Security Features
Introduction
This
program is designed to
fullfill the highest standards of data security. It
stores safely
even highly sensitive personal data, in a way that should satisfy
the needs of even the most demanding users.
Permanent Encryption
All
information is
permanently stored in encrypted form
on the hard disk. There is no need to decrypt a complete database
file before opening it.
Only one piece of information
at a time is made readable, but without saving any part of it in
readable form on the disk. The information needed appears only on
the screen.
Single Record Encryption
Every
single piece of information (record) is encrypted with one out of
tenthousands
of passwords
(see next paragraph). When
reading a specific record (e.g. an address), it is copied to the volatile memory (RAM)
where it is decrypted before being displayed on the screen. On the
harddisk it remains stored in encrypted form. The
plain (decrypted) information is NEVER EVER stored on the harddisk,
not even partially. If the record is modified, it passes
the encryption filter before being written back to the harddisk. Nobody will ever be able
to hack or to decipher any info by analyzing the harddisk, not even
with the most sophisticated methods available.
Thousands of Encryption Keys (Passwords)
While the database is opened
with one main passphrase (the Master Passphrase), internally, tens of thousands encryption
keys (composed of random characters) are created with a special
algorithm and used to encrypt every piece of information individually.
The likelihood of the same key being used more than
once in 50000 records is almost nil. In other words, in an average
sized database, all records are encrypted with different, individual
keys.
Highly secure Encryption Algorithms
The
128 – 256 bit encryption algorithms are similar to those used by
the military and are among the most secure. It has been calculated
that the 128 bit encryption algorithms are so strong that it would
take a network of supercomputers
significantly longer than the age
of the universe to crack the code
(millions
of years), not to speak of 192 and 256 bit encryption, used extensively
in the program, too. Since every record is encrypted with an individual
password, in the utopical event of
someone succeeding
to
break the
code, only the information contained in 1 single record would be
uncovered.
Featuring:
Auto-Shutoff
If you activate this function,
the program will be closed automatically after a customizable period
of 1-15 minutes of inactivity. This prevents you from inadvertently forgetting
to close your database when leaving your workstation.
Hide Private Records
This function provides
an additional level of security: records flagged as private
can be hidden when someone else (e.g. your secretary) is allowed
to use the application.
Optional PIN (secondary passphrase) to access applications
When used by more than one person,
the administrator/owner of the database file can protect single
sections (like the budget or the diary section) additionally by defining a PIN
code or, conversely, give another person (e.g. the secretary) exclusive
access to a specific section. In combination with the “Hide Private
Records”-function, the PIN enables for instance the secretary to
use the budget and the address/contact section, without being able
to see the private records. No other person trying to gain information
will manage to open any of the PIN-protected sections.
Passphrase Entry
Minimum
passphrase length:
8 characters. The more characters, the lower the risk of cracking
the passphrase
(8 characters reflecting
the available keys of the keyboard
would theoretically require a mean of 92^92/2 attempts to open the
database; therefore, it is important to use a relatively difficult
to guess passphrase, the longer the better, preferably containing
non-alfanumeric keys) Forced
delay between passphrase inputs:
2 seconds (this makes it virtually impossible for automatized brute-force
attacks to open the database)
Maximum
number of retries:
after 3 wrong passphrase inputs, the application is closed. Reopening
the program takes some time, which is an additional protection against
brute-force attacks.
|