Thanks for watching our CyRise demo day pitch!
Register for exclusive early access to our software!
Here's a technology recap!
ScramExplorer - end to end encryption for cloud storage
Need to secure your files in the cloud with end to end encryption?
With ScramExplorer, just create an encrypted directory on your favourite storage account, and everything will be copied there… encrypted!
This is great for high-security situations like investigations, and any time you need to keep your data safe from both 3rd parties and your cloud provider.
ScramNotes - secure notepad
We all need to take notes and documentation – maybe they’re commercially sensitive and contain trade secrets. Other times they contain personal information.
ScramNotes guarantees the security of all your notes by encrypting them whenever they get saved to disk or to the cloud. The security is built-in, so you are always protected – it’s impossible to “forget” to encrypt the data, or to save it to the wrong location.
ScramGet - secure cloud-to-local backups
Is your only copy of data in the cloud?
More and more, we see problems like account hijacking or intentional data deletion. Business and people losing their data permanently. The VFEmail hack is a good example. Businesses often need to retain data for years or decades – sometimes for compliance, and sometimes for legal protection.
Cloud data needs backups and protection just like on-premise data. However, many people confuse deleted item retention with backup, only to discover when it’s too late.
ScramGet automatically backs up and protects cloud-data by downloading it on schedule. This is great for long-term backup and data retention.
All secured with ScramFS: our peer-reviewed, post-quantum safe cryptographic file system
The rigorous level of design and peer review is what distinguishes ScramFS from other crypto implementations.
If you care about or have studied cryptography, you probably know that most crypto is flawed because it was improperly designed and improperly implemented. Many open source implementations contain design and implementation flaws.
ScramFS is built exclusively on the AES-256 block cipher, constructed to be post-quantum safe, and following the recommendations from the PQCrypto project. Technically, the following cryptographic and coding mechanisms are used in ScramFS.
- Authenticated encryption with associated data (AEAD) scheme: AES-256 block cipher used in the Galois counter mode as described in Morris J. Dworkin, “Recommendation for block cipher modes of operation: Galois/counter mode (GCM) and GMAC”, 2007. NIST special publication 800-38D.
- Deterministic authenticated encryption with associated data scheme: AES-256 block cipher used in the SIV authenticated encryption mode algorithm described in P. Rogaway and T. Shrimpton, “Deterministic Authenticated-Encryption”, 2007.
- Fixed input-length pseudorandom function: AES-256 block cipher with key length 256 bits and input length 128 bits generating a pseudorandom output of length 128 bits.
- Variable input-length pseudorandom function: Uses the authentication tag generated by the authenticated encryption (AEAD) scheme with the initialization vector set to the input and empty plaintext and associated data.
- Filename character encoding (non-cryptographic): choice of using a custom encoding known as Base32k, or standard Base64 or Base32.