In the revelations from Edward Snowden, the NSA is capable of obtaining data on US citizens when they connect to a computer network or
communicate by mobile phone/landline.
We came up with a very secure, but simple system, to prevent government NSA data snooping using the Teensy 3.
There are three parts to our secure data vault system:
1. Off the shelf portable 1.8 inch screen 6th gen digital Clip MP3 MP4 Player with FM/Video/E-book Support 1-16GB Micro memory. ($10 USD)
http://www.aliexpress.com/item/1set...p-MP3-MP4-Player-with-FM-Video/745957951.html
Portable E-book reader of data vault text (has no network or Wifi)
2. Transflash SD ( Stores user personal data in encrypted format.)
3. Battery powered Teensy 3.0/3.1 with microSD.
We created special Teensy 3.0/3.1 battery operated hardware with special algorithms to hash/encode/decode text files.
Our special hash algorithms do not use the standard published algorithms, on the net, that have "backdoors" for NSA.
Notes:
The miniature transflash is extremely small it can be easily transported or hidden or sent undetected.
The portable Teensy 3.0/3.1 hardware is needed to decode/encode user data for user viewing.
All Teensy 3 development is being done on a XP PC computer with no network connection for secure development.
communicate by mobile phone/landline.
We came up with a very secure, but simple system, to prevent government NSA data snooping using the Teensy 3.
There are three parts to our secure data vault system:
1. Off the shelf portable 1.8 inch screen 6th gen digital Clip MP3 MP4 Player with FM/Video/E-book Support 1-16GB Micro memory. ($10 USD)
http://www.aliexpress.com/item/1set...p-MP3-MP4-Player-with-FM-Video/745957951.html
Portable E-book reader of data vault text (has no network or Wifi)
2. Transflash SD ( Stores user personal data in encrypted format.)
3. Battery powered Teensy 3.0/3.1 with microSD.
We created special Teensy 3.0/3.1 battery operated hardware with special algorithms to hash/encode/decode text files.
Our special hash algorithms do not use the standard published algorithms, on the net, that have "backdoors" for NSA.
Notes:
The miniature transflash is extremely small it can be easily transported or hidden or sent undetected.
The portable Teensy 3.0/3.1 hardware is needed to decode/encode user data for user viewing.
All Teensy 3 development is being done on a XP PC computer with no network connection for secure development.