Data security has been the key design goal of Cryptobase® and every effort has been made to render this software the most secure and reliable Personal Information Manager (PIM) available, regarding protection against unauthorized access.
This program is designed to
- fulfill the highest standards of data security.
- store safely even highly sensitive personal data
- satisfy the needs of even the most paranoid about keeping their data private
List of implemented Security Features
- Permanent Encryption
The database itself remains always encrypted. Decrypted information is never stored on hard disk.
- Single Record Encryption
Every record is individually encrypted, not the database as a whole.
- Multiple Encryption Keys (thousands)
Every record gets its own encryption key.
- Highly secure Encryption Algorithms
Exclusive use or military grade encryption algorithms.
- Hide Private Records
Records marked as private (= particularly sensitive) can be hidden in presence of other viewers.
- Auto-Hide or Auto-Shutoff
If not used for a specified time, the program can be set to hide private records or even shut down automatically.
- Password Entry
Password quality control to avoid easy to guess passwords. Wrong password entries force delay or closure of the program before repeating the entry.
- Optional PIN to access applications
When in "hide private records" (=locked) mode, unlocking can be accomplished using a PIN, and thus avoiding to enter the more complex master password. The PIN is quicker to use in mobile devices with their awkward keyboards. However, it can only be entered once: if wrong, entering the master password is required to unblock private records.
- Clipboard Restrictions
Availability of text copied to the keyboard will be timely limited (30 seconds), whereafter the clipboard will be cleared.
- Secure Backups
Easy and secure creation of backups of your database locally and/or in the cloud repository.