{"id":23160,"date":"2014-05-26T16:42:24","date_gmt":"2014-05-26T20:42:24","guid":{"rendered":"http:\/\/www.opensource.im\/?p=23160"},"modified":"2014-05-26T16:42:24","modified_gmt":"2014-05-26T20:42:24","slug":"protect-your-personal-messages-with-cti-text-encryption","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/protect-your-personal-messages-with-cti-text-encryption.php","title":{"rendered":"Protect your personal messages with CTI Text Encryption"},"content":{"rendered":"<p><p>    CTI Text Encryption is a lightweight,    portable text encryption tool. Its ideal for sending sensitive    information via insecure channels (email, online chat, web    forums), perhaps from someone elses computer, although you can    also use it to save confidential data in files or elsewhere.  <\/p>\n<p>    The open source program is a tiny download (827KB), a single    executable with nothing else attached. Copy the file to a USB    stick and its ready to use almost anywhere.  <\/p>\n<p>    CTI Text Encryptions interface    appears a little confusing initially, as it has almost no text    labels or prompts. Fortunately its buttons do have tooltips, so    hovering the mouse over each one reveals some helpful clues.  <\/p>\n<p>    The process starts by entering the encryption passwords youd    like to use. CTI Text Encryption supports up to four, which    means you dont necessarily have to remember garbage like    \"lF@,%*jwX\" to maintain your security. Entering something like    the names of three or four childhood pets will be far easier    for you to remember, but almost as difficult for anyone else to    guess.  <\/p>\n<p>    After this, CTI Text Encryption works more or less as youd    expect. You type or paste text into the source box and click    \"Encrypt\". The program uses SHA512 to hash the passwords,    256-bit AES (Rijndael) to process the text, and displays the    results in the \"Encrypted\" box. (\"Hello world\" became    \"ZNz02G1\/x+susprkZONobg==\", for example.)  <\/p>\n<p>    One click then copies the encrypted text to the clipboard,    where you can paste it into an email, a forum message, wherever    you like. A friend who also has a copy of CTI Text Encryption    -- and knows your passwords -- should be able to read what    youve said, while everyone else will be locked out.  <\/p>\n<p>    What you dont get is any option to load, encrypt\/ decrypt or    save text files directly. You can work around this by, say,    opening a text file in Notepad, copying and pasting this into    CTI Text Encryption, but thats not as convenient.  <\/p>\n<p>    There is also one slightly bizarre extra, in the ability to set    a font. This is preserved within the message, so whoever is    decrypting it will not only see your words, but also their    chosen font. Its difficult to see why you would care about    this -- and presumably it could introduce problems, if the    recipient doesnt have the same font -- but the feature is here    if you need it.  <\/p>\n<p>    CTI Text Encryptionhas a few small    issues, then, but in general works very well: its simple,    straightforward, and provides an easy way to encrypt small text    messages from almost any PC.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>View original post here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/betanews.com\/2014\/05\/26\/protect-your-personal-messages-with-cti-text-encryption\" title=\"Protect your personal messages with CTI Text Encryption\">Protect your personal messages with CTI Text Encryption<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> CTI Text Encryption is a lightweight, portable text encryption tool. Its ideal for sending sensitive information via insecure channels (email, online chat, web forums), perhaps from someone elses computer, although you can also use it to save confidential data in files or elsewhere. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-23160","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/23160"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=23160"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/23160\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=23160"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=23160"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=23160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}