Category Archives: Articles

image_pdfimage_print

Electronic Signature HSM OpenPGP

Electronic Signature from DataShielder

Electronic signatures are increasingly being used to authenticate and protect documents online. But did you know that there are different levels of security for electronic signatures? According to the eIDAS regulation, there are three types of electronic signatures: simple, advanced and qualified. Each type offers a different degree of reliability and safety. In this article, we will look at simple electronic signatures and explain how HSM OpenPGP can make them more secure.

Simple Electronic Signatures

A simple electronic signature is the most basic form of electronic signature. It has no specific criteria defined by the eIDAS regulation. It is based solely on the express or implied consent of the author of the document. For example, a simple click on an “I agree” button or entering a name in a form field can be considered a simple electronic signature.

Simple electronic signatures are used for documents that do not require increased security, such as newsletters, surveys or contact forms. They have limited legal value, as they do not guarantee the identity of the signer or the integrity of the document.

Simple electronic signatures present several risks for data security. First of all, they are easy to forge or usurp. It is enough to know the name or email address of the signer to be able to sign in his place. Then, they are vulnerable to computer attacks. A hacker can intercept, modify or delete the signed document without the signer or the recipient noticing. Finally, they are difficult to verify. There is no simple and reliable way to prove the authenticity and validity of a simple electronic signature.

Il is a tool that allows you to sign your electronic documents in compliance with the eIDAS regulation. HSM OpenPGP offers you several advantages to enhance the security of your simple electronic signatures:

HSM OpenPGP uses an asymmetric cryptography system to protect your data. Each signer has a pair of keys: a public key and a private key. The public key is used to verify the signature, while the private key is used to sign the document. The private key is stored in a secure digital vault and is only accessible to the signer. HSM OpenPGP generates a timestamp for each signed document. The timestamp is an indelible proof of the date and time of the signature. It ensures the integrity of the document and prevents tampering or repudiation. HSM OpenPGP allows you to choose the level of security of your electronic signature according to your needs. You can opt for a simple, advanced or qualified electronic signature. Each level offers additional guarantees on the identity of the signer and the validity of the document. It is therefore a tool that allows you to sign your electronic documents with confidence and compliance. If you want to learn more about HSM OpenPGP and its features, feel free to visit our website or contact us.

Advanced Electronic Signatures

Electronic signatures are increasingly used to authenticate and protect online documents. But not all electronic signatures are equal. According to the eIDAS regulation, there are three types of electronic signatures: simple, advanced and qualified. Each type offers a different level of reliability and security. In this article, we will focus on advanced electronic signatures and explain how HSM OpenPGP can make them safer.

An advanced electronic signature is a form of electronic signature that offers a higher level of security than a simple electronic signature. It is based on a digital certificate issued by a trusted third party, called a qualified trust service provider (QTSP). This certificate allows to authenticate the identity of the signer and to ensure the integrity of the signed document. To be considered as an advanced electronic signature, the signature must meet several criteria defined by the eIDAS regulation. It must be:

  • Uniquely linked to the signer;
  • Capable of identifying the signer;
  • Created using signature creation data that the signer can use under his exclusive control;
  • Linked to the signed data in such a way that any subsequent modification of the data is detectable.

Advanced electronic signatures are used for documents that require increased security, such as contracts, invoices or tax declarations. They have a stronger legal value than simple electronic signatures, because they can prove the origin and integrity of the document.

It is an encryption key management application that provides unparalleled security and privacy to users. It is compatible with all messaging services and offers end-to-end encrypted instant messaging via segmented key authentication SMS. It also has a file encryption and data signing system with signature self-verification.

  • eIDAS compliance: By using HSM OpenPGP for advanced electronic signatures, you can be sure that your signatures meet the requirements of the eIDAS (Electronic IDentification, Authentication and Trust Services) regulation, which was established in July 2016 to define the criteria for an electronic signature process within the European Union.
  • Timestamp of signed documents: HSM OpenPGP generated a timestamp for each signed document. The timestamp is indelible proof of the date and time of the signature. It ensures the integrity of the document and prevents falsification or repudiation.
  • Choice of security level: HSM OpenPGP also allows you to choose the level of security of your electronic signature according to your needs.
  • Advanced features for data security and privacy: In addition to meeting eIDAS requirements for advanced electronic signatures, HSM OpenPGP also offers other data security and privacy benefits. For example, it allows you to generate, store, and use all types of symmetric and asymmetric keys offline for Open PGP encryption algorithms. The user can freely choose the algorithm he wants to use from AES 128 192 256 or RSA 2048 3072 4096 Open PGP. They can also import or export existing keys for storage, management, sharing, or use with HSM OpenPGP.

By using HSM OpenPGP for advanced electronic signatures, you not only benefit from a high level of reliability and security in accordance with the eIDAS regulation, but also additional protection for your data thanks to the advanced features offered by HSM OpenPGP.

Compliance with eIDAS Regulation

It is an innovative application for managing encryption keys and signing files. Although HSM OpenPGP offers an interesting approach to electronic signatures, it is important to note that its approach differs from the requirements for a qualified electronic signature under the eIDAS regulation.

The eIDAS Regulation (No 910/2014) was adopted on 23 July 2014 by the European Parliament and the European Union Council. It aims to strengthen trust in electronic transactions within the internal market by establishing a common foundation for secure electronic interactions between citizens, businesses and public authorities. According to this regulation, a qualified electronic signature must be created using a secure signature creation device (DSC) that ensures that the signature creation data is under the exclusive control of the signatory. It must also be based on a qualified electronic signature certificate that attests to the identity of the signatory and is issued by a qualified trust service provider (PSC) meeting applicable technical and regulatory requirements. Finally, it must allow the signatory to be identified and any subsequent changes to the signed data to be detected.

To learn more about the eIDAS Regulation, you can visit the EUR-Lex website at the following address:

https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32014R0910

HSM OpenPGP does not generate a qualified electronic signature within the meaning of the eIDAS Regulation because its approach does not rely on the use of a secure signature creation device (DSC) or a qualified certificate for electronic signatures issued by a qualified trust service provider (PSC).

However, It’s offers an innovative approach in the field of file signing and data encryption. HSM OpenPGP allows the signatory to generate, store and share their own public key and signature hash without relying on an external trusted third party. HSM OpenPGP uses technology patented by Freemindtronic on segmented key authentication to provide users with an unparalleled level of security and privacy. HSM OpenPGP also allows you to choose the level of security for your electronic signature based on your needs.

In short, although HSM OpenPGP does not generate a qualified electronic signature within the meaning of the eIDAS Regulation, it offers an innovative approach to simple and advanced electronic signatures with a high level of security and privacy.

According to the eIDAS Regulation, an advanced electronic signature must meet the following criteria:

  • It is uniquely linked to the signatory.
  • It allows the signatory to be identified.
  • It is created using data that the signatory can use under their exclusive control.
  • It is linked to the data to which it relates in such a way that any subsequent changes to the data can be detected.

It is appears to meet these criteria by allowing the signatory to generate their own private key using an application on their phone. The private key is encrypted and stored in the keychain (Apple) or key store (Android) and is only accessible to the signatory. The signatory creates their signature in .asc format from their private key after authenticating by entering at least one key or two or three. The signatory then sends the signature and their public key to the recipient so that they can verify that the file has not been corrupted.

By using HSM OpenPGP for advanced electronic signatures, you not only benefit from a high level of reliability and security in accordance with the eIDAS Regulation, but also additional protection for your data thanks to HSM OpenPGP’s advanced features. For example, it has a file encryption system and data signing with self-verification of signatures. The user can freely choose which algorithm they want to use among AES 128 192 256 or RSA 2048 3072 4096 Open PGP. They can also import or export existing keys for storage, management, sharing or use with HSM OpenPGP.

In conclusion, although HSM OpenPGP does not generate a qualified electronic signature within the meaning of the eIDAS Regulation, it offers an innovative approach to simple and advanced electronic signatures with a high level of security and privacy. It is appears to meet the criteria for an advanced electronic signature by allowing the signatory to generate their own private key using an application on their phone and providing users with an unparalleled level of security and privacy thanks to its patented technology. By using HSM OpenPGPfor advanced electronic signatures, you not only benefit from a high level of reliability and security in accordance with the eIDAS Regulation, but also additional protection for your data thanks to HSM OpenPGP’s advanced features. For example, it has a file encryption system and data signing with self-verification of signatures. The user can freely choose which algorithm they want to use among AES 128 192 256 or RSA 2048 3072 4096 Open PGP. They can also import or export existing keys for storage, management, sharing or use with HSM OpenPGP.

Cyber Computer at Eurosatory 2022

Cyber Computer Laptop EviCypher technology embedded contactless NFC hardware from Freemindtronic andorra Eurosatory 2022 exhibition picture web edition
Cyber Computer technology logo 2022

Cyber Computer on display at Eurosatory 2022

Cyber Computer auto locks and isolates backups

Cyber Computer at Eurosatory

1

Auto-lock storage

Encrypts and auto-locks all kinds of data storage media.

2

Dongle creation

Creates an unlocking Dongle operating system.

3

Auto-lock backup

It executes an additional encrypted and auto-locked backup

4

Offline secrets

Operates externalised secrets (IDs, encryption keys) in a secured NFC device

About the event

The Cyber Computer equipped with Freemindtronic’s EviCypher technology has won a Gold Globee Award 2022 in Material Security and 2 Global InfoSec Awards 2021 in Most Innovative Hardware Password Manager and Next-Gen in Secrets Management.

The Andorran start-up Freemindtronic Ltd., conceiver and creator of safety, cyber-security and counterespionage systems is also specialised in contactless technology (NFC).

Freemindtronic will present its Cyber Computer technology, protected by 3 international invention patents at Eurosatory, Paris, Hall 5B booth C178 from June 13th to June 17th 2022

Press Release

The solution is mainly designed to significantly limit the risk for senders to be compromised and/or the recipients, as well as of the sensitive data transfer.

EviStealth possesses different anonymization implementations such as taking pictures through the digital fingerprint of the smartphone. Therefore, it is the user’s experience that is at the heart of this innovation.

What is a Cyber Computer?

It consists of a new automated, quickly-deployable system to fight at once against different Cyber risks in a computer.

An ecosystem conceived of the control access taking of physical internal storage supports (HDD, SSD) and/or removable (USB key, SD, external SSD). The first solution presented at EUROSATORY 2022 is compatible with the TPM2.0 norm via Windows Bitlocker. It also encrypts the stored saves on the Cloud. The user carries out differential saves according to the 3-2-1 rule, encrypted in version management, with auto-locking and auto-logout.

This solution can work on the software installed in the computer. To obtain an extreme security level and the largest possible field of application, you can combine it with a manager of physically externalised secrets NFC device.

A solution designed for a « dual use », in every sense of the word.

The security and sovereignty of the sensitive data are a global issue that imply the private and public sectors, companies, state and, particularly, Defense, without making any distinctions. The Cyber Computer is customised by Freemindtronic, as an answer to traceability and access denial demands of the data, for instance.

Its advantages / qualities / specifications

Simplicity, quick deployment, efficiency at a low cost, non-intrusive retro-compatibility to computer and data systems, anonymous, physical and digital access control to sensitive data: it is a sovereign sensitive data storage solution, without having to know where the Cloud is physically located.

The solution allows different unlocking methods: manual key input, through an associated Dongle, via an NFC device or through a digital fingerprint, for instance.

The Cyber Computer successfully resolves all the problems related to private and company related data in BYOD, CYOD, COPE and COBO usages.

Moreover, the usage of Freemindtronic’s Rugged NFC USB Flash Drive EviKey® significantly increases the safe securing and the sensitive data restoration. Indeed, in terms of saving, Evikey automatically disconnects from the computer physically and becomes undetectable for computer systems.

Made in Europe

Software, application, extension and NFC devices are developed and made in Andorra by Freemindtronic.

Products compatible with Cyber Computer: Bleujour’s Kubb Secure French computer manufacturer https://freemindtronic.com/partner-products-with-freemindtronic-technologies/kubb-secure-products-freemindtronic-technology-embedded  click here more information

Contact for a meeting on the Freemindtronic stand at Eurosatory

EviCypher Story

EviCypher Story video youtube 2016 Cyber Cercle Paris France Genesis of the EviCypher Technology World champion of inventions 2021







EviCypher by Freemindtronic Andorra

EviCypher is, above all, the invention of Jacques Gascuel founder of the Deep Tech Andorrane Freemindtronic SL.

Freemindtronic, isa research and development laboratory specializing in the design and design of Green Tech electronic systems in security and cyber security computing specialized in NFC technology, contactless.

EviCypher® is a brand designating Freemindtronic technology in the field of security and cyber security secrets and their management.
EviCypher’s research and development laboratory is an expert in multi-factor wireless authentication (MFA) access control, which it has several international patents. In addition, Deep Tech also designs electrical protections for computer systems with black box traceability, wireless access control systems, segmented encryption key security systems   and multi-criteria of trust authentication systems.

EviCypher is a technical solution that at the same time guardian of secrets and respect for the environment.

EviCypher technology is one of the implementations of Jacques Gascuel’s invention, which was awarded numerous times for his inventions and innovations internationally in 2017, 2014 and worldwide in 2010 and 2021 at the international invention competition in Geneva, where he received the gold medal.


















First, EviCypher’s function is to keep the secrets stored offline for life in its individually protected and secured non-volatile encrypted memory by various criteria of trust and physical access control.

And at the same time, EviCypher significantly reduces attack surfaces to make them impossible when using the secrets stored in connected computer systems and information systems.  

As a result, the second function is cyber deterrence. It has the effect of convincing the potential attacker not to attack EviCypher users. The secrets are kept outsourced connected computer systems involves. In fact, for the attacker, the costs that will result from his remote and/or proximity attack would outweigh the potential benefits he thinks he can derive from it.

Freemindtronic’s research and development laboratory has this expertise in implementing such a high level of security, which it dents the know-how protected by international patents.

EviCyper is mostly a user engineering. Make it extremely easy to use security and cyber security technologies that are becoming more and more complex to implement.

Freemindtronic uses energy recovery via the NFC signal to EviCypher to operate only on demand. In fact, it doesn’t need a battery to run for life.

In the end, EviCypher has through its application many decentralized and individualized cyber security systems. EviCypher do not use server on the internet (serverless) to operate. It can operate without physically isolated contact networks (Air Gap)










the inventor of EviCypher

Inventor Jacques Gascuel moved to the eastern Pyrenees in the Principality of Andorra in 2016. It is in this mountain environment source of inspiration, that he founded Freemindtronic in November 2016. This start-up benefits from know-how protected by international patents. Less than a year after its creation was born a technological innovation named EviAlpha which will be integrated into an NFC device called EviTag®. This is a password and credit card manager. In addition, this product is several times Winner in Innovation in 2017 in Cybersecurity and Embedded System.














EXPO 2020 DUBAI Government of Andorra & Freemindtronic

EXPO 2020 Dubai Andorra participant pavilion exhibition retail merchandise sustainability & Jacques Gascuel CEO Freemindtronic SL 2022



EXPO 2020 Dubai Andorra participant pavilion exhibition retail merchandise sustainability

EXPO 2020 Dubai Andorra participant pavilion exhibition retail merchandise sustainability & Jacques Gascuel CEO Freemindtronic SL 2022

EXPO 2020 Dubai Andorra participant pavilion exhibition retail merchandise sustainability Marc Pons Andorra Recerca Innovacio 2022

EXPO 2020 Dubai Andorra participant pavilion exhibition retail merchandise sustainability Hind Jamiloun Director Dalle Consulting sl 2022

EXPO 2020 Dubai Andorra participant pavilion exhibition retail merchandise sustainability confederacio empresarial andorrana CEA, Fernando Galindo, Gerard Cadena, 2022













EXPO 2020 DUBAI ANDORRA





Freemindtronic svg vertical logo communication kit




The Freemindtronic SL team thanks the Govern d’Andorra, Andorra Business, CEA Confederació Empresarial Andorrana, Cambra de Comerç, Indústria i Serveis d’Andorra and Empresa Familiar Andorrana for being selected to be part of the delegation of Andorran companies who will present their Made in Andorra know-how, products, services and technology in order to create business links in Dubai.

We are also very honored to attend with the other Andorran companies the celebration of the International Day of Andorra at Expo 2020 Dubai in the presence of Xavier Espot, the Head of Government accompanied by Maria Ubach Font, Minister of Foreign Affairs, Jordi Torres Falco, Head of Tourism and Telecommunications, Cesar Marquina, Secretary of State for Digital Transformation and Strategic Projects.

We are an industrial player in the research and development of Greentech Safety and Cybersecurity solutions that respect the environment and the circular economy on the scale of a Country open to innovation.










Andorra Pavilion

Discover more about our small mountain country










2021 Events Exhibitions

African Digital Week 2021

Eurosatory Events Exhibitions

Exhibitors list Eurosatory 2022 and Freemindtronic Story

2022 Events Exhibitions

Freemindtronic at Toulouse Hacking Convention

  You can also contact Freemindtronic using the form below 👇.

Events Exhibitions

Freemindtronic 4YFN 2021

Events Exhibitions

MWC 4YFN 2017

2022 Events Exhibitions

Freemindtronic at Eurosatory 2022

Where to find us at Eurosatory 2022






Expo 2020 Dubai Andorra Conference




National Day of Andorra Celebrations




Official reception of Xavier Espot to the Andorran participants in the France pavilion at Expo 2020 Duba




Thomas Pesquet presents the France Pavilion for Expo 2020
















France Expo 2020 Pavilion

The France Expo 2020 pavilion, designed as a sustainable pavilion with all the techniques to make it virtuous for the environment, has the theme “connecting minds building the future” and sub-themes “opportunity, sustainability and mobility”.

Read more












3D France Pavilon EXPO 2020

View the French pavilion in 3D where the official reception of the Andorran participants took place

Read more












NEWS PROVIDED BY
Freemindtronic | Andorra Business | EXPO 2020 DUBAI
Download Pavilion the PDF Presention click here

Press & videos sources:




SHARE THIS ARTICLE





Secure Card CES 2022

Secure Card de Bleujour CES 2022 by Freemindtronic Andorra contactless data encryption from an NFC HSM security hardware module




Secure Card innovation 2022

Secure Card is a preview at CES Las Vegas 2022 of the new product developed by Freemindtronic for our partner Bleujour. for its new Kubb Secure product range.
 
The Secure Card is an NFC HSM secret manager such as encryption keys and hardware passwords, which has received 10 international awards since 2021 including the Geneva Gold Medal for Inventions in security, cyber security and cyber defence of computer and information systems. The Secure Card is equipped with EviCypher technology, which manages contactless secrets such as encryption keys, passwords and tokens.

 


Learn more about Kubb Secure products click here
Learn more about our partner Bleujour click here






BLEUJOUR

CES 2022 Booth: 18789 for CES booth plan click is here

&

BLEUJOUR  INNOVATION

CES 2022 Eureka Park booth: 61045 for CES booth plan click is here

The company BLEU JOUR is based on five founding pillars: Quality, Aesthetics, Innovation, Practicality and Exclusivity. In a constantly changing universe, BLEU JOUR offers creations where aesthetics is combined with innovative technological solutions. The company favors French design and manufacture.

Category: Home Office Hardware and Accessories

Country: France

Contact: Click here








Other project the Kubb Secure

Discover another project presented at CES 2022 Las Vegas the Kubb Secure.

This Kubb Secure works without an NFC phone as it includes an NFC reader. The first computer developed by Freemindtronic has been realized on a Kubb Secure from our partner Bleujour.

The Kubb Secure embeds the Cyber Computer technology which includes several Freemindtronic’s technologies forming a safety and cyber security eco system. Technologies that have received more than 10 international awards since 2021 in the fields of safety, security, cybersecurity and cyber defence of computer and information systems.

To find out more about the cyber computer click here





Kubb Secure embeds Cyber ​​Computer technology from Freemindtronic winner Gold Globee Awards 2022 Cyber ​​Security Global Excellence Awards hardware security category


Kubb Secure CES 2022

Kubb Secure embeds Cyber ​​Computer technology from Freemindtronic winner Gold Globee Awards 2022 Cyber ​​Security Global Excellence Awards hardware security category

Kubb Secure innovation 2022

Kubb Secure is to be discovered in preview at CES Las Vegas 2022 a new computer developed by Freemindtronic for our partner Bleujour for its new range of Kubb Secure products.

Kubb Secure embeds freemindtronic’s new technologies that have received 10 international awards in safety, cyber security and cyber defense of computer systems and information systems.


Learn more about Kubb Secure products click here

Learn more about our partner Bleujour click here


BLEUJOUR

CES 2022 Booth: 18789 for CES booth plan click is here

&

BLEUJOUR  INNOVATION

CES 2022 Eureka Park booth: 61045 for CES booth plan click is here

The company BLEU JOUR is based on five founding pillars: Quality, Aesthetics, Innovation, Practicality and Exclusivity. In a constantly changing universe, BLEU JOUR offers creations where aesthetics is combined with innovative technological solutions. The company favors French design and manufacture.

CATEGORY: Home Office Hardware and Accessories
COUNTRY: France
CONTACT: Click here



Other project the Secure Card

At CES Las Vegas 2022, you will discover a new development from Freemindtronic, the Secure Card for our partner Bleujour, which works via an Android NFC phone but also on a Cyber Desktop without a phone.
 
The Secure Card benefits from Freemindtronic’s latest technology which has already received more than 10 international awards since 2021 in the field of security, cybersecurity and cyber defence of computer and information systems.
 
To learn more about the Secure Card, click here.


Secure Card de Bleujour CES 2022 by Freemindtronic Andorra contactless data encryption from an NFC HSM security hardware module

EviCypher license available

EviCypher license available hardware wallet contactless encrytption ssecure contactless secret management by Freemindtronic Andorra

EviCypher license available.
 
EviCypher is a new technology developed by Freemindtronic, dedicated to the physical security of secrets, contactless. EviCypher won the 2021 Gold Medal for International Inventions from Geneva as well as 3 Cyber Defense Awards in May 2021.
 
This technology, protected by 2 international patents, offers countless possibilities for technical implementation in all market segments. In particular, that of access control and the security of secrets including physical and digital protection with several trust criteria, for all types of encryption keys and their uses.
 
Freemindtronic has created a site dedicated to EviCypher technology which brings together all the services created that are compatible with EviCypher. For example, you will learn about the encryption applications for Thunderbird and Gmail email client services. EviCYpher is the only end-to-end contactless encryption system from an NFC device with 12 configurable cumulative trust criteria. EviCypher is in fact the only solution in the world able to always keep emails and attachments encrypted, even in the event of corruption of local and/or online messaging services.
 
EviCypher technology is available under license as a white label.
 
EviCypher brand products are guaranteed for life by Freemindtronic SL Andorra.
 
In the event of the transfer of an exclusive license for a product and service dedicated to messaging, for example, this product will no longer be available for sale. To acquire the product and related services, it will be mandatory to use the licensed branded services.
 
Understanding that EviCypher technology offers countless possibilities for implementations, other products and services will be created and will be available for sale on the EviCypher store.
 
In the event of a total exclusive license transfer of the EviCypher technology, the EviCypher site will be closed and redirected to the licensee’s branded services.

Trophy Global Infosec Awards Winner Cyber Defense Magazine the Best Crypto Security and Most Innovative in Hardware Password Manager and best Secrets Management Freemindtronic Andorra

Awards Global Infosec Awards News Press

List of Winners Global Infosec Awards 2021

Download

Press release

En  – 📥 ND
Fr   – 📥 ND

NEWS PROVIDED BY FREEMINDTRONIC

EviCypher license available

Jun 25, 2021, 09:00 ET
Web site EviCypher Technology
https://evicypher.com

SHARE THIS ARTICLE

Our articles

Our articles of freemindtronic Andorra

Welcome to the publication of our articles

Our articles deal with the subject of data protection, access control, safety and security.
We cover a wide range of related topics that can be technical, legal and scientific.
It is also a way to give you advice on how to use the technologies we develop, but not only.
We hope that this space will satisfy your curiosity.
Subscribe to our new letter, to be always informed as soon as a new article is published.
 
We wish you a pleasant visit on the Freemindtronic.com website. Take the time to read our new click here
 

EAN Code Andorra: Why It Shares Spain’s 84 Code

All About EAN Codes and Their Importance EAN Code Andorra illustrates how the EAN (European [...]

Russian Espionage Hacking Tools Revealed

Russian Espionage Hacking Tools: Discovery and Initial Findings Russian espionage hacking tools were uncovered by [...]

End-to-End Messaging Encryption Regulation – A European Issue

Regulation of Secure Communication in the EU The European Union is considering measures to regulate [...]

NFC vCard Cardokey: Revolutionizing Digital Networking

NFC vCard: Revolutionize Your Professional Networking As the creator of Cardokey, I am thrilled to [...]

EU Sanctions Cryptocurrency Regulation: A Comprehensive Overview

EU Sanctions Cryptocurrency Regulation: A Comprehensive Overview The EU is stepping up its regulatory game [...]

Midnight Blizzard Cyberattack Against Microsoft and HPE: What are the consequences?

Midnight Blizzard Cyberattack against Microsoft and HPE: A detailed analysis of the facts, the impacts [...]

2 Comments

Encrypted messaging: ECHR says no to states that want to spy on them

Encrypted messaging: ECHR says no to states that want to spy on them The historic [...]

BitLocker Security: Safeguarding Against Cyberattacks

Elevating Data Protection on Windows with BitLocker Security Are you utilizing a Windows computer for [...]

How the attack against Microsoft Exchange on December 13, 2023 exposed thousands of email accounts

How the attack against Microsoft Exchange on December 13, 2023 exposed thousands of email accounts [...]

How to protect yourself from stalkerware on any phone

What is Stalkerware and Why is it Dangerous? Stalkerware, including known programs like FlexiSpy, mSpy, [...]

Human Limitations in Strong Passwords Creation

Human Limitations in Strong Passwords: Cybersecurity’s Weak Link Passwords are essential for protecting our data [...]

Terrapin attack: How to Protect Yourself from this New Threat to SSH Security

Protect Yourself from the Terrapin Attack: Shield Your SSH Security with Proven Strategies SSH is [...]

Google OAuth2 security flaw: How to Protect Yourself from Hackers

Google OAuth2 security flaw: Strategies Against Persistent Cookie Threats in Online Services Google OAuth2 security [...]

Telegram and the Information War in Ukraine

How Telegram Influences the Conflict between Russia and Ukraine Telegram and the information war in [...]

Kismet iPhone: How to protect your device from the most sophisticated spying attack?

Kismet iPhone: How to protect your device from the most sophisticated spying attack using Pegasus [...]

The American Intelligence: How It Works

The American Intelligence: How It Works, Its Limits and Consequences The American intelligence is one [...]

Ledger Security Breaches from 2017 to 2023: How to Protect Yourself from Hackers

Ledger Security Breaches from 2017 to 2023: How to Protect Your Cryptocurrencies from Hackers Have [...]

TETRA Security Vulnerabilities: How to Protect Critical Infrastructures

TETRA Security Vulnerabilities: How to Protect Critical Infrastructures from Cyberattacks TETRA (Terrestrial Trunked Radio) is [...]

DataShielder Defense NFC HSM: Protect Your Sovereign Communications

DataShielder Defense NFC HSM: How to Protect Your Sovereign Communications with a Revolutionary Solution The [...]

3 Comments

FormBook Malware: How to Protect Your Gmail and Other Data

How to Protect Your Gmail Account from FormBook Malware Introduction Imagine that you receive an [...]

Dual-Use Encryption Products: a regulated trade for security and human rights

The international regulations on dual-use encryption products The main international regulations that apply to dual-use [...]

2 Comments

Quantum computing RSA encryption: a threat and a solution

Quantum computing RSA encryption: a challenge and a solution Quantum computing RSA encryption is a [...]

NFC Business Cards with Cardokey free for life: How to Connect without Revealing

NFC Business Cards: Create your NFC vCard with Cardokey, the Eco-Friendly and Secure NFC App [...]

Pegasus: The cost of spying with one of the most powerful spyware in the world

Pegasus: The Cost of Spying with the Most Powerful Spyware in the World Pegasus is [...]

WhatsApp Hacking: Prevention and Solutions

How to Prevent and Solve WhatsApp Hacking Issues with Freemindtronic’s Solutions WhatsApp, with over 2 [...]

3 Comments

Chinese hackers Cisco routers: how to protect yourself?

How Chinese hackers infiltrate corporate networks via Cisco routers A Chinese-backed hacker group, known as [...]

RSA Encryption: How the Marvin Attack Exposes a 25-Year-Old Flaw

How the RSA Encryption – Marvin Attack Reveals a 25-Year-Old Flaw and How to Protect [...]

Communication Vulnerabilities 2023: Avoiding Cyber Threats

Communication Vulnerabilities in 2023: Unveiling the Hidden Dangers and Strategies to Evade Cyber Threats 2023 [...]

ZenRAT: The malware that hides in Bitwarden and escapes antivirus software

How this malware hides in Bitwarden and escapes antivirus software to steal your information ZenRAT [...]

Freemindtronic’s Legacy: Rediscovering Excellence

Resurrecting Excellence: Freemindtronic’s Legacy in Nanotechnology and the ‘Fullprotect’ Revolution In 2013, Freemindtronic, a visionary [...]

How to secure your SSH key with NFC HSM USB Drive EviKey

How to create and protect your SSH key with NFC HSM USB drive The NFC [...]

Enhancing Crypto Wallet Security: How EviSeed and EviVault Could Have Prevented the $41M Crypto Heist

EviSeed and EviVault NFC HSM Technologies could have prevented the $41 million crypto theft by [...]

Why choose a Cold Wallet NFC HSM to secure your cryptocurrencies?

How to secure your cryptocurrencies with a cold wallet NFC HSM is the topic of [...]

How to choose the best multi-factor authentication method for your online security

Everything you need to know about multi-factor authentication and its variants Have you ever wondered [...]

How to Recover and Protect Your SMS on Android

Recover and Protect Your SMS on Android: A Complete Guide First of all, SMS are [...]

Coinbase blockchain hack: How It Happened and How to Avoid It

How to Prevent Coinbase Blockchain Hack with EviVault NFC HSM Technology What happened to Coinbase [...]

Protect yourself from Pegasus spyware with EviCypher NFC HSM

How to protect yourself from Pegasus spyware with EviCypher NFC HSM Pegasus Spyware: what it [...]

Unitary patent system: why some EU countries are not on board

Why some EU countries are not on board What is the unitary patent? The unitary [...]

Protect US emails from Chinese hackers with EviCypher NFC HSM?

How EviCypher NFC HSM technology can protect emails from Chinese hackers The Chinese hack on [...]

Ommic case: How a French company allegedly handed over military secrets to China and Russia

Ommic case: The story of a French semiconductor company accused of spying for China and [...]

EviVault NFC HSM vs Flipper Zero: The duel of an NFC HSM and a Pentester

EviVault NFC HSM vs Flipper Zero: The duel of an NFC HSM and a Pentester [...]

Digital signature: How Freemindtronic secures its software

What is digital signature? Digital signature is a process that allows to authenticate the origin [...]

PassCypher NFC HSM: Secure and Convenient Password Management

PassCypher NFC HSM and PassCypher Pro NFC HSM: Secure and Convenient Password Management Introduction PassCypher [...]

1 Comment

NRE Cost Optimization for Electronics: A Comprehensive Guide

Efficient NRE Cost Optimization for Electronics NRE Cost Optimization, in the field of electronic product [...]

Securing IEO STO ICO IDO and INO: The Challenges and Solutions

Securing IEO STO ICO IDO and INO: How to Protect Your Crypto Investments Cryptocurrencies are [...]

Remote activation of phones by the police: an analysis of its technical, legal and social aspects

What is the new bill on justice and why is it raising concerns about privacy? [...]

Protect Meta Account Identity Theft with EviPass and EviOTP

Protecting Your Meta Account from Identity Theft Meta is a family of products that includes [...]

How BIP39 helps you create and restore your Bitcoin wallets

How BIP39 helps you create and restore your Bitcoin wallets Do you struggle to manage [...]

Segmented key authentication: an innovation by Jacques Gascuel to secure sensitive data

Segmented key authentication: an innovation by Jacques Gascuel to secure sensitive data What is segmented [...]

1 Comment

Recovery Phrase Backup: How to Secure It

This article will be updated with any new information on the topic, and readers are [...]

1 Comment

BITB Attacks: How to Avoid Phishing by iFrame

BITB Attacks: How to Avoid Phishing by iFrame We have all seen phishing attacks aren’t [...]

Snake Malware: The Russian Spy Tool

Snake: The Russian malware that steals sensitive information for 20 years Snake is a malware [...]

ViperSoftX How to avoid the malware that steals your passwords

ViperSoftX: The Malware that Steals Your Cryptocurrencies and Passwords ViperSoftX is a malware that steals [...]

1 Comment

What is Juice Jacking and How to Avoid It?

Juice Jacking: How to Avoid This Cyberattack Do you often use public USB chargers to [...]

Strong Passwords in the Quantum Computing Era

How to create strong passwords in the era of quantum computing? Quantum computing is a [...]

2 Comments

Protect Your Data from AMOS Malware

AMOS Malware Protection with Keepser Cold Wallet The Threat of AMOS Malware on macOS AMOS [...]

1 Comment

Cryptbot malware steals data cryptocurrencies

Understanding Cryptbot Malware: A Comprehensive Guide to the Threats and Risks Cryptbot malware is a [...]

1 Comment

The first wood transistor for green electronics

What is a wood transistor? A transistor is a device that can amplify or switch [...]

Kevin Mitnick’s Password Hacking with Hashtopolis

Password hacking tool: how it works and how to protect yourself Password hacking is a [...]

KingsPawn A Spyware Targeting Civil Society

  QuaDream: KingsPawn spyware vendor shutting down in may 2023 QuaDream was a company that [...]

Our articles

Welcome to the publication of our articles Our articles deal with the subject of data [...]

Phishing Cyber victims caught between the hammer and the anvil

Phishing is a fraudulent technique that aims to deceive internet users and to steal their [...]

766 trillion years to find 20-character code like a randomly generated password

766 trillion years to find randomly generated 20-character code like randomly generated password 766 trillion [...]

Awards of Freemindtronic

Awards of Freemindtronic Technology DataShielder HSM Encryption Fortress Award 2023




Awards of Freemindtronic: a showcase of excellence and innovation in data security

Freemindtronic is a company that has been recognized worldwide for its outstanding achievements in developing and providing data security solutions. Since its creation in 2009, Freemindtronic has received numerous awards and distinctions from prestigious organizations and events that celebrate the best in technology and innovation. In this page, you will find a comprehensive list of all the awards and distinctions that Freemindtronic has won over the years, as well as the details of each recognition and the products or services that were honored.

Awards and distinctions from 2010 to 2014

Some of the most notable awards and distinctions that Freemindtronic received in this period are:

  • The Silver Medal at the International Exhibition of Inventions of Geneva in 2010. It was for FullProtect, a system that protects electronic devices from electromagnetic attacks.
  • The Electron d’Or Award in 2013 for EviKey, the first NFC USB stick. It can be unlocked with a smartphone or a tablet.
  • The European Mechatronics Award in 2013 for EviKey, which was praised for its innovative design and functionality.
  • The RFID Award in 2014 for EviKey, which was presented by Jacques Gascuel. He is a renowned expert in RFID technology
  • The Embedded Trophy in 2014 for EviKey, which was selected as the best embedded system of the year.

Awards and distinctions from 2015 to 2017

Some of the most notable awards and distinctions that Freemindtronic received in this period are:

  • The Finalist Award at the International Cybersecurity Forum (FIC) in 2015 for EviKey. It was among the top 10 cybersecurity solutions of the year.
  • The Finalist Award at the Contactless Services Challenge in 2015 for EviKey. It was among the best contactless solutions of the year.
  • The Top 10 Cybersecurity Award at the FIC in 2017 for EviDisk, the first NFC hardened disk drive. It can be unlocked with a smartphone or a tablet.
  • The RCO Award in 2017 for EviToken, a hardware wallet and password manager. It is secured by contactless technology.
  • The MtoM & Embedded Systems Award in 2017 for EviDisk, which was chosen as the best IoT solution of the year.

Awards and distinctions from 2021 to present

Some of the most notable awards and distinctions that Freemindtronic received in this period are:

Some of the most notable awards and distinctions that Freemindtronic received in this period are:

  • The Silver Medal at the International Exhibition of Inventions of Geneva in 2010. It was for FullProtect, a system that protects electronic devices from electromagnetic attacks.
  • The Electron d’Or Award in 2013 for EviKey, the first NFC USB stick. It can be unlocked with a smartphone or a tablet
  • The European Mechatronics Award in 2013 for EviKey, which was praised for its innovative design and functionality
  • The RFID Award in 2014 for EviKey, which was presented by Jacques Gascuel. He is a renowned expert in RFID technology
  • The Embedded Trophy in 2014 for EviKey, which was selected as the best embedded system of the year

These awards and distinctions demonstrate the high quality and reliability of Freemindtronic products and services. They also show the creativity and innovation of Freemindtronic team. They reflect the vision and mission of Freemindtronic, which is to offer data security solutions that are easy to use, accessible to everyone and respectful of privacy. By visiting this page, you will learn more about Freemindtronic achievements and why Freemindtronic is a trusted leader in data protection.





2022 Awards Cybersecurity EviCypher Technology

Gold Globee Winner 2022 Cyber Computer NFC

Awards CES Awards Distinction Excellence

Keepser Group Award CES 2022

2022 Events EviCypher NFC HSM Exhibitions Licences Freemindtronic NFC Contactless

Secure Card CES 2022

2021 Cybersecurity Distinction Excellence EviCypher Technology finalists

E&T Innovation Awards Cybersecurity

2021 Awards Communications Distinction Excellence EviCypher Technology finalists IT

E&T Innovation Awards Communications & IT

2021 Awards Distinction Excellence finalists

Finalists The National Cyber Awards 2021

Awards Cyberculture EviCypher Technology International Inventions Geneva NFC HSM technology

Geneva International Exhibition of Inventions 2021

Awards Global Infosec Awards News Press

List of Winners Global Infosec Awards 2021

2021 Awards International Inventions Geneva

EviCypher Gold Medal 2021 of the Geneva International Inventions

2017 Awards Embedded System Awards IoT

Award 2017 MtoM & Embedded System & IoT

2017 Cybersecurity finalists

Award FIC 2017 10th Most innovative international startup

2015 finalists NFC Contactless

Finalist Contactless Services Challenge

2015 Awards Distinction Excellence EviKey & EviDisk

FIC 2015 Distinction Excellence 19th Most innovative international startup

2014 Awards Embedded System Awards EviKey & EviDisk News

The story of the first NFC hardened USB stick EviKey

2014 Awards Electronics Embedded System Awards EviKey & EviDisk

Embedded Trophy 2014 Freemindtronic

2014 Distinction Excellence EviKey & EviDisk NFC Contactless

RFID Award 2014 🎙️ Jacques gascuel presents NFC USB Stick EviKey

2013 Awards Distinction Excellence Electronics Embedded System Awards Mechatronics

European Mechatronics Award 2013 Freemindtronic

2013 Distinction Excellence Electronics Embedded System Awards finalists

Freemindtronic Electrons d’Or 2013

2010 Awards International Inventions Geneva

Award 2010 Silver Medal International Inventions Geneva FullProtect

Mobility & Telecommuting: How to create a contactless cybersecure computer workstation?

Mobility & Telecommuting: How to create a contactless cybersecure computer workstation?

How to create a contactless cybersecure computer workstation with Freemindtronic Andorra’s NFC devices.

The risk of contamination from Coronavirus COVID-19 has led to increased use of telework. The pandemic quickly imposed global containment of people. Independents, businesses, associations, administrations and communities have had to do everything possible to create jobs in a mobility environment. Unfortunately, this has not always been possible. It has become vital to preserve at least essential professional activities.

For some, the use of telework may seem temporary. However, the use of this mode of operation could well take hold in the long term, and surely become a norm in the future, beyond the duration of this health crisis.

Businesses will have reorganized around this new mode of operation and the new constraints associated with the limitation of travel.

More than a trend, it is a finding according to the survey conducted by Gartner which indicates that 88% of organizations have encouraged, or obliged, the use of telework. (https://www.gartner.com/en/newsroom/press-releases/2020-03-19-gartner-hr-survey-reveals-88–of-organizations-have-e)

According to the French Ministry of Labour, more than 4 out of 10 jobs in the private sector are now compatible with telework. According to a survey conducted by Deskeo among 2,915 professionals spread throughout France 62% of respondents will want to do more telework after confinement. (https://www.ledauphine.com/magazine-lifestyle/2020/04/24/les-francais-voudront-faire-plus-de-teletravail-apres-le-confinement).

A lot of organizations that have had to telework are done urgently. Some were put in place “remotely” with confined employees and without control of the security measures to be implemented. They have an obligation to find solutions to adequately protect information systems.

More worryingly, in an emergency, it was not possible for companies to deploy the necessary means and equipment to implement this new mode of operation. In fact, telework is often carried out with the personal equipment of employees with a level of safety not in accordance with professional use. This increases the area of exposure to vulnerability to data security and integrity.

Cyber criminals take advantage of telework vulnerability

Cyber criminals, on the other hand, have properly assessed this situation. They have seen exceptional potential and are taking advantage of this windfall to increase and target their cyberattacks.

A very worrying, dual-effect situation related to the containment and return of people to the company with their data exposed to risks.

@INTERPOL states that “Cybercriminals are attacking the computer networks and systems of individuals, businesses and even global organizations at a time when cyber defences could be reduced as a result of refocusing attention on the health crisis at COVID-19.” (https://www.interpol.int/Crimes/Cybercrime/COVID-19-cyberthreats)

Recommendations from Interpol and ANSSI  

Interpol’s first recommendation is to back up all important files and store them independently of your computer system (e.g. in the cloud or on an external disk). Their second recommendation is to always check that you are on a company’s legitimate website before entering login information or sensitive information. When it comes to prevention, Interpol advises updating your passwords and making sure they are strong enough with a mix of capital letters, lower cases, numbers and special characters.

@ANSSI published its Computer Security Recommendations for Telework in Crisis on 23 March 2020. ( (https://www.cybermalveillance.gouv.fr/tous-nos-contenus/actualites/recommandations-securite-informatique-teletravail))

Their first recommendation “Separate professional and personal practices well at the risk of confusing them and generating security errors that could be detrimental to his business.” Second, “Strictly apply the safety instructions of your business.” Other common recommendations follow, such as “Strengthen password security” and “Save your work regularly,” including on media outside your equipment (key or USB drive) that you unplug once you’ve backed up.”

In France, Prime Minister Édouard Philippe called “emphatically” on all French companies to maintain telework as much as possible for their employees.

Minister of Labour @MurielPénicaud recommends the use of telework until the summer

“… 5 million French people are now teleworking, and in the context of progressive deconfining, it is important that they continue to telework…”

Innovative backup solutions on fixed and removable media that self-disconnect

There are two secure contactless products that originally have a physical self-disconnection system from computer systems when backup is made. These are the NFC hardened USB stick EviKey and the Sata III EviDisk SSD disc available in the USB 3.0 external case and the internal 7mm 2.5″ format. Products developed by Andorran Freemindtronic SL.

Check out the demo in the video below the contactless unlocking of an EviDisk built into a company’s KUBB computer Bleujour.

During the Occitanie CyberMatines on LMI TV @lemondeinformatique april 22, 2020, Fullsecure conducted offline protection and physical use demonstrations of sensitive data such as passwords and encryption keys. The backup media in credit card or Tag formats operate without contact with a phone serving as an NFC terminal.

This demo shows an electronic self-connection system to a computer, a motherboard Bios, a Windows session and a VPN.

Retrocompatible solutions for offline encryption of any type of data on computer and phone

Another demo shows how to encrypt any data on computer and smartphone, an operation compatible with all computer systems and messaging services, including SMS.

We are talking about compatible retro solutions that offer the advantage of securing the use of any type of computer hardware, computer, smartphone, software, application while maintaining maximum security of the use of sensitive data, whether personal or professional.

Finally, Fullsecure gives a tip to make a desktop “smart”: Secure the sensitive data of any computer discreetly, discreetly, thanks to its mini devices hardened in Pin’s format.

In addition, data sharing is contactless, reducing the risk of contagion during this period of pandemic due to Covid19. Indeed, it is enough to approach your smartphone to the Fullsecure device to manage and use the data contained in pin’s.

Fullsecure offers a wide range of products to meet data security needs in mobility and/or in the workplace.

Learn more about Fullsecure products https://fullsecure.link

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.