Magic Cipher Video: Additional Features

http://www.magiccipher.com

Looking for an App creating for your Windows or Mac Computer? What about an App for your iOS or Android Tablet or Phone, or A Web App? Bespoke, Custom, High Quality Applications. Contact Us

Magic Cipher Video: Steganography (Hiding Data in Images)

http://www.magiccipher.com

Looking for an App creating for your Windows or Mac Computer? What about an App for your iOS or Android Tablet or Phone, or A Web App? Bespoke, Custom, High Quality Applications. Contact Us

Magic Cipher Video: File and Folder Encryption

http://www.magiccipher.com

Looking for an App creating for your Windows or Mac Computer? What about an App for your iOS or Android Tablet or Phone, or A Web App? Bespoke, Custom, High Quality Applications. Contact Us

Magic Cipher: Usage Scenarios and Examples

Example 1: One to One Private Communications

Bill and Ted are ready to start making plans for their next Excellent Adventure. Knowing that their email discussions could be intercepted and easily read, they use the Magic Cipher Shared Secret Generator with it’s Strength Meter to create a Shared Secret they can use together.

They type their discussions into Magic Cipher and email the contents as encrypted text directly from within Magic Cipher. They are now secure in the knowledge that no­-one can obtain access to their plans and attempt to put a spanner in the works!

Example 2: One to Many Private Communications

Bill and Ted decide they want to involve the Historical Babes in some of their plans, but not all. The four of them agree a Shared Secret and now Bill and Ted can communicate between themselves using their own Shared Secret and if they wish to include the Historical Babes they use the second Shared Secret previously agreed between the four of them.

Example 3: One to Many Private Communications over a Public Medium

Frodo is setting off on his next adventure and as is the fashion nowadays he wants to update the world with his travels via an online blog. With his new Macbook Pro this will be easy enough, however there is certain information he wishes only to be read and understood by Merry and Pippin who are holding the fort for him back in Hobbiton.

Before he sets off the three of them agree on a Shared Secret and as Frodo updates the world via his blog he uses Magic Cipher to append an encrypted entry on the end of his posts, in a separate paragraph, knowing that the world can see but not read or understand his instructions, which are only for the eyes of Merry and Pippin. Frodo uses the built in Virtual Keyboard to add a little bit of extra security to his posts.

Example 4: The Benefits of Cross Platform

Unfortunately, small, slim and gorgeous though it is, the Macbook Pro is just a little bit too big ­ and let’s face it, expensive ­ to take across Middle Earth, what with the danger from the Orcs and other dark forces.

At the last minute Frodo decides to switch to a small Linux notebook which he obtained free of charge with his mobile broadband card. Luckily Magic Cipher works as well on Linux as it does on macOS or Windows, so Frodo has no need to change his plans, or his choice of encryption software.

Example 5: Magic Cipher, Not Just for Men

While Frodo is off on his travels his wife, feeling lonely, takes a lover. Knowing that the local Hobbiton ISP takes quite an interest in emails to and from the villagers, they both use Magic Cipher to arrange their rendezvous. Even hobbits need loving.

Besides it was rather selfish of Frodo to disappear like that for months at a time ­ and who knows what he got up to with Sam on that epic journey?

Example 6: A Picture is Worth a Thousand Words …

Sat on his sofa safe back at home several months after his epic journey to Mordor, Frodo dreams of his next challenge. With Sam on board, who now lives several miles away in Bree, Frodo and Sam use the Steganography features of Magic Cipher to enable them to swap ideas and plans which they have hidden in pictures which they upload to their Facebook pages.

With no evidence that their pictures are anything more than rather boring pictures of Sams garden or Frodos wine collection, nobody has any clue that there is another adventure being planned. In fact nobody has any reason to suspect Sam and Frodo are even in communication regularly. Problem Solved!

Magic Cipher Video: Text / Email Encryption

http://www.magiccipher.com

Looking for an App creating for your Windows or Mac Computer? What about an App for your iOS or Android Tablet or Phone, or A Web App? Bespoke, Custom, High Quality Applications. Contact Us

Magic Cipher: The Story [1/2]

In 2007 I’d just launched my first application for the Mac, macVCR and I was looking for inspiration for my next project. I had long recognised the need for a simple and easy to use encryption program and hadn’t been able to find one. I decided my goal should be to create one.  Not only would this ‘scratch an itch’ it would hopefully go on to become a successful product in its own right.  If I needed this then so did others.

The problem was that I used, and still do, macOS, Windows and Linux on a regular basis, and so would some of my customers. If they, for example, use Windows now – they may use macOS in the future.  For this to be a worthwhile endeavour my product would have to run on those three major operating system platforms and provide transparency and compatibility between them. This was no longer a small project.

R10Cipher: Supported Operating Systems

To make this product a reality I chose Xojo as a development platform, or REALStudio as it was then known, and set to work creating R10Cipher.

The first thing I needed was a Vision Statement, something to guide me during development and help focus my thoughts. I settled on the following:

A Simple and Easy Method to Safely Encrypt your Email Correspondence and Document Files.  It’s like your emails and documents are carried by a SWAT team rather than being written on a Postcard !  R10Cipher is for Individuals. For Businesses. For You. For Me. For Mum and Dad. For Teachers. For Professionals. For Journalists. For Executives. For Everybody.  Because our Privacy and Security have never been more important.

The next thing I needed to do was decide on what encryption technology to use. AES was relatively new at the time and was still looked at suspiciously by many Americans following the whole ‘Clipper Chip‘ incident.  In the end I settled on a UK invented encryption technology called Blowfish.  Blowfish is a keyed symmetric block cipher which was invented by ‘Security Guru’ and renowned author Bruce Schneier in 1993. It provides excellent encryption and will continue to do so for the foreseeable future. Blowfish is free of patents and back doors, and Bruce has placed Blowfish in the public domain.

Version 1 of R10Cipher was released in 2008 and sold only a few dozen copies.  Using the feedback from these early customers Version 2 was released with some significant enhancements including drag and drop batch encryption of files and documents.

When Version 2 was released, Version 1 was featured as a free edition on the DVD Cover Disks for the glossy UK editions of MacFormat and MacWorld magazines, on consecutive months.  Since then I have agreed for it to be distributed on several foreign editions of the magazines.  Hundreds of new users were gained through the distribution of the free edition, and many of those went on to pay for an upgrade to Version 2.

Macworld and MacFormat Magazines featuring R10Cipher 1 on the Cover DVD

Direct Sales of Version 2 were excellent, with good feedback and testimonials. New customers means new ideas and feature requests and so Version 3 was scheduled.

Version 3 released 2nd August 2009 was a major new version that addressed all user requests from Versions 1 and 2. The main advantages of Version 3 were an increase in encryption strength to 384 Bit, an encryption strength indicator and a full Key Management capability which creates an encrypted local database which contains the ‘Shared Secrets’ that you use to communicate with your different contacts.

Interest in Version 3 was phenomenal, it far exceeded my expectations. I had many upgrades from Version 2 to Version 3 and as I offered an upgrade policy even from the free edition, I have had a few upgrade from Version 1 to Version 3 also.

2009 also saw R10Cipher become a Finalist in the UK IT Industry Awards, Technology Excellence / Information Security Product category.  The UK IT Industry Awards are held annually by Computing Magazine and the British Computer Society.

R10Cipher: Finalist UK IT Industry Awards

In April 2010 in conjunction with MacFormat Magazine I offered a free Version 2.5 SE on the DVD Cover Disk with a discounted upgrade to Version 3. This promotion was not as successful as earlier promotions, possibly because 2.5 SE was a ‘designed to be free’ product, rather than an actual previously sold version. In addition Version 3 had at this stage been out for a while.

Version 4 of R10Cipher was released in June 2010, with Version 5 being released in July 2012.

Commercially R10Cipher has been a great success for me with several thousand users and it is a product I am very proud of. Just as importantly, my customers have had immediate and measurable benefits through the use of R10Cipher. Previously they knew they needed something to protect their communication and documents, but they could not find a product that seemed easy and simple enough for them to use.  R10Cipher filled that requirement.

IT Security and Data Protection were and are high on many peoples agendas at the moment, or at least they should be, and yet the majority of people are left exposed because until R10Cipher came along there was not a product simple and easy and complete enough for them to consider using it.

Here are some paragraphs about R10Cipher, back in the day:

R10Cipher is unique in that this is the first cross platform end to end encryption product that real people can and will use for day to day encryption purposes. R10Cipher does not attempt to encrypt a complete volume, R10Cipher does not try and involve the user with complex Public Key encryption, R10Cipher does not need a complicated install, in fact R10Cipher does not need installing at all. R10Cipher concentrates on being the easiest to use and most reliable End to End, Text and File Encryption software.

The lack of an installation makes R10Cipher unique in that you can copy the Windows (XP, Vista and 7), Mac OSX and Linux versions of R10Cipher to a USB drive or external device, along with your documents and carry your data about with you knowing that a) You can access that data on any computer and b) It is secure, so if you lose it or leave it in a taxi then the information is unreadable and no harm is done.

Because of it’s simplicity and ease of use R10Cipher pioneers new ways of working. Backup your important data to the web, iCloud, Dropbox or similar – encrypted by R10Cipher, and retrieve the information later, wherever you happen to be. Your data is secure – secured by you not by your web hosting company. If your hosting company is enforced by law to hand over your information, that information is useless to the recipient unless *you* agree to provide access.

The main innovation of R10Cipher therefore is not in the technology but the way in which the product is designed to be easy and simple to use for everybody – not just IT Professionals.

This brings us nearly up to date.  I should perhaps mention that R10Cipher took a back seat for me, as did my other commercial products, between 2012 and 2016.  This was due to personal and health problems involving, amongst other things, Motorcycles and Air Ambulance Helicopters.

R10Cipher was never forgotten and when the chance came to resurrect it through an acquisition by Area51 Limited I was extremely pleased.  Not only could the product be re-written, updated and enhanced and once again made available, but I would be backed up by others who could step into my shoes and continue development, should the worse ever happen.

2016: Magic Cipher was born.  Press Release

Magic Cipher

Part 2 of this post will detail how Magic Cipher was built, its initial goals as well as the way it will change over time and the additional functionality we will be adding in the near future.  For now, you can obtain a copy of Magic Cipher with a 20% discount using the coupon code: MCBL20 which can be entered at checkout: http://www.magiccipher.com

Contact us for further information:

Looking for an App creating for your Windows or Mac Computer? What about an App for your iOS or Android Tablet or Phone, or A Web App? Bespoke, Custom, High Quality Applications. Contact Us

New Pinterest Account

We now have a Pinterest account. Still in it’s infancy and only a few dozen images so far, but if you want a peek, here it is:

Follow Steven’s board chol.technology on Pinterest.

 

busbannerAffiliate Links

 

oneSql Multi Database Tool: Final Beta

The Final Beta of my Cross Platform, Multi Language, Multi Database Tool – oneSql is now available. Hopefully I’ve got everything right and it performs as expected with no (major!) bugs. Existing Beta Testers can download from the usual place, and new Beta Testers can sign up HERE.

Prior to release I have to finish the Manual, finalise Pricing, setup Paypal and also setup a Sample Database for new users to use during their Trial Mode. I also need to put the oneSql website live … mmm more than I realised … 🙂

The final artwork has arrived back for the oneSql box and the oneSql manual, you can see the images below:

onesqlcoverimages

Note that for this final Beta you should delete both your Settings and your Preferences file as there have been changes involving encryption.

For information on Software Licensing for oneSql, have a look at my recent blog posts on this subject, here and here.

I wanted to do something different to mark the release of oneSql, so I am toying with the following idea of a bonus or incentive, I’d love to know your opinions:

The first 10 people to purchase any edition of oneSql (except the Single User Standard Edition) will receive a Limited Edition oneSql mug (1 of only 20 in existence) as well as a goody bag of assorted promotional items. In addition they will receive a printed and signed edition of my computer security ebook, ‘Securing the Network’. I may even throw a T-Shirt in there as well 🙂 I will ship this bonus to anywhere in the world. 

The first 100 purchasers of oneSql Single User Standard Edition receive a voucher worth $5 off their next purchase from chol.technology.

As always – leave you comments below. If you don’t talk I can’t listen.

busbanner

Affiliate Links

Heartbleed: This Could Hurt

Heartbleed is the name given to the recently confirmed bug found in the OpenSSL Cryptographic Software Library. This vulnerability affects SSL/TLS encryption which is used to obtain a ‘Private’ connection between your computer and a server located elsewhere on the Internet.

heartbleed

This is a serious vulnerability and you are more than likely to be affected either directly or indirectly.  For further information go to this site: heartbleed.com

 

Blogfooter

 Products and Affiliate Links

 

R10Cipher: New Release and Discount

A new version of my best selling product,  R10Cipher was released earlier today.

R10cipherfooter

This is a free of charge (for Version 5 Customers) interim release of R10Cipher which fixes some issues in Version 5, prior to the commercial release of Version 6.

On the Mac this version is now fully Cocoa which makes this version the fastest and most stable yet. The Clear Text area has also been substantially worked on and no longer feels sluggish when working with larger documents. Performance has also been increased on Windows and Linux.

There is a new Support window, accessible from the Toolbar.

The three available Views; Main, Activity and Keys can once again (as per Version 4) be accessed from the Toolbar as well as the Menus. In addition they are now ‘Toggle’ buttons.

The Encryption and Decryption engine remains unchanged from previous releases.

As an incentive anyone purchasing R10Cipher in the next week can email me and ask for a 30% discount code. They will also receive the Version 6 upgrade free of charge next month.

Here are some images of the new release:

R10cipher55

Blogfooter

Products and Affiliate Links

 

Customer Feedback

All I did was send this customer a new license for R10Cipher after he lost his license during a reformat of his hard disk.  This was his reply:

Thank you, Steven. Looking forward to your next gem. – Joe

www.r10cipher.com

It means a lot to get thanked like that. Cheers Joe.

 

Blogfooter

 

Products and Affiliate Links

 

Software Help: R10Cipher

Software:            R10Cipher
Author:                Steven Cholerton
Last Update:        July 2013


Registering R10Cipher

After downloading R10Cipher and deciding that you would like a full working copy, you can purchase this directly at the following web address:


Once you have done this we are automatically notified of your purchase and a User Name and Serial Number are sent out to you via email.  The Serial Number is tied to your Name and the two must be used in conjunction.

Note: R10Cipher 5 needs a different serial number to previous versions.  Existing users can upgrade at reduced cost for a limited period.  Please contact upgrade@artenscience.com for further details.

When you receive the serial number email you should follow the included instructions.  In a few seconds R10Cipher will be fully licensed and ready to use.

Our licensing allows one purchase to be installed on two computers that you own, for example your desktop and also your laptop.  Please respect our efforts and purchase additional licenses if you need to install on multiple computers.  We also offer discounted licenses for families, corporations, charities and educational establishments.

Any problems with registration, please email us at: support@artenscience.com


Introduction

R10Cipher is a simple but extremely powerful Cross Platform Encryption / Decryption tool.

R10Cipher takes text or files and encrypts them using up to 384 bit Blowfish encryption.

These files can be Word files, Excel files, MP3 files – almost any kind of file.

These encrypted files can be copied elsewhere, even to a different operating system and unencrypted by anyone in possession of the Shared Secret that was used for the encryption. If encrypting text, the Cipher Text can then be copied into an email, saved as a file and attached to an email or just copied elsewhere.

The recipient can use R10Cipher to open the file and view the encrypted contents, assuming they are in possession of the Shared Secret that was used to encrypt the document in the first place.

If encrypting a file the encrypted file can be stored or sent in the full knowledge that the contents are not visible to anyone without access to R10Cipher or cuteCipher and the Shared Secret.

Decryption can be carried out just by double clicking the encrypted file and entering the Shared Secret.

R10Cipher supports batch encryption by drag and drop to make encryption fast and painless, even when dealing with dozens of files.

As R10Cipher does not require installation you can for example copy the Mac, Windows and Linux versions of R10Cipher to a USB drive along with your encrypted documents and files.  Your documents and files are secure ,but available whenever and wherever you require them.

R10Cipher does not make any alterations to your computer and stores the configuration files within its own folder.

Many people do not realise that sending an email is the equivalent of sending a postcard, it’s contents are easily visible. For many companies, individuals and markets this is totally unacceptable and with the potential complexity and setup issues with the Public Key Encryption systems it makes sense to encrypt using R10Cipher.

R10Cipher, like all software, is a work in progress.  We need your feedback to keep R10Cipher the best Cross Platform Encryption Tool available.  Contact us with your suggestions and comments.

R10Cipher 5 is a major rewrite with additional functionality that was asked for by our customers.  5 is also slicker, faster and easier to use than ever before.  Encryption has never been so painless.


Text Encryption

Enter your Shared Secret (this is your encryption key) into the area at the bottom left of the screen.  This can be between 4 and 56 characters.  For example:  yuetrtytpl*565r0.  Enter your Shared Secret again in the area directly below to confirm that you did not make any typing errors.

Important Note:  The strength of the encryption is directly related to the length of your encryption key.

Enter the message or text you wish to encrypt into the large text area to the right.  You can right click and Paste the text, or use Drag and Drop if you wish.

Select the Encrypt button (There is also a Menu Option and a Hot Key Shortcut).  You will see the encrypted text shown in the text area on the left of the screen.

You now have a number of options:

1. Click the Email button and an email will be opened for you with the encrypted text as the message.

2. Click the Clipboard button and the Encrypted text will be copied to clipboard, ready to be pasted elsewhere.

3. Click the SMS button and the Encrypted text will be sent to the phone number you input.  This option assumes you have purchased SMSRelay or subscribed to the SMSRelay service.

4. Use the Save option on the File Menu and save the Encrypted text as a document.


Text Decryption

To Decrypt a message or text use any of the following options:

1. Open an Encrypted document using the Open option on the File Menu

2. Paste the Encrypted text into the cipher text area to the left of the screen.

3. Drag the Encrypted text into the cipher text area to the left of the screen.

Enter the Shared Secret and Select the Decrypt button (A Menu Option and Keyboard Shortcut are also available) to view the Decrypted contents.

You can then do any of the following:

1. Select the Print button on the Toolbar and output the Decrypted Text

2. Select the Speak button on the Toolbat and listen to the Decrypted Text as it is read to you by your computer.


File Encryption

Enter your Shared Secret (this is your encryption key) into the area at the bottom left of the screen.  This can be between 4 and 56 characters.  For example:  yuetrtytpl*565r0.

Drag and Drop your files over the large text area on the right of the window. Your documents will be Encrypted and placed on the Desktop.

The filename for the Encrypted files remains the same but the file extension is changed to .r10Enc.

This activity will be logged to the Activity Log. Following the encryption, this will show you details of the encryption process. The Activity Log can be viewed by using the option on the View Menu.

Optionally the Log can be saved to the database by activating the option within the Preferences screen.

For average size documents and files the encryption will be virtually instantaneous.


File Decryption

There are three ways to Decrypt files with R10Cipher.

Decrypt a File from Within R10Cipher

Enter your Shared Secret (this is your encryption key) into the area at the bottom left of the screen.  This can be between 4 and 56 characters.  For example:  yuetrtytpl*565r0.

The first way is to open R10Cipher and choose the Open option on the File Menu. R10Cipher will then ask you to select the file that you wish to Decrypt.

Once selected R10Cipher will ask you for the name you would like to call the decrypted file, the original name is used as the default.  The decrypted file will be saved with the name, and at the location, you chose.

Drag and Drop Decryption

Enter your Shared Secret (this is your encryption key) into the area at the bottom left of the screen.  This can be between 4 and 56 characters.  For example:  yuetrtytpl*565r0.

Drag and Drop your encrypted files over the smaller text area on the left of the window. Your documents will be Decrypted and placed on the Desktop.

Double Click a File to Decrypt

R10Cipher 5 attempts to make working with encrypted files as simple as possible.  Therefore any encrypted file can be decrypted just by double clicking the encrypted file.

Following the double click you see the R10Cipher File Decrypt window.

Enter the Shared Secret that was used to encrypt the file and press the Continue button.  R10Cipher will save the decrypted file to your desktop with the original file name.

NOTE:  Before you use this feature for the first time you may need to associate the R10Enc files with the R10Cipher Software.  How you do this depends on your Operating System.  We have instructions in the Manual Addendum for Mac OSX and Windows XP.


Key Creation

The creation of keys is done by selecting the following Menu Option:

     Key Management
          Key Creation and Administration

You will see the Key Creation and Administration window.

This is where you setup your clients/contacts and your/their Shared Secrets.  In addition, for each client you setup you can assign two passwords, a Master password and a Usage Password.  For an explanation of the two passwords see the Key Management Introduction section.

To Insert a contact, just start typing and fill in the five information fields, from Name to Usage Password.  When complete press Save, and Save again to confirm.

To Edit a contact, select the contact from the list on the left hand side of the screen.  You will see the Name and Email Address but the Shared Secret and the Passwords are encrypted and not readable.  To view this data and edit it you need to input the Master Password for this contact into the Decode Password area of the screen and press the Decode button.  You can then edit the information and save it using the Save button.

To Delete a contact, select the contact from the list on the left hand side of the screen.  You will need to input the Master Password for this contact into the Decode Password area of the screen and press the Decode button.  You can then press the Delete button to erase the record.

Note:  Deleted records are gone and cannot be retrieved.

If you intend entering a number of clients or contacts you may already have them stored in a database or spreadsheet somewhere.  If that is the case then you should Import the records which will save you time and increase information accuracy.

Note:  You will need to edit each record later to apply the Shared Secret and Password(s).

To Import records you have three choices which can be selected using the Radio buttons on the bottom left of the window.  When you have selected the type of import you require press the Import button.  The three choices are Tab Delimited, Apple Address Book and the ContaxCRM Database.


Key Retrieval

Scenario 1: Encrypting or Decrypting Text or a File from within R10Cipher

In these circumstances instead of having to remember and enter the Shared Secret for the contact you can instead select the Keys View (from the View Menu) and input the Master or Usage Password for the appropriate contact.  Then choose the contact from the list.  You can search for the contact and filter the list using the search box on the bottom left of the screen.

Select the contact in the list.  If you have entered the correct Password the indicator will change from red to Green and the Shared Secret fields will be populated.

You can now encrypt text or files without having to enter the Shared Secret.

Another Advantage of retrieving the Shared Secret from the Key Management Database is that if you are sending an encrypted email, R10Cipher will know the email address and fill in the email header appropriately.

So instead of having to remember lots of Shared Secrets and Email Addresses, you only, using the Key Management Database, have to remember a minimum of one Password.

Scenario 2: Double Clicking an Encrypted File to Decrypt It

When double clicking an encrypted file you now see the R10Cipher File Decrypt window.

In these circumstances instead of having to remember and enter the Shared Secret for the contact you can instead input the Master or Usage Password for the appropriate contact.

You can search for the contact and filter the list using the search box on the bottom left of the screen.

Select the contact in the list.  If you have entered the correct Password the indicator will change from red to Green and the Shared Secret fields will be populated.

Click Continue to decrypt your file.

###

The R10Cipher Story

Product: R10Cipher

Purpose: Email and File Encryption and Privacy Software

Website: http://www.r10cipher.com

Online: http://www.webappdevelopments.com/artenscience/r10online/r10online.cgi

r10cipher

Overview

A Simple and Easy Method to Safely Encrypt your Email Correspondence and Document Files. It’s like your emails and documents are carried by a SWAT team rather than being written on a Postcard ! R10Cipher is for Individuals. For Businesses. For You. For Me. For Mum and Dad. For Teachers. For Professionals. For Journalists. For Executives. For Everybody. Because our Privacy and Security have never been more important.

Innovation

R10Cipher is unique in that this is the first cross platform end to end encryption product that real people can and will use for day to day encryption purposes.  R10Cipher does not attempt to encrypt a complete volume, R10Cipher does not try and involve the user with complex Public Key encryption, R10Cipher does not need a complicated install, in fact R10Cipher does not need installing at all.  R10Cipher concentrates on being the easiest to use and most reliable End to End, Text and File Encryption software.

The lack of an installation makes R10Cipher unique in that you can copy the Windows (XP, Vista and 7), Mac OSX and Linux versions of R10Cipher to a USB drive or external device, along with your documents and carry your data about with you knowing that a) You can access that data on any computer and b) It is secure, so if you lose it or leave it in a taxi then the information is unreadable and no harm is done.

Because of it’s simplicity and ease of use R10Cipher pioneers new ways of working.  Backup your important data to the web, iCloud, Dropbox or similar – encrypted by R10Cipher, and retrieve the information later,  wherever you happen to be.  Your data is secure – secured by you not by your web hosting company.  If your hosting company is enforced by law to hand over your information, that information is useless to the recipient unless *you* agree to provide access.

The recipient of an R10Cipher encrypted document or file has to do nothing more advanced than double clicking the file and entering the ‘Shared Secret’.  The document or file is decrypted and saved to the recipients desktop using the original file name.  Again, this is one of the features of R10Cipher that helps make R10Cipher an encryption product that can and will be used by ‘Mum and Dad’.

The main innovation of R10Cipher therefore is not in the technology but the way in which the product is designed to be easy and simple to use for everybody – not just IT Professionals.

r10cipher

Success

From an initial release in early 2008 R10Cipher is now at Version 5 which was released July 2012.  Version 1 was build because we needed it and I decided that if we did, then so did others.  Version 1 sold a few dozen copies and using the feedback from these early customers Version 2 was released with some significant enhancements including drag and drop batch encryption of files and documents.

When Version 2 was released, Version 1 was featured as a free edition on the DVD Cover Disks for the UK editions of MacFormat and MacWorld, on consecutive months.  Since then I have agreed for it to be distributed on several foreign editions of the magazines.  Hundreds of new users were gained through the distribution of the free edition, and many of those went on to pay for an upgrade to Version 2.

Direct Sales of Version 2 were excellent, with good feedback and testimonials.  New customers means new ideas and feature requests and so Version 3 was scheduled.

Version 3 released 2nd August 2009 was a major new version that addressed all user requests from Versions 1 and 2.  The main advantages of Version 3 were an increase in encryption strength to 384 Bit, an encryption strength indicator and a full Key Management capability which creates an encrypted local database which contains the ‘Shared Secrets’ that you use to communicate with your different contacts.

With an appropriate password you can recall these and use them for encryption and decryption quickly and easily.

Interest in Version 3 was phenomenal, it far exceeded our expectations.  We have had many upgrades from Version 2 to Version 3 and as we offered an upgrade policy even from the free edition, we have had a few upgrade from Version 1 to Version 3 also.

For Version 3 the decision was made to give NFR, Free of Charge, copies of R10Cipher to employees of Apple Computer Inc.  We also offered our desktop security product MonitorMyMac http://www.monitormymac.co.uk/ on the same terms.  Interest from Apple employees has been excellent with over 1000 licenses already applied for and sent.  Who knows how many licenses sold since have been a result on recommendations from Apple employees ?

In April 2010 in conjunction with MacFormat Magazine we offered a free Version 2.5 SE on the DVD Cover Disk with a discounted upgrade to Version 3.  This promotion was not as successful as earlier promotions, possibly because 2.5 SE was a ‘designed to be free’ product, rather than an actual previously sold version.  In addition Version 3 had at this stage been out for a while.

June 2010 brought R10Cipher IV.  An exciting new release of R10Cipher. Fast becoming a standard for cross-platform text and file encryption.

This brings us neatly to July 2012 and R10Cipher 5.  Many new features including automation.  You can read about these changes on the website.

Commercially R10Cipher has been a great success for Arten Science with several thousand users and it is a product I am very proud of.  Just as importantly, our customers have had immediate and measurable benefits through the use of R10Cipher, previously they knew they needed something to protect their communication and documents, but they could not find a product that seemed easy and simple enough for them to use.

IT Security and Data Protection are high on many peoples agendas at the moment, or at least they should be, and yet the majority of people are left exposed because until R10Cipher came along there was not a product simple and easy and complete enough for them to consider using it.

Customer Satisfaction

Some of the feedback we have received for R10Cipher recently:

R10Cipher is a fantastic cross platform tool which has given us the peace of mind that our patient sensitive research data can be transmitted electronically in a secure manner on site or with collaborators around the world.  The ability to encrypt and attach files to emails or simply encrypt the email text between Apple Macs and Windows PCs without the need for complicated software installations means that our users are happy to use this great bit of software.  The developer’s proactive approach to their software development requesting and rapidly incorporating users feedback has turned a good encryption tool into and excellent one.  Paul McGrath, Computer Manager, Cancer Research UK Clinical Centre

 

My Sony USB Microvault is so much easier than lugging my laptop through airport security, yet again.  The nightmare of the lost or stolen USB stick is only too real, with the Staff Salary Reviews and the Acquisition Financials modeled in embarrassing detail.  I use R10Cipher for Mac as a simple and reliable way of exchanging financial models and private placement memorandums across platforms as well as for secure storage on my USB sticks and portable hard drives.  Simple, reliable and easy to use. Karl Mattingly, Partner, slowCapital

 

R10Cipher is simple, easy to use and powerful. It is the best encryption program for the Mac we have found.  Paul, OnTravel.Com

 

R10Cipher has been an excellent product for ensuring the safe and secure transmission of files in a cross platform environment.  As an independent Strategy Consultant using Apple Mac, but with a client base using mostly PC platforms, I need to find a way to easily send sensitive market and financial data to clients with no hassle for my clients.  R10Cipher does the job simply, easily, and with no problems at all, and causes no difficulties with clients firewalls. Enough said!… great product.  Peter M. Scott

 

For NetFoos I am lucky enough to travel around the USA and parts of Europe to bring live streaming foosball tournaments to the foosball community. For the live streaming there is a lot of information needed to keep the server running and secure. Now, while on the road with R10Cipher, receiving this information from the home office is much easier as we can simply encrypt and email it while feeling confident that our data remains private. Although we are constantly finding new uses for the software, this one capability has made R10Cipher a great investment for us.  Mark Winker, NetFoos.com

 

If you need to make company or private info available on a need to know basis, them R10Cipher is the tool for you. There are other encryption packages but I haven’t found an easier to use cross platform software than this one.  Paulo Pires

 

Developed in the UK

R10Cipher was designed and developed entirely in the UK by Steven Cholerton, a Chartered Information Technology Professional awarded by the BCS, Fellow of the Institution of Analysts and Programmers, Certified Ethical Hacker and holder of several Security and Technology certifications.  http://www.stevencholerton.com

The encryption technology used by R10Cipher was also developed in the UK.  Blowfish is a keyed symmetric block cipher which was invented by ‘Security Guru’ and renowned author, Bruce Schneier, Chief Security Technical Officer at British Telecom, in 1993.  It provides excellent encryption and will continue to do so for the foreseeable future.  Blowfish is free of patents, and back doors, and Bruce has placed Blowfish in the public domain. 

Availability

The publisher of R10Cipher is Arten Science, a small Derbyshire based enterprise dedicated to providing quality and innovative software, security and business solutions.  http://www.artenscience.com

Award

r10cipher

r10cipher

Summary

The success of R10Cipher is primarily down to one thing:

The fact that R10Cipher provides much needed security and encryption functionality in a way that makes it accessible to anybody and everybody. Having listened to the users and let them guide the development of the product has meant that R10Cipher does what it needs to do and no more.

The R10Cipher website states:  ‘Security For All. It Just Works’ and goes on to say ‘It’s like your emails and documents are carried by a SWAT team rather than being written on a Postcard !’.  Those two statements mention nothing about 384 Bits or Blowfish or Symmetric Block Ciphers, instead they appeal directly to the man in the street who has information that needs protecting.

The fact that we listen to our users and incorporate their changes as well as the ability of R10Cipher to work on all popular computer platforms without requiring installation, that is all icing on the cake.  Very tasty icing we think.

r10cipher

@stevechol