PDS LOGO
Personal Data Security - PDS
Software to Fight Identity Theft and Cybercrime
Home | Get Started | Cipher License | Videos | Compare | Threats | Wiki

UNBREAKABLE ENCRYPTION PDS provides unbreakable encryption, relying on AES ciphers and key sizes up to 256 bits. PDS also supports the use of the TDEA and DES ciphers, with the former considered secure and the latter not so since the 1990's (DES is useful for distributing and evaluating PDS). TDEA, in any of its forms, is an extension of DES, and recently (July 2017) the National Institute of Standards and Technology proposed that TDEA be deprecated. Though both AES and TDEA are considered secure today, AES is the clear choice to keep your confidential information secure well into the future. DATA AVAILABILITY PDS is written in the Java language, so 1) the same PDS binary runs on Linux/Unix, Mac and Windows Desktop/Laptop computers,* 2) the features, security and quality of each release is equal, and 3) as newer Java runtime environments (JREs) support applications written for older JREs, PDS will run on the JREs of the future. All of this may be verified today by mixing and matching combinations of PDS, OS's and JREs (currently 6, 7, 8, 9 and now 10). So, whether it's Java 10 or 100, PDS will be there for you, making sure your confidential information is always available.

* Note: The demise of Apple's JDK caused a one-time glitch on Mac when Apple libraries were integrated into Java 9.
OPEN SOURCE For the most part, Java runtime environments (JRE) leverage the open source JRE from OpenJDK, so the complex cryptographic libraries that securely generate the cryptographic components (ciphers, keys and keystores) are open-source. Knowing that cryptographic experts have reviewed these libraries should give all of us some piece of mind. Generating keys and keystores in Java are boilerplate, and to demonstrate PDS provides the source code for those operations. The remaining area, the creation of ciphers, is not so trivial, so PDS provides the source code for that operation also. PDS verification doesn't stop there, as it also provides 1) runtime verification of the use of the cryptographic objects, to include events such as creating and accessing keystores, keys and ciphers, and 2) a verification each time a password array has been "scrubbed" from memory.

HOW TO FIGHT IDENTITY THEFT AND CYBERCRIME ??

  • Keep your passwords confidential.
  • Never reuse your passwords - random passwords are best.
  • Never reuse knowledge-based authentication credentials - it's okay to make stuff up.
  • Keep your credentials encrypted and easy to access & update.
  • Make periodic backups of your important files. Save them nearline or offline, not online.
  • Never trust 1) emails that request you to log in and provide the link to use, or 2) financial websites that have changed without notice.1

HOW DOES PDS HELP ??

BY PROVIDING UNBREAKABLE ENCRYPTION, AND THE ABILITY TO EASILY:

  • Create encrypted documents (PDS Notes) to hold your confidential information.
  • Use PDS Notes as a free-form password manager for your standard and knowledge-based credentials.
  • Prevent the spread of identity theft and phishing by maintaining unique credentials for each of your accounts.
  • Generate random passwords, and avoid keyloggers using copy/paste between your Notes and password fields.
  • Create encrypted backups to guard against data loss from ransomware and theft.
  • PDS backups can be safely archived as nearline cloud storage, burned to disc, or write directly to tape drives.
  • Changing the password to your Notes and backups is easy - simply change the encryption key's password.

IS PDS SECURE ? YES !  PDS USES:

WILL PDS BE HERE IN THE FUTURE ? YES !

  • PDS was designed for longevity and periodic updates, even if the development of PDS were to end !!
  • How? PDS doesn't run on your operating system - it runs within a virtual machine, the Java Virtual Machine.
  • Java applications enjoy strong binary compatibility. Designed for Java 6, PDS2 runs using Java 6, 7, 8, 9 and 10.3
  • With entrenched use and releases from multiple groups, including those from Oracle, you are virtually guaranteed that PDS will serve you well into the future.
  • Unlike other related products, there are no monthly or recurring fees. Get a cipher license and use PDS for life !!

HOW CAN YOU GET STARTED WITH PDS ?

  • To begin using PDS you'll need to get the software components.
  • PDS was designed to be intuitive, and instructive when helpful, so skimming the Quick Start (also within the application) should get you started.
  • The Users Guide is available to fill in the remaining details, and a large part of that is explained on YouTube.
  • And there is more about how PDS helps fight identity theft and cybercrime.

1. https://www.us-cert.gov/sites/default/files/publications/emailscams_0905.pdf.
2. PDS is a pure (no external libraries added) Java Standard Edition (SE) application.
3. Newer Java releases pass on improvements, security and otherwise, to Java applications via the updates to the Java Virtual Machine (JVM).

Valid HTML 4.01 Transitional