SlideShare a Scribd company logo
1 of 15
i-TWIN
The limitless-Pendrive
A technical presentation on
Presented By-
Suraj K. yadav
M.C.A. 3rd yr.
Introduction
• iTwin is a revolutionary new file sharing and remote access
device brought to you by a company called iTwin.
• It's like two ends of a cable, without the cable.
• iTwin is a 'limitless' secure USB device that enables users to
access, edit & share all their files & media between any two
online computers anywhere in the world.
• The only limit is the size of your computer’s hard drive and
speed of your internet connection .
Need Of iTwin
Transferring data from one PC to another can be
difficult, especially if it's a large amount of data. For
example, if you want to send some data to somebody
in another country, you’re going to have to go
through the hassle of either sending it via e-mail, or
upload it to some file hosting service. Chances are, if
your file is too large, you’ll probably need to buy
more storage.
Enter iTwin. This new USB dongle/USB drive allows
users to remotely access data from anywhere in the
world. It’s a one time investment
Featuresofi-TWIN
Limitless capacity secure USB drive
Remotely edit shared files
Backup your data from anywhere
One time cost
Data security
Smart key generation
No temp files
Password support
Bi-directional file access
How it Works ?
 AES is a symmetric-key algorithm.
 AES is a variant of encryption family
which has fixed block size of 128,192, or
256-bits.
 AES operates on a 4*4 matrix of bytes,
termed as ‘state’.
.
TwinTrust Authentication

 Before allowing any data transfer, every iTwin is authenticated by iTwin's
TwinTrust servers.
 All communication between iTwin and TwinTrust is secured using industry
strength HTTPS (RSA 1024 bit, 128 bit RC4) protocol.
 After successful authentication by TwinTrust, TwinTrust assist iTwin to discover
its other half.
Two-Factor Authentication
After authenticating with TwinTrust, two halves of iTwin mutually
authenticate each other using their pre-shared AES 256 bit crypto key.
If password is set, then password verification is performed on both
iTwins before data transfer is initiated between two iTwins.
i-Twin vs USB
iTwin USB
Price
$ 99. $120 (approx.) for 64GB.
Capacity Access to computer's entire hard drive
& any attached storage.
Remote Disable If you lose one half, you can remotely
disable it.
Data Encryption
AES 256-bit.
Creation of 2nd copy
of file
You can edit remote files directly,
with no additional copy created.
2GB to 256GB (depending on model).
If you lose the device, you lose and
expose your data.
Standard USB devices don't support
encryption. Need additional software.
Yes. This leads to confusion due to
multiple versions of the same file.
i-Twin vs Cloud storage
iTwin Cloud Storage
Ease of Installation Plug 'n' Play,
install & configure it. Need to
create, remember & use login.
Storage Limit & Monthly Fees No storage limit and fee required Has storage limits and fee.
Security & Privacy
Hardware based security plus
optional password & remote
disable
Password only.
Remote Editing
Directly edit your home/office
files remotely,
Remote editing requires 2nd
copy to be created on other
computers.
Accidental Delete Protection Present. Not present
Advantages
1. One-time upfront
2. Remotely disable
3. No limitations
4. Secure military grade AES
5. compatible.
Disadvantages
 1. iTwin Connect is 3.5 inches long in total
which means when the parts are divided
they are very easy to lose.
 2. When the iTwin Connect USB
dongle is plugged in it can low
down network performance.
 3. You must set up files to share in
advance in order to access them.
I twin

More Related Content

What's hot

edge computing seminar report.pdf
edge computing seminar report.pdfedge computing seminar report.pdf
edge computing seminar report.pdf
firstlast467690
 
bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
Aeman Khan
 

What's hot (20)

Diamond chip
Diamond chipDiamond chip
Diamond chip
 
Smart memories
Smart memoriesSmart memories
Smart memories
 
3D OPTICAL DATA STORAGE
3D OPTICAL DATA STORAGE3D OPTICAL DATA STORAGE
3D OPTICAL DATA STORAGE
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 
edge computing seminar report.pdf
edge computing seminar report.pdfedge computing seminar report.pdf
edge computing seminar report.pdf
 
Fog computing in IoT
Fog computing in IoTFog computing in IoT
Fog computing in IoT
 
SCREENLESS DISPLAY
SCREENLESS DISPLAYSCREENLESS DISPLAY
SCREENLESS DISPLAY
 
E ball technology
E ball technologyE ball technology
E ball technology
 
wireless usb ppt
wireless usb pptwireless usb ppt
wireless usb ppt
 
Fog Computing and the Internet of Things
Fog Computing and the Internet of ThingsFog Computing and the Internet of Things
Fog Computing and the Internet of Things
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGS
 
bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
 
Information technology seminar topics
Information technology  seminar topicsInformation technology  seminar topics
Information technology seminar topics
 
Wearable computers
Wearable computersWearable computers
Wearable computers
 
E ball technology ppt
E ball technology pptE ball technology ppt
E ball technology ppt
 
Green computing
Green computingGreen computing
Green computing
 
Seminar report on topic Smart Fabrics by Sunil Bandotra
Seminar report on topic Smart Fabrics by Sunil BandotraSeminar report on topic Smart Fabrics by Sunil Bandotra
Seminar report on topic Smart Fabrics by Sunil Bandotra
 
Silent sound-technology ppt final
Silent sound-technology ppt finalSilent sound-technology ppt final
Silent sound-technology ppt final
 
E-Paper Display
E-Paper DisplayE-Paper Display
E-Paper Display
 
Gi-Fi ppt
Gi-Fi pptGi-Fi ppt
Gi-Fi ppt
 

Similar to I twin

i-Twin-Limitless-Pendrive.ppt
i-Twin-Limitless-Pendrive.ppti-Twin-Limitless-Pendrive.ppt
i-Twin-Limitless-Pendrive.ppt
Vamsi452585
 
CubeiTz Brochure
CubeiTz BrochureCubeiTz Brochure
CubeiTz Brochure
Ian Ray
 
Training Guide Idea Pad V2
Training Guide   Idea Pad V2Training Guide   Idea Pad V2
Training Guide Idea Pad V2
lunarfall
 
New Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptxNew Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptx
ssuserd25aae
 
2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UK2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UK
mfoudi
 

Similar to I twin (20)

i-Twin-Limitless-Pendrive-Technology.ppt
i-Twin-Limitless-Pendrive-Technology.ppti-Twin-Limitless-Pendrive-Technology.ppt
i-Twin-Limitless-Pendrive-Technology.ppt
 
i-Twin-Limitless-Pendrive.ppt
i-Twin-Limitless-Pendrive.ppti-Twin-Limitless-Pendrive.ppt
i-Twin-Limitless-Pendrive.ppt
 
Cubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit EncryptionCubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit Encryption
 
CubeiTz Brochure
CubeiTz BrochureCubeiTz Brochure
CubeiTz Brochure
 
Presentation
PresentationPresentation
Presentation
 
ServStation - CD/DVD Servers and Loaders
ServStation - CD/DVD Servers and LoadersServStation - CD/DVD Servers and Loaders
ServStation - CD/DVD Servers and Loaders
 
VPN.pptx
VPN.pptxVPN.pptx
VPN.pptx
 
Ce hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computersCe hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computers
 
Simplifying IoT by Solving Software Complexity at the Edge
Simplifying IoT by Solving Software Complexity at the EdgeSimplifying IoT by Solving Software Complexity at the Edge
Simplifying IoT by Solving Software Complexity at the Edge
 
InTEK
InTEKInTEK
InTEK
 
OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016
 
Training Guide Idea Pad V2
Training Guide   Idea Pad V2Training Guide   Idea Pad V2
Training Guide Idea Pad V2
 
Unit 1-Digital devices.ppt
Unit 1-Digital devices.pptUnit 1-Digital devices.ppt
Unit 1-Digital devices.ppt
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdf
 
ProServer - Direct network attached CD / DVD Server and Loader
ProServer - Direct network attached CD / DVD Server and LoaderProServer - Direct network attached CD / DVD Server and Loader
ProServer - Direct network attached CD / DVD Server and Loader
 
Lenovo Consumer MSI
Lenovo Consumer MSILenovo Consumer MSI
Lenovo Consumer MSI
 
Lenovo Consumer
Lenovo ConsumerLenovo Consumer
Lenovo Consumer
 
New Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptxNew Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptx
 
EnGenius Europe Sales presentation EPG5000 and EPG600
EnGenius Europe Sales presentation EPG5000 and EPG600EnGenius Europe Sales presentation EPG5000 and EPG600
EnGenius Europe Sales presentation EPG5000 and EPG600
 
2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UK2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UK
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

I twin

  • 1. i-TWIN The limitless-Pendrive A technical presentation on Presented By- Suraj K. yadav M.C.A. 3rd yr.
  • 2. Introduction • iTwin is a revolutionary new file sharing and remote access device brought to you by a company called iTwin. • It's like two ends of a cable, without the cable. • iTwin is a 'limitless' secure USB device that enables users to access, edit & share all their files & media between any two online computers anywhere in the world. • The only limit is the size of your computer’s hard drive and speed of your internet connection .
  • 3. Need Of iTwin Transferring data from one PC to another can be difficult, especially if it's a large amount of data. For example, if you want to send some data to somebody in another country, you’re going to have to go through the hassle of either sending it via e-mail, or upload it to some file hosting service. Chances are, if your file is too large, you’ll probably need to buy more storage. Enter iTwin. This new USB dongle/USB drive allows users to remotely access data from anywhere in the world. It’s a one time investment
  • 4.
  • 5.
  • 6. Featuresofi-TWIN Limitless capacity secure USB drive Remotely edit shared files Backup your data from anywhere One time cost Data security Smart key generation No temp files Password support Bi-directional file access
  • 7. How it Works ?  AES is a symmetric-key algorithm.  AES is a variant of encryption family which has fixed block size of 128,192, or 256-bits.  AES operates on a 4*4 matrix of bytes, termed as ‘state’. .
  • 8. TwinTrust Authentication   Before allowing any data transfer, every iTwin is authenticated by iTwin's TwinTrust servers.  All communication between iTwin and TwinTrust is secured using industry strength HTTPS (RSA 1024 bit, 128 bit RC4) protocol.  After successful authentication by TwinTrust, TwinTrust assist iTwin to discover its other half.
  • 9. Two-Factor Authentication After authenticating with TwinTrust, two halves of iTwin mutually authenticate each other using their pre-shared AES 256 bit crypto key. If password is set, then password verification is performed on both iTwins before data transfer is initiated between two iTwins.
  • 10.
  • 11. i-Twin vs USB iTwin USB Price $ 99. $120 (approx.) for 64GB. Capacity Access to computer's entire hard drive & any attached storage. Remote Disable If you lose one half, you can remotely disable it. Data Encryption AES 256-bit. Creation of 2nd copy of file You can edit remote files directly, with no additional copy created. 2GB to 256GB (depending on model). If you lose the device, you lose and expose your data. Standard USB devices don't support encryption. Need additional software. Yes. This leads to confusion due to multiple versions of the same file.
  • 12. i-Twin vs Cloud storage iTwin Cloud Storage Ease of Installation Plug 'n' Play, install & configure it. Need to create, remember & use login. Storage Limit & Monthly Fees No storage limit and fee required Has storage limits and fee. Security & Privacy Hardware based security plus optional password & remote disable Password only. Remote Editing Directly edit your home/office files remotely, Remote editing requires 2nd copy to be created on other computers. Accidental Delete Protection Present. Not present
  • 13. Advantages 1. One-time upfront 2. Remotely disable 3. No limitations 4. Secure military grade AES 5. compatible.
  • 14. Disadvantages  1. iTwin Connect is 3.5 inches long in total which means when the parts are divided they are very easy to lose.  2. When the iTwin Connect USB dongle is plugged in it can low down network performance.  3. You must set up files to share in advance in order to access them.