Cybercrime provides a persistent threat to your confidential information. It does so for one reason - because crime pays. But you have the ability to protect yourself, and you don't have to be a rocket scientist do it.
New attacks are first used against nations, then businesses, and then citizens.
By using malicious software (malware), phishing, pharming, or other exploits, cybercriminals around the world seek to profit at the expense of both businesses and individuals. As successful cybercriminals are typically one step ahead of their victims, the best defenses include an evolving knowledge as well as the use of trusted software to apply that knowledge.
To help understand the scope of cybercrime today, as well as some of the methods to protect yourself from attacks, please take a few minutes to watch this short video.
PDS differs from most consumer security products by providing robust management of encryption Keys. This makes PDS a bit geeky, but it also increases both security and flexibility. Every Key created with PDS must have a password, so every crypto operation requires you to provide a password for a Key. You may choose to use one Key for all of your crypto operations, or you may use multiple Keys - the solutions provided within PDS support both scenarios. Key management in PDS includes the ability to create, view, modify and delete Keys. Metadata associated with all PDS-encrypted items tracks which Key was used as well as where to find it, including unique search paths for each operating system when PDS is used in USB mode.
PDS provides a secure and easy-to-use solution to manage your credentials. The solution is based on Notes, which are securely encrypted text files.
The most simple implementation of Notes is to create a Note and type in the credentials for your most important accounts. Later, when you need any of those credentials, open the Note in read-only mode by providing the Keys password, and in the Note will find all your credentials. You don't need to memorize or type any more passwords, just copy and paste from the Note. Should you wish you may then clear the system clipboard with a PDS keystroke.
Taking this to the next step, if you have many sets of credentials you may want to group the credentials into its own Note, and then create a primary Note that contains the credentials to the other Notes. This scenario is shown in the figure to the right, where "dnote" is the primary Note that contains the credentials to open the banking, bills and social media Notes.
PDS ENCRYPTION OF FILES AND DIRECTORIES
PDS encrypts your existing files and directories without modifying your originals. In the example to the right, Donner is encrypting his "Top" directory, creating an encrypted directory named Top.PDS.
Once you have created a backup it may be verified using a read-only decryption operation. Additional capabilities exist, such as appending time stamps to file name or the directory contents, and also the ability to extract only a subset of your encrypted directory. With these operations you can run multiple tasks in parallel.
Once encrypted and verified your backups are ready to be archived, either uploaded to a free cloud storage account or burned to disc. With archived backups, your original files can be restored if lost or damaged due to computer failure or theft - and even your own mistakes. To further guard against damage by malware (such as ransomware) when using cloud storage, you should use a cloud storage provider that is segmented from your computer, not one that is synced with your computer.
Though the details of securely creating encrypted Notes and backups are fairly complex, PDS again helps by providing an intuitive graphical interface that allows you to easily implement highly secure encryption (up to and including AES-256) without having to be an encryption expert. To quickly master PDS skills there is a QuickStart document, a detailed Users Guide, and even some videos on YouTube.
PDS USB DRIVE
Not only has PDS been designed to run as a Desktop application installed to the system drive, but PDS has also been designed to run directly from a USB "flash" drive. This means that you can copy the PDS application, as well as your Notes and Keys, onto your USB drive and securely access your confidential information wherever you are. Simply plug that USB drive in to any secure, supported (1) Java-enabled OS and you can securely access your confidential information. This capability also makes it easy to carry a backup on the road, just in case your laptop becomes damaged or lost.
In USB mode, both the application and its configuration reside on the USB drive. Your Notes or encrypted files can reside on either your USB drive or another other storage medium.
And, no matter what type of operating system you plug the USB drive into, PDS remembers where you keep your files, so whether you plug in to Linux/Unix, Mac or Windows, you Notes and Files (encrypted files or directories) will be in a familiar location.
PDS TAPE DRIVE
PDS provides the ability to encrypt files and directories directly to tape drives. (2)
PDS supports reading and writing at both the beginning of tape as well as tape marks further down the media. PDS does not provide any tape management - just the standard PDS metadata associated with all PDS-encrypted items.
But wait, there's more...
PDS DATA PROTECTION PLANS
From very simple to very complex scenarios, PDS may be used in different ways to protect your data.
At the most simplest, you may choose to keep all of your information securely protected with one Key and thus one passphrase. This is a simple, but secure, method to protect your information. All you have to do is remember one passphrase.
By using two or more Keys to protect your data, with each Key having a unique passphrase, you may group your data by which Key protects which data. In this type of scenario, isolated information may be shared with different groups. Using PDS Notes to track the passphrase for each Key will allow you to use as many Keys as you wish.
In another scenario involving multiple people or groups, you could encrypt the data multiple times, with each encryption operation using a unique Key. If only one person or group had the passphrase to each Key, the data would be protected until all parties were present.
PDS BENEFITS FROM JAVA
PDS runs within a Java Virtual Machine (JVM). As Java is compiled into Java "bytecode", PDS is bound to the JVM and not the operating system; or worse, a specific version of the operating system. Because of this, PDS can run on any operating system that has a compatible JRE available.
As new releases of JVMs provide backward compatibility for older applications, every PDS release will continue to run on the newer Java-enabled operating systems of the future. This means that your encrypted backups and notes will continue to be available well into the future.
New JRE releases typically provide security enhancments, bug fixes, as well as improved performance and stability. These improvements will continue to improve the PDS application with every Java update.
Only one Java executable is created with each PDS release. This means that every supported operating system obtains the same level of quality, and for the most part the same set of features as well.
If you have concerns with using Java, as you have heard time and time again that Java is insecure, please read this information to learn why what you have been told may have mislead you. To that point, PDS is a desktop application, not a Java applet that runs within the browser plugin that has been the source of so many security problems.
(1) Targeted Operating Systems are Mac, Windows and Linux/Unix.
(2) This feature is disabled on Windows.