Tech Zone Archives - Âé¶¹´«Ã½É«Ç鯬 - The Standard of Verifiable files /blog/category/tech-zone/ Sign, label, trace and verify all your content Thu, 06 Jun 2024 08:21:13 +0000 en-US hourly 1 https://wordpress.org/?v=6.9.4 /wp-content/uploads/cropped-Âé¶¹´«Ã½É«Ç鯬_logo_rond-1-32x32.png Tech Zone Archives - Âé¶¹´«Ã½É«Ç鯬 - The Standard of Verifiable files /blog/category/tech-zone/ 32 32 Âé¶¹´«Ã½É«Ç鯬 Deploys Bitcoin BIP32 Self Sovereign Identity /blog/2016/11/23/keeex-deploys-bitcoin-bip32-self-sovereign-identity/ /blog/2016/11/23/keeex-deploys-bitcoin-bip32-self-sovereign-identity/#respond Wed, 23 Nov 2016 17:21:13 +0000 /?p=3522 For the first time ever, BIP32 hierarchical deterministic wallets can be used to self define, publish, and revoke a cryptographic identity. This identity can be used to generate one time signatures for every item signed, hence achieving unprecedented signature security. How it works The identity is defined as the public master key of any node […]

The post Âé¶¹´«Ã½É«Ç鯬 Deploys Bitcoin BIP32 Self Sovereign Identity appeared first on Âé¶¹´«Ã½É«Ç鯬 - The Standard of Verifiable files.

]]>
For the first time ever, BIP32 hierarchical deterministic wallets can be used to self define, publish, and revoke a cryptographic identity. This identity can be used to generate one time signatures for every item signed, hence achieving unprecedented signature security.

How it works

The identity is defined as the public master key of any node in a bip32 tree. This pub key can be shared, published at will, for instance on social networks.

Every signature can be traced to the corresponding public master key without ever exposing the corresponding private master key.

A demo

To test, you may download , then verify it on , and hopefully

.

Further reading

The post Âé¶¹´«Ã½É«Ç鯬 Deploys Bitcoin BIP32 Self Sovereign Identity appeared first on Âé¶¹´«Ã½É«Ç鯬 - The Standard of Verifiable files.

]]>
/blog/2016/11/23/keeex-deploys-bitcoin-bip32-self-sovereign-identity/feed/ 0
Âé¶¹´«Ã½É«Ç鯬 Invents the Blockchain of Data /blog/2016/11/10/keeex-invents-blockchain-data/ /blog/2016/11/10/keeex-invents-blockchain-data/#respond Thu, 10 Nov 2016 06:18:38 +0000 /?p=3486 The post Âé¶¹´«Ã½É«Ç鯬 Invents the Blockchain of Data appeared first on Âé¶¹´«Ã½É«Ç鯬 - The Standard of Verifiable files.

]]>
The post Âé¶¹´«Ã½É«Ç鯬 Invents the Blockchain of Data appeared first on Âé¶¹´«Ã½É«Ç鯬 - The Standard of Verifiable files.

]]>
/blog/2016/11/10/keeex-invents-blockchain-data/feed/ 0
Âé¶¹´«Ã½É«Ç鯬 launches a Bug Bounty program to crack our encrypted container /blog/2016/05/10/keeex-deploys-a-bug-bounty-program/ /blog/2016/05/10/keeex-deploys-a-bug-bounty-program/#respond Tue, 10 May 2016 16:37:39 +0000 /?p=2073 We are publishing a bug bounty challenge to crack our encrypted container, thanks to BugBountyZone.com. We are extremely proud to accompany the launch of their new bug bounty platform. Note that Âé¶¹´«Ã½É«Ç鯬 offers ultimate confidentiality by encrypting using totally anonymized containers (that neither disclose any hint of who are the sender and receivers nor of […]

The post Âé¶¹´«Ã½É«Ç鯬 launches a Bug Bounty program to crack our encrypted container appeared first on Âé¶¹´«Ã½É«Ç鯬 - The Standard of Verifiable files.

]]>
We are publishing a bug bounty challenge to crack our encrypted container, thanks to

We are extremely proud to accompany the launch of their new bug bounty platform.

Note that Âé¶¹´«Ã½É«Ç鯬 offers ultimate confidentiality by encrypting using totally anonymized containers (that neither disclose any hint of who are the sender and receivers nor of what is the data), that may further be exchanged using your own cloud or disk.

The post Âé¶¹´«Ã½É«Ç鯬 launches a Bug Bounty program to crack our encrypted container appeared first on Âé¶¹´«Ã½É«Ç鯬 - The Standard of Verifiable files.

]]>
/blog/2016/05/10/keeex-deploys-a-bug-bounty-program/feed/ 0
Âé¶¹´«Ã½É«Ç鯬 Now Supports FIDO U2F authentication /blog/2016/02/04/keeex-now-supports-fido-u2f-authentication/ /blog/2016/02/04/keeex-now-supports-fido-u2f-authentication/#respond Thu, 04 Feb 2016 13:44:19 +0000 /?p=1845 As of  version 2.3.0 released end of January 2016, the amazing value of Âé¶¹´«Ã½É«Ç鯬 if now further protected with universal 2 factor FIDO (the FIDO standard is promoted by the Fido Alliance). This means that you can use any FIDO device (as e.g. Neowave’s Keydo, Yubico’s key…) to protect your Âé¶¹´«Ã½É«Ç鯬 account. Further protecting your […]

The post Âé¶¹´«Ã½É«Ç鯬 Now Supports FIDO U2F authentication appeared first on Âé¶¹´«Ã½É«Ç鯬 - The Standard of Verifiable files.

]]>
As of  version 2.3.0 released end of January 2016, the amazing value of Âé¶¹´«Ã½É«Ç鯬 if now further protected with universal 2 factor FIDO (the FIDO standard is promoted by the ). This means that you can use any FIDO device (as e.g. , …) to protect your Âé¶¹´«Ã½É«Ç鯬 account.

Further protecting your Âé¶¹´«Ã½É«Ç鯬 account means protecting an amazing range of your unique serverless collaboration : messaging, chats, ECM (document and content management, versions, classification…), processes, search, integrity.

The post Âé¶¹´«Ã½É«Ç鯬 Now Supports FIDO U2F authentication appeared first on Âé¶¹´«Ã½É«Ç鯬 - The Standard of Verifiable files.

]]>
/blog/2016/02/04/keeex-now-supports-fido-u2f-authentication/feed/ 0
The Future of Data : Immutable and Connected, like a Blockchain /blog/2016/01/27/is-the-future-of-data-immutable-and-connected/ /blog/2016/01/27/is-the-future-of-data-immutable-and-connected/#respond Wed, 27 Jan 2016 13:41:02 +0000 /?p=1817 Two innovations that illustrate applications of immutable and connected data tend to widely disseminate in our lives. Can we complement or improve on this and what do we learn? One is Git. Git is the most widely used version control system. The emphasis of Git on data integrity builds upon an underlying scheme called “content […]

The post The Future of Data : Immutable and Connected, like a Blockchain appeared first on Âé¶¹´«Ã½É«Ç鯬 - The Standard of Verifiable files.

]]>
Two innovations that illustrate applications of immutable and connected data tend to widely disseminate in our lives. Can we complement or improve on this and what do we learn?

One is . Git is the most widely used version control system. The emphasis of Git on data integrity builds upon an underlying scheme called “” and .

Content addressable storage may operate like this: given a file, one computes a unique hash from its contents, then manages to store and retrieve the data from the hash alone, henceforth being immune to renaming, moving and of course modification.

Merkle trees work like this: every node in the tree may contain the hashes of its subnodes. The hash of the node itself accounts for these subnodes hence locks the entire structure. Merkel trees are useful to Git, because for various storage efficiency reasons files are chunked into pieces and versions are stored by difference. Hence every file will be converted to a tree of content addressed blocks.

In Git, every data block or node is immutable, because the contents are addressed from the hash, and can then further be verified as genuine. The whole node structure is also connected.

Another innovation is the (also on wikipedia, on bitcoin.org). In a block chain (many abound besides Bitcoin), every block has a hash, and contains the hash of the previous block in the chain. [Computing this hash is difficult and called mining because the protocol requires blocks to be generated every 10 minutes on average by introducing competition among miners.]

In Bitcoin, every block  is immutable, and is linked to the chain of previous blocks down to block #0 called . It is also timestamped by the network. Internally, the block also contains a Merkle tree of the transactions that were included.

From there on, a question arises:

are documents more useful and/or valuable when they are mutable, or when they can be proved as unmodified?

Being immutable, it appears that document gains a wealth of useful properties. An immutable file may be :

  • addressed by its content hash, hence becoming immune to renaming or moving
  • verified for integrity, hence becoming immune to unwanted modifications
  • be timestamped for inclusion in (smart) contracting processes
  • be included in complex chains or trees of documents (versions, references…)

So, can we benefit from these advantages within our own document organization?

Âé¶¹´«Ã½É«Ç鯬 generalizes immutability and connectivity to the whole set of your documents. But it does a lot more. Âé¶¹´«Ã½É«Ç鯬 not only computes an integrity identifier (idx) for every file but it also:

  • encodes this idx so that it is usable as a name by humans (including on the phone)
  • injects this idx in the file itself so it can be found or indexed by search engines, on a computer or on the web. It does not require a specific software or infrastructure to discover the files!
  • injects into your very own documents references to other documents. However, in so doing Âé¶¹´«Ã½É«Ç鯬 ensures that searches for these references do not collide with searches for the document itself
  • automatically chains versions of your files, also allowing when required multiple parallel versions
  • injects the public key of your digital identity, so your contribution is locked in forever
  • injects a signature of the idx with your private key, so that nobody can counterfeit you. Such a signature can also be verified without Âé¶¹´«Ã½É«Ç鯬.
  • injects more metadata allowing the statement of copyright, confidentiality statements, instructions to collaborators or any meaningful information (up to 4K)
  • injects a specific hash compatible with (for example, search for 2HzFzM99P59PV4ssMhkC9bcZuzzjMdRNiYaqDTC at the bottom of this link)
  • promotes your folder structure to a global tag system

So using Âé¶¹´«Ã½É«Ç鯬, one builds on his very own disks and without any infrastructure a provably immutable network of documents that can altogether be:

  • trusted for their integrity and authorship : never wonder or reread
  • fully interconnected for a variety of needs such as semantic tags, process marks, links to original files or versions or references : search, organize at blazing speed
  • further connected to the bitcoin blockchain or any other : prepare for ultimate dematerialization and notarization scenarios
  • addressed by their content at machine or web scale : instant and exact search with artificial words that generate zero collisions
  • involved into arbitrarily complex automation schemes : build your digital heritage, for a future where semantics and trust will break data silos and allow for continuous process improvement

Start using Âé¶¹´«Ã½É«Ç鯬 and invest in your very own digital heritage.

The post The Future of Data : Immutable and Connected, like a Blockchain appeared first on Âé¶¹´«Ã½É«Ç鯬 - The Standard of Verifiable files.

]]>
/blog/2016/01/27/is-the-future-of-data-immutable-and-connected/feed/ 0
How One to One Sharing Enforces Secure Collaboration /blog/2015/09/24/how-one-to-one-sharing-enforces-secure-collaboration-xonom/ /blog/2015/09/24/how-one-to-one-sharing-enforces-secure-collaboration-xonom/#respond Thu, 24 Sep 2015 07:59:39 +0000 /?p=1396 Slides presented at Connect Security World Marseille 2015

The post How One to One Sharing Enforces Secure Collaboration appeared first on Âé¶¹´«Ã½É«Ç鯬 - The Standard of Verifiable files.

]]>
Slides presented at Marseille 2015 (xonom)

Âé¶¹´«Ã½É«Ç鯬 lets users define per recipient sharing means (over weblinks, dropbox, google drive, even nfs or webdav) and encryption settings.

Then sharing targets can be selected in a single click: no groups, no access rights, extreme simplicity.

Âé¶¹´«Ã½É«Ç鯬 is a unique no infrastructure, #nosaas solution.

The post How One to One Sharing Enforces Secure Collaboration appeared first on Âé¶¹´«Ã½É«Ç鯬 - The Standard of Verifiable files.

]]>
/blog/2015/09/24/how-one-to-one-sharing-enforces-secure-collaboration-xonom/feed/ 0
How Social Certificates may help build Decentralized Trust /blog/2015/09/24/how-social-certificates-may-help-build-decentralized-trust-xuheg/ /blog/2015/09/24/how-social-certificates-may-help-build-decentralized-trust-xuheg/#respond Thu, 24 Sep 2015 07:26:59 +0000 /?p=1386 These slides were presented at the World e-Id and Cybersecurity conference in Marseille 2015

The post How Social Certificates may help build Decentralized Trust appeared first on Âé¶¹´«Ã½É«Ç鯬 - The Standard of Verifiable files.

]]>
These slides were presented at the conference in Marseille (xuheg)

Âé¶¹´«Ã½É«Ç鯬 lets users define their own identity settings using a social certificates: people who know you ensure that you are the one you pretend, in the absence of a certificate authority.

Social certificates can be renewed, published, revoked at any time, at no cost.

Âé¶¹´«Ã½É«Ç鯬 won an award at World Smart Week in the category e-Id and Cybersecurity.

Âé¶¹´«Ã½É«Ç鯬 is a unique no infrastructure, #nosaas solution.

The post How Social Certificates may help build Decentralized Trust appeared first on Âé¶¹´«Ã½É«Ç鯬 - The Standard of Verifiable files.

]]>
/blog/2015/09/24/how-social-certificates-may-help-build-decentralized-trust-xuheg/feed/ 0
Why Âé¶¹´«Ã½É«Ç鯬 is not the next ‘Bad Guy’ /blog/2015/06/23/why-keeex-is-not-the-next-bad-guy/ /blog/2015/06/23/why-keeex-is-not-the-next-bad-guy/#respond Tue, 23 Jun 2015 10:45:38 +0000 /?p=1222 Âé¶¹´«Ã½É«Ç鯬 is a true solution devoid of trusted tiers, and is not the next 'Bad Guy'. You have access to everything, even in the future should the Âé¶¹´«Ã½É«Ç鯬 company default. And Âé¶¹´«Ã½É«Ç鯬 does not see a byte of your Data.

The post Why Âé¶¹´«Ã½É«Ç鯬 is not the next ‘Bad Guy’ appeared first on Âé¶¹´«Ã½É«Ç鯬 - The Standard of Verifiable files.

]]>
Âé¶¹´«Ã½É«Ç鯬 is a true solution devoid of trusted tiers, and is not the next ‘Bad Guy’. You have access to everything, even in the future should the Âé¶¹´«Ã½É«Ç鯬 company default. And Âé¶¹´«Ã½É«Ç鯬 does not see a byte of your Data.

  • Your files stay on Your machine (you may easily monitor the exchanges with our servers)
  • You see your encrypted files (of course naturally if you choose your favorite cloud sync to share)
  • We can allocate a dedicated private server for a company – even though the perspective of exchanging outside the limits of the company renders this choice questionable.
  • Verifying a keeexed file (that uses SHA256) is possible using a public script (hence remains feasible should the Âé¶¹´«Ã½É«Ç鯬 company default)
  • The Âé¶¹´«Ã½É«Ç鯬 digital signature (uses the elliptic curve Sekp256k1) can be verified qithout Âé¶¹´«Ã½É«Ç鯬 (for instance on ) (hence remains feasible should the Âé¶¹´«Ã½É«Ç鯬 company default)
  • The format of encrypted files (that use AES CBC 256 IV and user accessible secrets) is made available by contract (hence remains feasible should the Âé¶¹´«Ã½É«Ç鯬 company default)
  • As a last resort, Âé¶¹´«Ã½É«Ç鯬 writes ASCII Metadata in files, hence is fully compatible with the Unix system commands  GREP, FIND, LS… (hence allows for any automation should the Âé¶¹´«Ã½É«Ç鯬 company default)
  • The information sent by the Âé¶¹´«Ã½É«Ç鯬 app to our servers to allow for notifications are not inversible (they are hashes).

Henceforth, the cryptographic features of Âé¶¹´«Ã½É«Ç鯬 are verifiable and accessible, even without Âé¶¹´«Ã½É«Ç鯬. To date:

  • Sha256 is known as immune to collision and pre-image attacks: it is thus impossible to create two documents having the same Âé¶¹´«Ã½É«Ç鯬 identifier, or a second document having the same idx as the first one,
  • Sekp256k1 is known as inviolate : it is the elliptic curve used by the Bitcoin protocol: any flaw would destroy Bitcoin entirely.
  • AES CBC 256 IV (with unguessable initialisation vector) is known as inviolate

We continuously improve the quality of our eexcution

The post Why Âé¶¹´«Ã½É«Ç鯬 is not the next ‘Bad Guy’ appeared first on Âé¶¹´«Ã½É«Ç鯬 - The Standard of Verifiable files.

]]>
/blog/2015/06/23/why-keeex-is-not-the-next-bad-guy/feed/ 0
Âé¶¹´«Ã½É«Ç鯬 now encrypts and sends in 1 click, according to per user settings /blog/2015/01/27/keeex-now-encrypts-and-sends-in-1-click-according-to-per-user-settings/ /blog/2015/01/27/keeex-now-encrypts-and-sends-in-1-click-according-to-per-user-settings/#respond Tue, 27 Jan 2015 14:47:32 +0000 /?p=1251 Âé¶¹´«Ã½É«Ç鯬 beta Lydig 1.7 is online! Now, your files and documents are by default automatically sent via weblinks via a partnership with Jaguar Network, or can be copied to your favorite cloud sync or shared folders. And they are instantly received, and automatically moved next to their previous version if any. They are also ultimately […]

The post Âé¶¹´«Ã½É«Ç鯬 now encrypts and sends in 1 click, according to per user settings appeared first on Âé¶¹´«Ã½É«Ç鯬 - The Standard of Verifiable files.

]]>
Âé¶¹´«Ã½É«Ç鯬 beta Lydig 1.7 is online! Now, your files and documents are by default automatically sent via weblinks via a partnership with Jaguar Network, or can be copied to your favorite cloud sync or shared folders.

And they are instantly received, and automatically moved next to their previous version if any.

They are also ultimately protected from prying eyes by automatic client side AES 256 encryption, and automatic receiver side decryption. No stress, no risk in the confidentiality of your industrial of intellectual property.

You pick a shared secret with a collaborator. Âé¶¹´«Ã½É«Ç鯬 recalls it, as long as you need.

The post Âé¶¹´«Ã½É«Ç鯬 now encrypts and sends in 1 click, according to per user settings appeared first on Âé¶¹´«Ã½É«Ç鯬 - The Standard of Verifiable files.

]]>
/blog/2015/01/27/keeex-now-encrypts-and-sends-in-1-click-according-to-per-user-settings/feed/ 0