10Cipher 1 on the Cover DVD

Direct Sales of Version 2 were excellent, with good feedback and testimonials. New customers means new ideas and feature requests and so Version 3 was scheduled.

Version 3 released 2nd August 2009 was a major new version that addressed all user requests from Versions 1 and 2. The main advantages of Version 3 were an increase in encryption strength to 384 Bit, an encryption strength indicator and a full Key Management capability which creates an encrypted local database which contains the ‘Shared Secrets’ that you use to communicate with your different contacts.

Interest in Version 3 was phenomenal, it far exceeded my expectations. I had many upgrades from Version 2 to Version 3 and as I offered an upgrade policy even from the free edition, I have had a few upgrade from Version 1 to Version 3 also.

2009 also saw R10Cipher become a Finalist in the UK IT Industry Awards, Technology Excellence / Information Security Product category.  The UK IT Industry Awards are held annually by Computing Magazine and the British Computer Society.

R10Cipher: Finalist UK IT Industry Awards

In April 2010 in conjunction with MacFormat Magazine I offered a free Version 2.5 SE on the DVD Cover Disk with a discounted upgrade to Version 3. This promotion was not as successful as earlier promotions, possibly because 2.5 SE was a ‘designed to be free’ product, rather than an actual previously sold version. In addition Version 3 had at this stage been out for a while.

Version 4 of R10Cipher was released in June 2010, with Version 5 being released in July 2012.

Commercially R10Cipher has been a great success for me with several thousand users and it is a product I am very proud of. Just as importantly, my customers have had immediate and measurable benefits through the use of R10Cipher. Previously they knew they needed something to protect their communication and documents, but they could not find a product that seemed easy and simple enough for them to use.  R10Cipher filled that requirement.

IT Security and Data Protection were and are high on many peoples agendas at the moment, or at least they should be, and yet the majority of people are left exposed because until R10Cipher came along there was not a product simple and easy and complete enough for them to consider using it.

Here are some paragraphs about R10Cipher, back in the day:

R10Cipher is unique in that this is the first cross platform end to end encryption product that real people can and will use for day to day encryption purposes. R10Cipher does not attempt to encrypt a complete volume, R10Cipher does not try and involve the user with complex Public Key encryption, R10Cipher does not need a complicated install, in fact R10Cipher does not need installing at all. R10Cipher concentrates on being the easiest to use and most reliable End to End, Text and File Encryption software.

The lack of an installation makes R10Cipher unique in that you can copy the Windows (XP, Vista and 7), Mac OSX and Linux versions of R10Cipher to a USB drive or external device, along with your documents and carry your data about with you knowing that a) You can access that data on any computer and b) It is secure, so if you lose it or leave it in a taxi then the information is unreadable and no harm is done.

Because of it’s simplicity and ease of use R10Cipher pioneers new ways of working. Backup your important data to the web, iCloud, Dropbox or similar – encrypted by R10Cipher, and retrieve the information later, wherever you happen to be. Your data is secure – secured by you not by your web hosting company. If your hosting company is enforced by law to hand over your information, that information is useless to the recipient unless *you* agree to provide access.

The main innovation of R10Cipher therefore is not in the technology but the way in which the product is designed to be easy and simple to use for everybody – not just IT Professionals.

This brings us nearly up to date.  I should perhaps mention that R10Cipher took a back seat for me, as did my other commercial products, between 2012 and 2016.  This was due to personal and health problems involving, amongst other things, Motorcycles and Air Ambulance Helicopters.

R10Cipher was never forgotten and when the chance came to resurrect it through an acquisition by Area51 Limited I was extremely pleased.  Not only could the product be re-written, updated and enhanced and once again made available, but I would be backed up by others who could step into my shoes and continue development, should the worse ever happen.

2016: Magic Cipher was born.  Press Release

Magic Cipher

Part 2 of this post will detail how Magic Cipher was built, its initial goals as well as the way it will change over time and the additional functionality we will be adding in the near future.  For now, you can obtain a copy of Magic Cipher with a 20% discount using the coupon code: MCBL20 which can be entered at checkout:

Contact us for further information:

Looking for an App creating for your Windows or Mac Computer? What about an App for your iOS or Android Tablet or Phone, or A Web App? Bespoke, Custom, High Quality Applications. Contact Us