SlideShare a Scribd company logo
1 of 10
crpt.info
1. anything you want tracked and
saved for later, use EMAIL
2. anything you do not want tracked,
with no meta data about the
transmission, use crpt.info
“the anti-email”
consumer alpha currently available at http://crpt.info
Why We Built It
1. private citizens have a right to private
communications
2. security experts agree that email is “not
securable”
3. standard encryption technology is too
expensive or too hard to use
4. other encrypted email systems are not
anonymous
Offline Analogies
personal mail lockbox
only you have private key for
decrypting messages dropped
into your lock box
public phone
senders use a public phone to
anonymously create and send
messages to your lock box
Top Features
1. Endpoints are anonymous, not associatable
2. Message encrypted with recipient’s public key
3. Sender can “unsend” after hitting “send”
4. Every part of transmission is “transient”
? ?njbf8nw8cw9casssddnasda3131wcwyfkj01
Public key
encryption
Private key
decryption
How to Use
1. Get a SendToIt code
• You can get as many as you need
• Use your own name for something easy-to-remember; get
an alphanumeric code for more anonymity
• Create a passphrase that you will later use to get messages
2. Send Message
• Type in the recipients’ SendToIt codes (comma separated)
• Type your message or attach picture, file, voice memo, etc.
3. Get Message
• Type in YOUR OWN SendToIt code
• Type your passphrase
• Click download, and then view to see each message
Android Devices
On Android devices, using
Chrome or Firefox, you can
click the “Choose Files”
button and directly:
- take picture
- take video
- record voice memo
- select music track
- attach file
NOTE: iPhone restrictions do not allow this
Tested Devices/Browsers
Desktop Mobile
Recommended
Available
Recommended Recommended
(very slow)
Comparison to SnapChat
SnapChat:
1. cannot send text, files, audio
2. is not anonymous (requires login, phone #)
3. sender cannot “unsend” messages
4. does not actually encrypt files (or even
delete them irrecoverably)
Key Points of Differentiation
Crpt.info:
1. does not rely on strength of encryption alone
2. does not rely on industry standard forms of
encryption (due to NSA involvement)
3. does not use email or SMS infrastructure
4. does not require large processing power on
“endpoints” like cell phones
5. scales inifintely using principles of parallelism
Dr. Augustine Fou – Digital Consigliere
“I study trends in cyber security in payments and
communications. In light of recent revelations I
developed the CRPT platform to enable secure
communications for individuals and enterprises. It
was designed with the principle that given enough
time and/or computing power ANY form of
encryption can be broken. So the system does not
rely on the strength of the ecryption alone but,
rather, a series of steps which is straighforward in
one direction but very difficult in reverse.”
FORMER CHIEF DIGITAL OFFICER, HCG (OMNICOM)
MCKINSEY CONSULTANT
CLIENT SIDE / AGENCY SIDE EXPERIENCE
PROFESSOR AND COLUMNIST
ENTREPRENEUR / SMALL BUSINESS OWNER
PHD MATERIALS SCIENCE (MIT '95) AT AGE 23 ClickZ Articles: http://bit.ly/augustine-fou-clickz
Slideshares: http://bit.ly/augustine-fou-slideshares
LinkedIn: http://linkd.in/augustinefou

More Related Content

More from Dr. Augustine Fou - Independent Ad Fraud Researcher

More from Dr. Augustine Fou - Independent Ad Fraud Researcher (20)

Impact of Loss of 3P Cookies on Publishers' Ad Revenue
Impact of Loss of 3P Cookies on Publishers' Ad RevenueImpact of Loss of 3P Cookies on Publishers' Ad Revenue
Impact of Loss of 3P Cookies on Publishers' Ad Revenue
 
Entire ecosystem supporting ad fraud 2018
Entire ecosystem supporting ad fraud 2018Entire ecosystem supporting ad fraud 2018
Entire ecosystem supporting ad fraud 2018
 
Digital Media Trust Collaborative
Digital Media Trust CollaborativeDigital Media Trust Collaborative
Digital Media Trust Collaborative
 
Programmatic reach analysis 2021
Programmatic reach analysis 2021Programmatic reach analysis 2021
Programmatic reach analysis 2021
 
2021 update on ad fraud brand safety privacy
2021 update on ad fraud brand safety privacy2021 update on ad fraud brand safety privacy
2021 update on ad fraud brand safety privacy
 
Browser and OS Share Jan 2021
Browser and OS Share Jan 2021Browser and OS Share Jan 2021
Browser and OS Share Jan 2021
 
Checking abnormal referrer traffic in google analytics
Checking abnormal referrer traffic in google analyticsChecking abnormal referrer traffic in google analytics
Checking abnormal referrer traffic in google analytics
 
History and Impact of Digital Ad Fraud
History and Impact of Digital Ad FraudHistory and Impact of Digital Ad Fraud
History and Impact of Digital Ad Fraud
 
Digital Fraud Viewability Benchmarks Q4 2020
Digital Fraud Viewability Benchmarks Q4 2020Digital Fraud Viewability Benchmarks Q4 2020
Digital Fraud Viewability Benchmarks Q4 2020
 
What CFEs can do about digital ad fraud
What CFEs can do about digital ad fraudWhat CFEs can do about digital ad fraud
What CFEs can do about digital ad fraud
 
Four types of digital ad spend updated august 2020
Four types of digital ad spend updated august 2020Four types of digital ad spend updated august 2020
Four types of digital ad spend updated august 2020
 
How to Use FouAnalytics For Marketers
How to Use FouAnalytics   For MarketersHow to Use FouAnalytics   For Marketers
How to Use FouAnalytics For Marketers
 
FouAnalytics DIY site media analytics fraud detection baked in
FouAnalytics DIY site media analytics fraud detection baked inFouAnalytics DIY site media analytics fraud detection baked in
FouAnalytics DIY site media analytics fraud detection baked in
 
Investigating digital ad fraud spi virtual meeting
Investigating digital ad fraud   spi virtual meetingInvestigating digital ad fraud   spi virtual meeting
Investigating digital ad fraud spi virtual meeting
 
Fraud by Browser Study
Fraud by Browser StudyFraud by Browser Study
Fraud by Browser Study
 
Digital Ad Fraud FAQ Question 1
Digital Ad Fraud FAQ Question 1Digital Ad Fraud FAQ Question 1
Digital Ad Fraud FAQ Question 1
 
Digital ad dollars trickle down chart
Digital ad dollars trickle down chartDigital ad dollars trickle down chart
Digital ad dollars trickle down chart
 
Botnets used for ad fraud spam ddos attacks
Botnets used for ad fraud spam ddos attacksBotnets used for ad fraud spam ddos attacks
Botnets used for ad fraud spam ddos attacks
 
Marketer Outcomes Study
Marketer Outcomes StudyMarketer Outcomes Study
Marketer Outcomes Study
 
Ad fraud update for publishers Feb 2020
Ad fraud update for publishers Feb 2020Ad fraud update for publishers Feb 2020
Ad fraud update for publishers Feb 2020
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

CRPT Secure Messaging Introduction The Anti-Email by Augustine Fou 2013

  • 1. crpt.info 1. anything you want tracked and saved for later, use EMAIL 2. anything you do not want tracked, with no meta data about the transmission, use crpt.info “the anti-email” consumer alpha currently available at http://crpt.info
  • 2. Why We Built It 1. private citizens have a right to private communications 2. security experts agree that email is “not securable” 3. standard encryption technology is too expensive or too hard to use 4. other encrypted email systems are not anonymous
  • 3. Offline Analogies personal mail lockbox only you have private key for decrypting messages dropped into your lock box public phone senders use a public phone to anonymously create and send messages to your lock box
  • 4. Top Features 1. Endpoints are anonymous, not associatable 2. Message encrypted with recipient’s public key 3. Sender can “unsend” after hitting “send” 4. Every part of transmission is “transient” ? ?njbf8nw8cw9casssddnasda3131wcwyfkj01 Public key encryption Private key decryption
  • 5. How to Use 1. Get a SendToIt code • You can get as many as you need • Use your own name for something easy-to-remember; get an alphanumeric code for more anonymity • Create a passphrase that you will later use to get messages 2. Send Message • Type in the recipients’ SendToIt codes (comma separated) • Type your message or attach picture, file, voice memo, etc. 3. Get Message • Type in YOUR OWN SendToIt code • Type your passphrase • Click download, and then view to see each message
  • 6. Android Devices On Android devices, using Chrome or Firefox, you can click the “Choose Files” button and directly: - take picture - take video - record voice memo - select music track - attach file NOTE: iPhone restrictions do not allow this
  • 8. Comparison to SnapChat SnapChat: 1. cannot send text, files, audio 2. is not anonymous (requires login, phone #) 3. sender cannot “unsend” messages 4. does not actually encrypt files (or even delete them irrecoverably)
  • 9. Key Points of Differentiation Crpt.info: 1. does not rely on strength of encryption alone 2. does not rely on industry standard forms of encryption (due to NSA involvement) 3. does not use email or SMS infrastructure 4. does not require large processing power on “endpoints” like cell phones 5. scales inifintely using principles of parallelism
  • 10. Dr. Augustine Fou – Digital Consigliere “I study trends in cyber security in payments and communications. In light of recent revelations I developed the CRPT platform to enable secure communications for individuals and enterprises. It was designed with the principle that given enough time and/or computing power ANY form of encryption can be broken. So the system does not rely on the strength of the ecryption alone but, rather, a series of steps which is straighforward in one direction but very difficult in reverse.” FORMER CHIEF DIGITAL OFFICER, HCG (OMNICOM) MCKINSEY CONSULTANT CLIENT SIDE / AGENCY SIDE EXPERIENCE PROFESSOR AND COLUMNIST ENTREPRENEUR / SMALL BUSINESS OWNER PHD MATERIALS SCIENCE (MIT '95) AT AGE 23 ClickZ Articles: http://bit.ly/augustine-fou-clickz Slideshares: http://bit.ly/augustine-fou-slideshares LinkedIn: http://linkd.in/augustinefou