Tag Archives: Freemindtronic

image_pdfimage_print

New Microsoft Uninstallable Recall: Enhanced Security at Its Core

laptop displaying Microsoft Uninstallable Recall feature, highlighting TPM-secured data and uninstall option, with a user's hand interacting, on a white background.

Unveil Microsoft’s Enhanced Uninstallable Recall for Total Data Security

Microsoft Uninstallable Recall: Learn how Microsoft has significantly upgraded the security of its Recall activity journal, now featuring an easy-to-use uninstall option and protection through a secure enclave with stronger authentication. Read the full article to explore these advanced security features and improvements.

2024 Articles Technical News

Best 2FA MFA Solutions for 2024: Focus on TOTP & HOTP

2024 Articles Technical News

New Microsoft Uninstallable Recall: Enhanced Security at Its Core

2024 Digital Security Spying Technical News

Side-Channel Attacks via HDMI and AI: An Emerging Threat

2024 EviKey & EviDisk Technical News

IK Rating Guide: Understanding IK Ratings for Enclosures

2024 Digital Security Technical News

Apple M chip vulnerability: A Breach in Data Security

Stay informed with our posts dedicated to Technical News to track its evolution through our regularly updated topics.

Microsoft’s Uninstallable Recall, written by Jacques Gascuel, CEO of Freemindtronic, fixes earlier security issues by processing data in a TPM-secured enclave and giving users complete control over data. You can uninstall Recall easily, wiping all data for enhanced privacy. Stay informed on these security updates and more in our tech solutions.

Microsoft’s Revamped Recall System

Microsoft recently overhauled its Recall feature, which had faced criticism for security and privacy issues. The new version delivers enhanced protection and better control over personal data, responding directly to concerns raised by users and privacy experts.

Key Features of Microsoft’s New Uninstallable Recall

Recall is an activity journal that allows users to retrieve information based on past actions, utilizing AI-analyzed screenshots. In its first iteration, the tool faced backlash because data was stored insecurely, making it easily accessible to others sharing the same device.

Microsoft responded by overhauling the architecture of Recall. Now, all data processing occurs within a Trusted Platform Module (TPM)-protected secure enclave. Access to information requires Windows Hello authentication or a PIN, ensuring that only authorized users can unlock the encrypted data.

Enhanced Data Protection with Microsoft’s Uninstallable Recall

Microsoft significantly improved the security architecture of Recall. All data is now encrypted and stored within the TPM chip, and multi-factor authentication further protects user information. Recent updates to Recall ensure that sensitive information is automatically filtered out, including passwords, personal identification numbers, and credit card details.

These changes align with the security mechanisms found in BitLocker, which also uses TPM to safeguard encryption keys. Freemindtronic has noted the similarities between Recall and BitLocker’s multi-layer encryption and user-focused security enhancements.

How to Enable and Remove Microsoft’s New Recall

With the updated Uninstallable Recall, Microsoft gives users full control over the feature. Recall is opt-in—it remains off unless activated by the user, and it can be uninstalled easily at any time. Microsoft has confirmed that when Recall is uninstalled, all related data is permanently deleted, further addressing privacy concerns.

Additional Security Measures

Microsoft also introduced several improvements to Recall, including:

  • Private browsing compatibility: Users can now prevent Recall from saving sessions during private browsing.
  • Sensitive content filtering: By default, Recall filters out sensitive data such as passwords and personal details.
  • Custom permissions: Users can choose what data Recall tracks and restrict it to specific apps or activities.

These updates reflect Microsoft’s commitment to providing robust data protection, and as seen in similar tools like BitLocker, Microsoft emphasizes TPM-based encryption to secure user data​. Freemindtronic highlighted that BitLocker uses multi-layer encryption and TPM to secure sensitive information from unauthorized access​.

Business and Consumer Advantages of Microsoft’s Enhanced Recall

These enhancements have significant implications for both businesses and individual users. Companies can benefit from the enhanced data protection, especially when managing sensitive information across multiple devices. Users working in shared environments can rest assured knowing their personal data is encrypted and secured, even if the device is shared.

Moreover, this follows a pattern of Microsoft’s continuous security efforts, as seen in the resolution of BitLocker access issues caused by a faulty Crowdstrike update. The incident demonstrated the importance of robust encryption and key management tools like PassCypher NFC HSM.

Availability of the Uninstallable Recall Feature

The new Recall feature will be available to Windows Insiders in October 2024. It is integrated with Copilot+ PCs, designed to provide comprehensive security without sacrificing usability​.

Why Microsoft’s Recall Is a Step Forward in Data Security

With the Uninstallable Recall, Microsoft demonstrates its commitment to developing tools that balance user privacy and productivity. The integration of TPM-encrypted data storage, biometric authentication, and flexible permissions makes Recall one of the most secure data management systems available today, alongside established solutions like BitLocker.

SeedNFC HSM Products Warranty

Futuristic padlock symbolizing the SeedNFC HSM Products Warranty with digital circuitry in the background, representing security and protection.

SeedNFC HSM Products Warranty

Freemindtronic guarantees that all SeedNFC HSM products are free from hidden defects, manufacturing faults, and non-conformities. This warranty protects you under specific conditions and complies with all applicable laws.

Manufacturer Identification

Freemindtronic SL is based at 14 Avenue Copríncep de Gaulle, AD700 Escaldes-Engordany, Principality of Andorra. The company is registered in the Trade and Companies Register of Andorra under registration number 16501.

What the SeedNFC HSM Products Warranty Covers

Freemindtronic guarantees that SeedNFC HSM products do not have hidden defects or manufacturing faults. We ensure that our products, including all components, meet high standards of quality. This warranty applies under normal usage as specified in the user manual.

Warranty Period

The SeedNFC HSM Products Warranty starts on the date of the original purchase. It lasts for two (2) years for professional customers and three (3) years for individual customers. You may activate the manufacturer’s warranty after all commercial or contractual remedies from the seller have been exhausted. If the seller no longer exists, the warranty also applies. You can view the seller’s terms and conditions here.

Additionally, we warrant that any replaced product, part, or component is free from defects for thirty (30) days from the replacement date. This coverage will extend to the end of the original warranty period if that time is longer.

Consumer Protection

This warranty applies only to the original purchaser and is non-transferable. Products purchased second-hand or in a non-new condition are not covered.

We assume no responsibility for incidental or consequential damages, including loss of profits or business opportunities. The warranty limits our liability strictly to the product itself. Freemindtronic reserves the right to improve or modify the products without any obligation to update products previously sold.

Intellectual Property Protection

SeedNFC HSM products are protected by international patents, including WO2018/154258 and WO2017/129887. These patents are valid in the USA, Europe, China, South Korea, Japan, and Algeria. Additionally, products are safeguarded by copyrights and Soleau envelopes.

It is the customer’s responsibility to ensure that the seller holds valid licenses from the manufacturer. If not, the customer may unknowingly purchase counterfeit products.

Software Usage License

Freemindtronic grants you a personal, non-transferable, and non-exclusive worldwide license to use the software associated with the SeedNFC HSM products. This license allows you to use the product and its functionalities.

You may not copy, modify, or distribute any part of the software. Additionally, you cannot decompile or attempt to extract the software’s source code. Decompiling is only allowed under specific legal mandates or with prior approval from Freemindtronic.

Eligibility for the SeedNFC HSM Products Warranty

To benefit from the SeedNFC HSM Products Warranty, you or the seller must adhere to the following conditions:

  • Do not reproduce or allow others to reproduce any part of the product.
  • Do not disclose information that could lead to the reproduction of the product.
  • Do not engage in the sale of counterfeit products.
  • Follow all applicable laws regarding the import, sale, and use of cryptographic technologies.
  • Do not export SeedNFC HSM products to regions where export control laws prohibit it without the appropriate licenses.

Failure to meet these conditions could result in legal action.

Warranty Limitations and Technical Specifications

Freemindtronic makes no specific promises regarding product features, performance, or compatibility for specific uses. All SeedNFC HSM products are sold “as is.” You are responsible for using the product in accordance with the user manual.

Cold Wallet and Hardware Wallet Specifications

SeedNFC HSM products may include cold wallet and hardware wallet functionalities. These products allow users to access their cryptocurrency balances securely. However, SeedNFC HSM does not support signing transactions. You can use the private and public keys stored on the NFC HSM device to view balances and check account information. At no point do your private keys leave the device.

  • Private Key Protection: SeedNFC HSM securely generates and stores your private keys locally. These keys are never exposed to the internet.
  • Unique Pairing Key: Each SeedNFC HSM product comes with a unique pairing key. You must provide this key for any after-sales service requests. Without it, Freemindtronic will not be able to process your service request.
  • Black Box System: The product features a black box that records key events, including first use and administrator password attempts.
  • Trust Criteria for Data Protection: Before sending your device for service, you must delete all personal data or lock access using trust criteria like passwords or geolocation. These measures ensure that even the manufacturer cannot access sensitive information during service.

Specific Exclusions for Cold Wallets and Hardware Wallets

The SeedNFC HSM Products Warranty does not cover:

  • Loss or theft of cryptocurrency stored on the device.
  • User mismanagement of private keys.
  • Recovery of private keys or cryptocurrency if data is lost or deleted.

Warranty Service Procedure

To request warranty service for your SeedNFC HSM product:

  1. Contact the seller’s support team via this link.
  2. Follow the Return Merchandise Authorization (RMA) process and obtain a return code.
  3. Provide the unique pairing key and send the product to the seller for inspection.

Before shipping the product, ensure you have backed up or locked your personal data to protect it during service.

Applicable Law and Jurisdiction

These warranty conditions are governed by the laws of the Principality of Andorra. Any disputes arising from this warranty will be exclusively settled by the Andorran courts. If you violate or threaten to violate our intellectual property rights, we reserve the right to seek injunctive relief in any court of our choice.

Key Definitions

  • Customer: The individual or entity that purchases a SeedNFC HSM product.
  • Hidden Defect: A defect that is not immediately visible but renders the product unfit for use, or greatly reduces its usefulness, that the customer would not have purchased or would have paid less for the product if they had known about the defect.
  • SeedNFC HSM Brand: Refers to the owner or legally authorized company using the SeedNFC HSM trademark.
  • Professional Customer: A person or entity who purchases SeedNFC HSM products for business, industrial, or professional activities.
  • Manufacturer: Freemindtronic SL, which guarantees the products manufactured under the SeedNFC HSM brand.
  • Non-Conformity: A product that does not meet its description or has manufacturing defects.

Side-Channel Attacks via HDMI and AI: An Emerging Threat

Side-channel attacks visualized through an HDMI cable emitting invisible electromagnetic waves intercepted by an AI system.

Side-channel attacks via HDMI are the focus of Jacques Gascuel’s analysis, which delves into their legal implications and global impact in cybersecurity. This ongoing review is updated regularly to keep you informed about advancements in these attack methods, the protective technologies from companies like Freemindtronic, and their real-world effects on cybersecurity practices and regulations.


Protecting Against HDMI Side-Channel Attacks

Side-channel attacks via HDMI, bolstered by AI, represent a growing threat in cybersecurity. These methods exploit electromagnetic emissions from HDMI cables to steal sensitive information from a distance. How can you protect yourself against these emerging forms of cyberattacks?


2024 Cyberculture

Electronic Warfare in Military Intelligence

2024 Articles Cyberculture Legal information

ANSSI Cryptography Authorization: Complete Declaration Guide

2024 Articles Cyberculture

EAN Code Andorra: Why It Shares Spain’s 84 Code

Understanding the Impact and Evolution of Side-Channel Attacks in Modern Cybersecurity

Side-channel attacks, also known as side-channel exploitation, involve intercepting electromagnetic emissions from HDMI cables to capture and reconstruct the data displayed on a screen. These attacks, which were previously limited to analog signals like VGA, have now become possible on digital signals thanks to advances in artificial intelligence.

A group of researchers from the University of the Republic in Montevideo, Uruguay, recently demonstrated that even digital signals, once considered more secure, can be intercepted and analyzed to reconstruct what is displayed on the screen. Their research, published under the title “Deep-TEMPEST: Using Deep Learning to Eavesdrop on HDMI from its Unintended Electromagnetic Emanations”, is available on the arXiv preprint server​ (ar5iv).

Complementing this, Freemindtronic, a company specializing in cybersecurity, has also published articles on side-channel attacks. Their work highlights different forms of these attacks, such as acoustic or thermal emissions, and proposes advanced strategies for protection. You can explore their research and recommendations for a broader understanding of the threats associated with side-channel attacks by following this link: Freemindtronic – Side-Channel Attacks.

Freemindtronic Solutions for Combating Side-Channel Attacks via HDMI

Freemindtronic’s PassCypher and DataShielder product lines incorporate advanced hardware security technologies, such as NFC HSM (Hardware Security Module) or HSM PGP containers, to provide enhanced protection against side-channel attacks.

How Do These Products Protect Against HDMI Attacks?

Freemindtronic’s PassCypher and DataShielder product lines incorporate advanced hardware security technologies, such as NFC HSM (Hardware Security Module) or HSM PGP containers, to provide enhanced protection against side-channel attacks.

  • PassCypher NFC HSM and PassCypher HSM PGP: These devices are designed to secure sensitive data exchanges using advanced cryptographic algorithms considered post-quantum, and secure key management methods through segmentation. Thanks to their hybrid HSM architecture, these devices ensure that cryptographic keys always remain in a secure environment, protected from both external and internal attacks, including those attempting to capture electromagnetic signals via HDMI. Even if an attacker managed to intercept signals, they would be unusable without direct access to the cryptographic keys, which remain encrypted even during use. Furthermore, credentials and passwords are decrypted only ephemerally in volatile memory, just long enough for auto-login and decryption.
  • DataShielder NFC HSM: This product goes even further by combining hardware encryption with NFC (Near Field Communication) technology. DataShielder NFC HSM is specifically designed to secure communications between phones and computers or exclusively on phones, ensuring that encryption keys are encrypted from the moment of creation and decrypted only in a secure environment. The messages remain encrypted throughout. This means that even if data were intercepted via a side-channel attack, it would remain indecipherable without the decryption keys stored within the HSM. Additionally, the NFC technology limits the communication range, reducing the risk of remote interception, as even the information transmitted via the NFC channel is encrypted with other segmented keys.

Why Are These Products Effective Against HDMI Attacks?

  • Segmented Cryptographic Key Protection: The hybrid HSMs integrated into these products ensure that cryptographic keys never leave the secure environment of the module. Even if an attacker were to capture HDMI signals, without access to the keys, the data would remain protected.
  • Encryption from NFC HSM or HSM PGP: Hybrid encryption, using keys stored in a secure enclave, is far more secure than software-only encryption because it is less likely to be bypassed by side-channel attacks. The PassCypher and DataShielder solutions use advanced AES-256 CBC PGP encryption, making it much harder for attackers to succeed.
  • Electromagnetic Isolation: These devices are designed to minimize electromagnetic emissions as much as possible and only on demand in milliseconds, making side-channel attacks extremely difficult to implement. Moreover, the data exchanged is encrypted within the NFC signal, significantly reducing the “attack surface” for electromagnetic signals. This prevents attackers from capturing exploitable signals.
  • Limitation of Communications: With NFC technology, communications are intentionally limited to short distances, greatly complicating attempts to intercept data remotely.

In summary

Freemindtronic’s PassCypher NFC HSM, PassCypher HSM PGP, and DataShielder NFC HSM products offer robust protection against side-channel attacks via HDMI. By integrating hardware security modules, advanced encryption algorithms, and limiting communications to very short distances, these devices ensure high-level security, essential for sensitive environments where data must be protected against all forms of attacks, including those using side-channel techniques.

To learn more about these products and discover how they can enhance your system’s security, visit Freemindtronic’s product pages:

Produit de Cyberdéfense de l’Année : Freemindtronic Finaliste aux National Cyber Awards 2024

Certificat de finaliste du DataShielder Auth NFC HSM pour le Produit de Cyberdéfense de l'Année 2024 aux National Cyber Awards

COMMUNIQUÉ DE PRESSE – DataShielder Auth NFC HSM conçu en Andorre par Freemindtronic Finaliste pour le Produit de Cyberdéfense de l’Année 2024!

Les National Cyber Awards 2024 célèbrent l’excellence des produits de cyberdéfense de l’année avec BAE Systems comme sponsor principal

Escaldes-Engordany, Andorre, 5 août 2024 – Cyber Defence Product of the Year, Freemindtronic Andorra, finaliste, annonce avec fierté sa sélection pour ce prestigieux prix aux National Cyber Awards 2024. Ces prix, désormais dans leur sixième édition, honorent les contributions et les réalisations exceptionnelles dans le domaine de la cybersécurité.

Alors que les menaces numériques s’intensifient, la cybersécurité devient de plus en plus cruciale. Les cyberattaques, y compris le vol d’identité, les ordres de transfert falsifiés, le vol de données sensibles, l’espionnage industriel à distance et de proximité, ainsi que le vol d’informations sensibles sur les téléphones (comme les SMS, les mots de passe, les codes 2FA, les certificats et les clés secrètes), présentent des risques extrêmement préjudiciables pour les entreprises, les gouvernements et les individus à l’échelle mondiale. Les National Cyber Awards, reconnus comme un gage d’excellence, établissent des normes dans l’industrie. Ils sont conçus pour encourager l’innovation, la résilience et la dévotion à la protection du paysage numérique. Ils favorisent l’amélioration continue et l’adoption des meilleures pratiques à l’échelle mondiale.

Cette année, les National Cyber Awards 2024 visent à récompenser ceux qui s’engagent en faveur de l’innovation cybernétique, de la réduction de la cybercriminalité et de la protection des citoyens en ligne. Gordon Corera, le célèbre correspondant de sécurité de la BBC, apporte son immense expertise à cet événement. Il couvre des questions critiques comme le terrorisme, la cybersécurité, l’espionnage et diverses préoccupations de sécurité mondiale. Il note que l’événement de 2024 promet une célébration de l’excellence et de l’innovation au sein de l’industrie de la cybersécurité. Cela offre des perspectives uniques d’une des voix principales de la sécurité internationale.

National Cyber Awards maintient l’Intégrité et l’Équité pour tous ses trophées

Leur jury indépendant maintient l’intégrité du processus d’évaluation des National Cyber Awards en adhérant à un code de conduite strict. Cela garantit un processus d’évaluation juste, transparent et rigoureux. Ils s’engagent pour empêcher toute pratique de paiement pour concourir. Ceci est essentiel pour maintenir les normes les plus élevées d’impartialité dans leurs récompenses.

La cérémonie de remise des prix comprend des catégories telles que les Services de Police et d’Application de la Loi, le Service Public, l’Innovation et la Défense, la Cyber dans les Entreprises, l’Éducation et l’Apprentissage. Les nominés et les lauréats seront célébrés pour leur impact significatif sur la sécurisation du cyberespace contre les menaces en constante évolution.

Freemindtronic Andorre a été sélectionné par le jury comme finaliste pour le Produit de Cyberdéfense de l’Année avec notre produit, DataShielder Auth NFC HSM.

Les organisateurs de l’événement nous ont notifié:

“Nous sommes ravis de vous informer que vous avez été sélectionné par notre panel de juges comme finaliste pour le Produit de Cyberdéfense de l’Année 2024! Il s’agit d’une réalisation exceptionnelle, compte tenu des centaines de candidatures que nous avons reçues cette année. Félicitations de la part de toute l’équipe des National Cyber Awards!”

Le dirigean de Freemindtronic déclare:

“Nous nous sentons honorés et reconnaissants d’être reconnus parmi les leaders de la cybersécurité. Être finaliste valide notre engagement envers l’innovation et la protection des données sensibles et des identités numériques contre les menaces en constante évolution, désormais assistées par l’intelligence artificielle. Nous sommes très honorés et fiers d’être nommés parmi les finalistes représentant le 10e plus petit pays du monde, Andorre, en tant qu’acteur industriel de la cyberdéfense. Au nom de l’équipe de Freemindtronic et de moi-même, nous félicitons tous les autres finalistes.”

Jacques Gascuel, PDG et Chef de la Recherche et du Développement, concepteur de solutions de contre-espionnage et détenteur de brevets au Royaume-Uni, sera présent à la cérémonie d’annonce des lauréats.

Cette deuxième nomination pour notre entreprise andorrane Freemindtronic par le jury des National Cyber Awards marque un autre jalon dans la conception et la fabrication de produits de contre-espionnage d’usage civil et militaire accessibles à tous. Nous avons été précédemment reconnus en 2021 comme “Highly Commended at National Cyber Awards” et finalistes pour deux années consécutives en 2021.

Message du Premier Ministre du Royaume-Uni pour les National Cyber Awards 2024

L’Honorable Keir Starmer, Premier Ministre du Royaume-Uni, commente les prix: “Les National Cyber Awards sont une merveilleuse façon de récompenser, de célébrer et de mettre en valeur le travail de ceux qui s’engagent à nous protéger. Veuillez transmettre mes plus chaleureuses félicitations aux lauréats qui sont une source d’inspiration pour tous ceux du secteur qui souhaitent protéger les autres.”

Les National Cyber Awards auront lieu à Londres le 23 septembre, la veille de l’Expo Cybernétique Internationale annuelle.

Les organisateurs félicitent tous les autres finalistes et attendent avec impatience de célébrer cet événement international avec nous le 23 septembre lors de la cérémonie de remise des prix! Si vous souhaitez vous joindre à nous pour une soirée de célébration et d’excitation, vous pouvez acheter des billets et des tables pour l’événement via le site web à l’adresse www.thenationalcyberawards.org.

Notes aux Rédacteurs

Qu’est-ce que les National Cyber Awards?

Les National Cyber Awards ont débuté en 2019 dans le but de célébrer l’excellence et l’innovation parmi ceux qui se consacrent à la cybersécurité. En effet, ces prix mettent en lumière les réalisations exceptionnelles de professionnels, d’entreprises et d’éducateurs des secteurs privé et public. D’ailleurs, des leaders de l’industrie, passionnés par l’élévation du domaine de la cybersécurité, ont conçu ces prix. Ainsi, ils reconnaissent et inspirent l’engagement à relever les défis en constante évolution de la cybersécurité.

En ce qui concerne leur mission, elle est d’identifier et de célébrer les contributions exceptionnelles dans le domaine. En outre, nous aspirons à fournir un critère d’excellence auquel tout le monde peut aspirer. De plus, nous envisageons un avenir où chaque innovation en cybersécurité internationale est reconnue et célébrée. Cette reconnaissance encourage l’amélioration continue et l’adoption des meilleures pratiques à l’échelle mondiale. Grâce au soutien de nos sponsors, la participation aux prix reste gratuite. En conséquence, chaque finaliste reçoit un billet gratuit pour la cérémonie, minimisant les barrières à l’entrée et rendant la participation accessible à tous.

http://www.thenationalcyberawards.org

Contact: Future Tech Events, Fergus Bruce, info@futuretechevents.com

Finalistes 2024 pour les National Cyber Awards dans la catégorie “Produit de Cyberdéfense de l’Année 2024”

Résumé du Candidat

  • Produit: DataShielder Auth NFC HSM
  • Catégorie: Produit de Cyberdéfense de l’Année 2024
  • Nom: Jacques Gascuel
  • Entreprise: Freemindtronic
  • Courriel: contact at freemindtronic.com
  • Biographie de l’Entreprise: Freemindtronic se distingue par sa spécialisation dans la conception, l’édition et la fabrication de solutions de contre-espionnage. En effet, notre dernière innovation, le DataShielder Auth NFC HSM, sert de solution de contre-espionnage à double usage pour les applications civiles et militaires. Notamment, nous avons présenté cette solution pour la première fois au public le 17 juin 2024 à Eurosatory 2024. Plus précisément, elle combat activement le vol d’identité, l’espionnage et l’accès aux données et messages sensibles et classifiés grâce au chiffrement post-quantum AES 256 CBC. De surcroît, elle fonctionne hors ligne, sans serveurs, sans bases de données, et sans nécessiter que les utilisateurs s’identifient ou changent leurs habitudes de stockage de données sensibles, de services de messagerie ou de protocoles de communication, tout en évitant les coûts d’infrastructure. C’est pourquoi nous avons spécialement conçu le DataShielder Auth NFC HSM pour combiner sécurité et discrétion. Concrètement, il se présente sous deux formes pratiques : une carte de la taille d’une carte de crédit et une étiquette NFC discrète. D’une part, la carte se glisse facilement dans un portefeuille, à côté de vos cartes bancaires NFC, et protège physiquement contre l’accès illicite. D’autre part, vous pouvez attacher l’étiquette NFC, similaire à un badge d’accès RFID, à un porte-clés ou la cacher dans un objet personnel. Ainsi, cette approche garantit que vous ayez toujours votre DataShielder Auth NFC HSM à portée de main, prêt à sécuriser vos communications, authentifier les collaborateurs et valider les donneurs d’ordres, le tout sans attirer l’attention.

Caractéristiques Additionnelles du Produit

  • Compatibilité avec Divers Systèmes de Communication: DataShielder Auth NFC HSM est compatible avec plusieurs systèmes de communication, y compris les e-mails, les chats, les webmails, les SMS, les MMS, les RCS et les services de messagerie instantanée publics et privés. Cette compatibilité universelle permet une intégration parfaite dans les environnements de communication existants. Cela assure une protection continue sans modifications significatives de l’infrastructure.
  • Protection Contre les Attaques Assistées par IA: DataShielder Auth NFC HSM fournit une protection avancée contre les attaques sophistiquées assistées par IA. Avec un chiffrement robuste et une authentification forte, le produit élimine les risques posés par les tentatives de vol d’identité utilisant des techniques avancées d’ingénierie sociale. Ainsi, il assure une sécurité améliorée pour les utilisateurs.
  • Méthodes de Gestion des Clés: Le produit utilise des modules de sécurité matériels dotés de la technologie NFC pour créer et gérer les clés de manière sécurisée. Les dispositifs DataShielder stockent de manière sécurisée les clés de chiffrement générées aléatoirement. Le système fonctionne sans serveurs ni bases de données. Cela offre un anonymat de bout en bout et réduit significativement les points potentiels de vulnérabilité.

Les produits DataShielder NFC HSM sont disponibles exclusivement en France à travers AMG Pro et internationalement à travers Fullsecure Andorra.

Nous remercions tous les membres du jury pour l’intérêt qu’ils ont montré envers notre dernier produit révolutionnaire, le DataShielder NFC HSM.

Jury des National Cyber Awards

  • Mary Haigh: CISO, BAE Systems
  • Rachael Muldoon: Avocate, Maitland Chambers
  • Shariff Gardner: Chef de la Défense, Militaire et Application de la Loi, Royaume-Uni, Irlande et Pays Nordiques, SANS Institute
  • Damon Hayes: Commandant Régional, National Crime Agency
  • Miriam Howe: Responsable de la Consultation Internationale, BAE Systems Digital Intelligence
  • Myles Stacey OBE: Conseiller Spécial du Premier Ministre, 10 Downing Street
  • Daniel Patefield: Chef de Programme, Cyber & National Security, techUK
  • Sir Dermot Turing: Administrateur, Bletchley Park Trust
  • Nicola Whiting MBE: Présidente du Jury
  • Oz Alashe MBE: PDG et Fondateur, CybSafe
  • Professeure Liz Bacon: Principale et Vice-Chancelière, Université d’Abertay
  • Richard Beck: Directeur de la Cybersécurité, QA
  • Martin Borret: Directeur Technique, IBM Security
  • Bronwyn Boyle: CISO, PPRO
  • Charlotte Clayson: Associée, Trowers & Hamlins LLP
  • Pete Cooper: Fondateur, Aerospace Village
  • Professeur Danny Dresner: Professeur de Cybersécurité, Université de Manchester
  • Ian Dyson QPM DL: Police de la Ville de Londres
  • Mike Fell OBE: Directeur de la Cybersécurité, NHS England
  • Tukeer Hussain: Responsable de la Stratégie, Département de la Culture, des Médias et des Sports
  • Dr Bob Nowill: Président, Cyber Security Challenge
  • Chris Parker MBE: Directeur, Gouvernement, Fortinet (Cybersécurité)
  • Dr Emma Philpott MBE: PDG, IASME Consortium Ltd
  • Peter Stuart Smith: Auteur
  • Rajinder Tumber MBE: Chef de l’Équipe de Consultance en Sécurité, Sky
  • Saba Ahmed: Directrice Générale, Accenture Security
  • Charles White: Directeur, The Cyber Scheme
  • Professeure Lisa Short: Areta Business Performance / XTCC
  • Emma Wright: Associée, Harbottle & Lewis LLP
  • Dr Budgie Dhanda MBE: Consultant en Gestion, PA Consulting
  • Jacqui Garrad: Directrice du Musée National de l’Informatique
  • Dr Vasileios Karagiannopoulos: Codirecteur du Centre de Cybercriminalité et Criminalité Économique, Université de Portsmouth
  • Debbie Tunstall: Directrice de Compte, Immersive Labs
  • Sarah Montague: HMRC


Découvrez nos autres distinctions, y compris notre reconnaissance en tant que finaliste en solution de Cyberdéfense de l’Année 2024, aux côtés de nos trophées et des médailles d’argent et d’or que nous avons remportées au cours de la dernière décennie. 🏆🌟👇



NEWS PROVIDED BY
The National Cyber ​​Awards 2024
August 2024

Autres langues disponibles : catalan et anglais. [Cliquez ici pour le catalan] [Cliquez ici pour l’anglais]


SHARE THIS ARTICLE



Producte de Ciberdefensa de l’Any 2024 – Freemindtronic Finalista

DataShielder Auth NFC HSM by Freemindtronic – Finalist for Cyber Defence Product of the Year 2024

COMUNICAT DE PREMSA – DataShielder Auth NFC HSM Fet a Andorra per Freemindtronic Finalista per al Producte de Ciberdefensa de l’Any 2024!

Els National Cyber Awards 2024 Celebren l’Excel·lència dels Productes de Ciberdefensa de l’Any amb BAE Systems com a Patrocinador Principal

Escaldes-Engordany, Andorra, 5 d’agost de 2024 – Freemindtronic Andorra, finalista del Producte de Ciberdefensa de l’Any, anuncia amb orgull la seva selecció per a aquest prestigiós premi als National Cyber Awards 2024. Aquests premis, ara en la seva sisena edició, honoren les contribucions i els èxits destacats en el camp de la ciberseguretat.

A mesura que les amenaces digitals s’intensifiquen, la importància de la ciberseguretat no es pot subestimar. Els ciberatacs, incloent-hi el robatori d’identitat, les ordres de transferència falses, el robatori de dades sensibles, l’espionatge industrial remot i de proximitat, i el robatori d’informació sensible dels telèfons (com SMS, contrasenyes, codis 2FA, certificats i claus secretes), presenten riscos extremadament perjudicials per a empreses, governs i individus a nivell global. Els National Cyber Awards, reconeguts com un segell d’excel·lència, estableixen estàndards en la indústria. Estan dissenyats per fomentar la innovació, la resiliència i la dedicació a la protecció del paisatge digital, promovent la millora contínua i l’adopció de les millors pràctiques a nivell mundial.

Enguany, els National Cyber Awards 2024 tenen com a objectiu premiar aquells compromesos amb la innovació cibernètica, la reducció de la ciberdelinqüència i la protecció dels ciutadans en línia. Gordon Corera, l’estimat corresponsal de seguretat de la BBC, aporta la seva extensa experiència a aquest esdeveniment, cobrint qüestions crítiques com el terrorisme, la ciberseguretat, l’espionatge i diverses preocupacions de seguretat global. Destaca que l’esdeveniment de 2024 promet una celebració d’excel·lència i innovació dins de la indústria de la ciberseguretat, oferint perspectives úniques d’una de les veus principals en seguretat internacional.

Mantenir la Integritat i l’Equitat per al Producte de Ciberdefensa de l’Any

El nostre jurat independent manté la integritat del procés d’avaluació dels National Cyber Awards adherint-se a un codi de conducta estricte. Això garanteix un procés d’avaluació just, transparent i robust. Estem compromesos a evitar qualsevol pràctica de pagament per jugar per mantenir els estàndards més alts d’imparcialitat en els nostres premis.

La cerimònia de lliurament de premis inclou categories com Serveis de Policia i Aplicació de la Llei, Servei Públic, Innovació i Defensa, Ciber en els Negocis, Educació i Aprenentatge. Els nominats i els guanyadors seran celebrats pel seu impacte significatiu en la seguretat del ciberespai contra les amenaces en evolució constant.

Freemindtronic Andorra ha estat seleccionat pel jurat com a finalista per al Producte de Ciberdefensa de l’Any amb el nostre producte, DataShielder Auth NFC HSM.

Els organitzadors de l’esdeveniment ens van notificar

“Ens complau informar-vos que heu estat seleccionats pel nostre jurat com a finalistes per al Producte de Ciberdefensa de l’Any 2024! Es tracta d’un assoliment destacat, tenint en compte els centenars de nominacions que hem rebut aquest any. Felicitats de part de tot l’equip dels National Cyber Awards!”

El CEO de Freemindtronic declara

“Ens sentim honorats i agraïts de ser reconeguts entre els líders en ciberseguretat. Ser finalistes valida el nostre compromís amb la innovació i la protecció de les dades sensibles i les identitats digitals contra les amenaces en constant evolució, ara assistides per la intel·ligència artificial. Ens sentim molt honorats i orgullosos de ser nominats entre els finalistes representant el desè país més petit del món, Andorra, com a actor industrial en ciberdefensa. En nom de l’equip de Freemindtronic i de mi mateix, felicitem tots els altres finalistes.”

Jacques Gascuel, CEO i Cap de Recerca i Desenvolupament, dissenyador de solucions de contraespionatge i titular de patents al Regne Unit, estarà present a la cerimònia d’anunci dels guanyadors.

Aquesta és la segona nominació per a la nostra empresa andorrana Freemindtronic pel jurat dels National Cyber Awards. Anteriorment vam ser reconeguts el 2021 com a “Highly Commended at National Cyber Awards” i com a finalistes per dos anys consecutius el 2021. Aquesta nominació de 2024 per a aquest prestigiós premi marca un altre pas important en el disseny i fabricació de productes de contraespionatge d’ús dual civil i militar accessibles per a tothom.

Missatge del Primer Ministre del Regne Unit per als National Cyber Awards 2024

L’Honorable Keir Starmer, Primer Ministre del Regne Unit, comenta sobre els premis: “Els National Cyber Awards són una manera meravellosa de recompensar, celebrar i mostrar el treball d’aquells compromesos a mantenir-nos segurs. Si us plau, transmeteu les meves més càlides felicitacions als guanyadors que són una inspiració per a tots els del sector que desitgen protegir els altres.”

Els National Cyber Awards tindran lloc a Londres el 23 de setembre, la nit de dilluns que precedeix l’Expo Cibernètica Internacional anual.

Els organitzadors feliciten tots els altres finalistes i esperen celebrar aquest esdeveniment internacional amb nosaltres el 23 de setembre a la cerimònia de lliurament de premis! Si voleu unir-vos a nosaltres per una nit de celebració i emoció, podeu comprar entrades i taules per a l’esdeveniment a través del lloc web a www.thenationalcyberawards.org.

Notes per als Editors

Què són els National Cyber Awards?

Els National Cyber Awards van començar el 2019 per celebrar l’excel·lència i la innovació entre aquells dedicats a la ciberseguretat. Aquests premis destaquen els èxits excepcionals de professionals, empreses i educadors tant del sector privat com públic. Líders de la indústria, apassionats per elevar el camp de la ciberseguretat, van concebre aquests premis. Reconeixen i inspiren el compromís per afrontar els reptes en constant evolució de la ciberseguretat.

La nostra missió és identificar i celebrar contribucions excepcionals en el camp. Aspirem a proporcionar un punt de referència d’excel·lència per a tothom. Envisionem un futur on cada innovació en ciberseguretat internacional sigui reconeguda i celebrada. Aquest reconeixement fomenta la millora contínua i l’adopció de les millors pràctiques a nivell mundial. Amb el suport dels nostres patrocinadors, la participació en els premis continua sent gratuïta. Cada finalista rep una entrada gratuïta per a la cerimònia, minimitzant les barreres d’entrada i fent que la participació sigui accessible per a tothom.

http://www.thenationalcyberawards.org

Contacte: Future Tech Events, Fergus Bruce, info@futuretechevents.com

Finalistes del 2024 per als National Cyber Awards en la categoria “Producte de Ciberdefensa de l’Any 2024”

Resum del Candidat

  • Producte: DataShielder Auth NFC HSM
  • Categoria: Producte de Ciberdefensa de l’Any 2024
  • Nom: Jacques Gascuel
  • Empresa: Freemindtronic
  • Correu Electrònic: contact at freemindtronic.com
  • Biografia de l’Empresa: Freemindtronic es especialitza en dissenyar, publicar i fabricar solucions de contraespionatge. La nostra última innovació, el DataShielder Auth NFC HSM, serveix com una solució de contraespionatge d’ús dual per a aplicacions civils i militars. Vam presentar aquesta solució per primera vegada al públic el 17 de juny de 2024 a Eurosatory 2024. Combate activament el robatori d’identitat, l’espionatge i l’accés a dades i missatges sensibles i classificats mitjançant xifratge post-quantum AES 256 CBC. A més, funciona fora de línia, sense servidors, sense bases de dades, i sense necessitat que els usuaris s’identifiquin o canviïn els seus hàbits d’emmagatzematge de dades sensibles, serveis de missatgeria o protocols de comunicació, tot evitant els costos d’infraestructura. Hem dissenyat especialment el DataShielder Auth NFC HSM per combinar seguretat i discreció. Ve en dues formes pràctiques: una targeta de la mida d’una targeta de crèdit i una etiqueta NFC discreta. La targeta es llisca fàcilment en una cartera, al costat de les teves targetes bancàries NFC, i protegeix físicament contra l’accés il·lícit. Mentrestant, pots enganxar l’etiqueta NFC, similar a una insígnia d’accés RFID, a un clauer o amagar-la en un objecte personal. Aquest enfocament assegura que sempre tinguis el teu DataShielder Auth NFC HSM a mà, llest per assegurar les teves comunicacions, autenticar col·laboradors i validar donants d’ordres, tot sense cridar l’atenció.

Característiques Addicionals del Producte

  • Compatibilitat amb Diversos Sistemes de Comunicació: DataShielder Auth NFC HSM és compatible amb múltiples sistemes de comunicació, incloent correus electrònics, xats, webmails, SMS, MMS, RCS i serveis de missatgeria instantània públics i privats. Aquesta compatibilitat universal permet una integració perfecta en entorns de comunicació existents, assegurant una protecció contínua sense canvis significatius en la infraestructura.
  • Protecció Contra Atacs Assistits per IA: DataShielder Auth NFC HSM proporciona protecció avançada contra atacs sofisticats assistits per IA. Amb un xifratge robust i una autenticació forta, el producte elimina els riscos plantejats per intents de robatori d’identitat mitjançant tècniques avançades d’enginyeria social, assegurant així una seguretat millorada per als usuaris.
  • Mètodes de Gestió de Claus: El producte utilitza mòduls de seguretat de maquinari amb tecnologia NFC per crear i gestionar claus de manera segura. Els dispositius DataShielder emmagatzemen de manera segura les claus de xifratge generades aleatòriament. El sistema funciona sense servidors ni bases de dades, oferint anonimat de punta a punta i reduint significativament els punts potencials de vulnerabilitat.

Els productes DataShielder NFC HSM estan disponibles exclusivament a França a través d’AMG Pro i internacionalment a través de Fullsecure Andorra.

Agraïm a tots els membres del jurat l’interès mostrat en el nostre últim producte revolucionari, el DataShielder NFC HSM.

Jurat dels National Cyber Awards

  • Mary Haigh: CISO, BAE Systems
  • Rachael Muldoon: Advocada, Maitland Chambers
  • Shariff Gardner: Cap de Defensa, Militar i Aplicació de la Llei, Regne Unit, Irlanda i Països Nòrdics, SANS Institute
  • Damon Hayes: Comandant Regional, National Crime Agency
  • Miriam Howe: Cap de Consultoria Internacional, BAE Systems Digital Intelligence
  • Myles Stacey OBE: Assessor Especial del Primer Ministre, 10 Downing Street
  • Daniel Patefield: Cap de Programa, Cyber & National Security, techUK
  • Sir Dermot Turing: Administrador, Bletchley Park Trust
  • Nicola Whiting MBE: Presidenta del Jurat
  • Oz Alashe MBE: CEO i Fundador, CybSafe
  • Professora Liz Bacon: Principal i Vicecanceller, Universitat d’Abertay
  • Richard Beck: Director de Ciberseguretat, QA
  • Martin Borret: Director Tècnic, IBM Security
  • Bronwyn Boyle: CISO, PPRO
  • Charlotte Clayson: Soci, Trowers & Hamlins LLP
  • Pete Cooper: Fundador, Aerospace Village
  • Professor Danny Dresner: Professor de Ciberseguretat, Universitat de Manchester
  • Ian Dyson QPM DL: Policia de la Ciutat de Londres
  • Mike Fell OBE: Director de Ciberseguretat, NHS England
  • Tukeer Hussain: Responsable de l’Estratègia, Departament de Cultura, Mitjans de Comunicació i Esports
  • Dr Bob Nowill: President, Cyber Security Challenge
  • Chris Parker MBE: Director, Govern, Fortinet (Ciberseguretat)
  • Dr Emma Philpott MBE: CEO, IASME Consortium Ltd
  • Peter Stuart Smith: Autor
  • Rajinder Tumber MBE: Cap de l’Equip de Consultoria en Seguretat, Sky
  • Saba Ahmed: Directora General, Accenture Security
  • Charles White: Director, The Cyber Scheme
  • Professora Lisa Short: Areta Business Performance / XTCC
  • Emma Wright: Soci, Harbottle & Lewis LLP
  • Dr Budgie Dhanda MBE: Consultor en Gestió, PA Consulting
  • Jacqui Garrad: Directora del Museu Nacional de la Informàtica
  • Dr Vasileios Karagiannopoulos: Codirector del Centre per a la Cibercriminalitat i la Criminalitat Econòmica, Universitat de Portsmouth
  • Debbie Tunstall: Directora de Comptes, Immersive Labs
  • Sarah Montague: HMRC


Explora els nostres reconeixements addicionals, incloent la nominació com a finalista del Producte de Ciberdefensa de l’Any, juntament amb els nostres trofeus i les medalles de plata i or que hem guanyat durant la darrera dècada. 🏆🌟👇



NEWS PROVIDED BY
The National Cyber ​​Awards 2024
August 2024

Altres idiomes disponibles: anglès i francès. [Cliqueu aquí per a francès] [Cliqueu aquí per a anglès]


SHARE THIS ARTICLE



Cyber Defence Product of the Year: Freemindtronic Finalist at National Cyber Awards 2024

DataShielder Auth NFC HSM by Freemindtronic – Finalist for Cyber Defence Product of the Year 2024

PRESS RELEASE – DataShielder Auth NFC HSM Made in Andorra by Freemindtronic Finalist for Cyber Defence Product of the Year 2024!

Escaldes-Engordany, Andorra, August 5, 2024 – Freemindtronic Andorra proudly announces that its DataShielder Auth NFC HSM has been selected as a finalist for the prestigious Cyber Defence Product of the Year award at the National Cyber Awards 2024. This highly regarded event, sponsored by BAE Systems, celebrates excellence in cybersecurity and innovation.

As digital threats continue to evolve, the importance of cybersecurity cannot be overstated. Cyber attacks such as identity theft, false transfer orders, theft of sensitive data, remote and proximity industrial espionage, and the interception of sensitive information from devices pose significant risks to businesses, governments, and individuals. The National Cyber Awards, recognized for their rigorous standards, aim to promote innovation, resilience, and best practices worldwide in the fight against these ever-growing threats.

A Notable Presence at the National Cyber Awards 2024

Freemindtronic’s CEO, Jacques Gascuel, attended the awards ceremony in London, proudly representing Andorra, one of the smallest countries in the world. Freemindtronic was honored to receive the Silver Certificate as a finalist in the Innovation & Defence category. The company was also thrilled to witness Lisa Ventura MBE, founder of Cyber Security Unity, receive the Highly Commended distinction.

Freemindtronic was the only foreign company to be named a finalist in the UK’s prestigious National Cyber Awards. “We are proud to represent Andorra on the global stage,” said Jacques Gascuel, who also had the honor of gifting The Cyber Trust organizers a NFC vCard DataShielder collector, designed specifically with the logo and robot of the National Cyber Awards 2024. Photos from this moment can be found in the official gallery.

CEO’s Statement:
“We look forward to competing again next year with our upcoming 2025 innovation. I want to thank the organizers for their warm welcome and congratulate all the finalists.”

DataShielder Auth NFC HSM: Among the Top Finalists

Freemindtronic’s DataShielder Auth NFC HSM was selected as a finalist due to its advanced capabilities in safeguarding against identity theft, sensitive data breaches, and industrial espionage. Utilizing AES-256 CBC post-quantum encryption, the device ensures optimal security and operates entirely offline, without the need for servers or databases.

A Special Conversation with Industry Experts

During the event, an insightful discussion took place between Jacques Gascuel, Graham Day of Genesys, and Lisa Ventura (who received the prestigious award). They discussed PassCypher HSM PGP Free, Freemindtronic’s free password manager. Graham Day pointed out that a password manager offering such advanced and comprehensive security for free might be met with skepticism by users, who may find it hard to believe such a solution could truly be free. However, the idea of allowing donations to support its development was seen as a more acceptable approach. They also discussed the paid version of PassCypher HSM PGP, which offers fully automated services with a patented segmented encryption system, sparking conversation about potential partnerships.

Message from the Prime Minister of the United Kingdom

The Prime Minister of the United Kingdom, the Right Honorable Keir Starmer, expressed his support for the National Cyber Awards:
“The National Cyber Awards are a wonderful way to reward, celebrate, and showcase the work of those committed to keeping us safe. Please pass on my warmest congratulations to the winners who are an inspiration to everyone in the sector.”

About the National Cyber Awards

The National Cyber Awards were established in 2019 to celebrate excellence and innovation in cybersecurity. They honor exceptional achievements in both the public and private sectors. These awards highlight the continuous efforts of professionals and organizations dedicated to addressing the ever-changing challenges of cybersecurity.

Innovation and Security with DataShielder Auth NFC HSM – A Finalist for Cyber Defence Product of the Year

The DataShielder Auth NFC HSM provides advanced protection against sophisticated AI-assisted attacks, making it a leader in the fight against digital identity theft and data espionage. Compatible with a variety of communication systems (including emails, SMS, MMS, RCS, and private messaging platforms), this device ensures seamless integration into existing infrastructures while offering robust security.

Freemindtronic’s dedication to privacy and security has been recognized for a second time by the National Cyber Awards. This latest achievement builds upon the company’s previous recognition as a Highly Commended finalist in 2021. The DataShielder Auth NFC HSM remains a dual-use solution for both civilian and military applications.

For more information, visit the official National Cyber Awards 2024 gallery to see Jacques Gascuel showcasing the DataShielder NFC HSM Defense and DataShielder NFC HSM Auth products.

Notes to Editors

What are The National Cyber Awards?

The National Cyber Awards began in 2019 to celebrate excellence and innovation among those dedicated to cybersecurity. These awards highlight the exceptional achievements of professionals, companies, and educators from both the private and public sectors. Industry leaders, passionate about elevating the field of cybersecurity, envisioned these awards. They recognize and inspire commitment to tackling the ever-evolving challenges of cybersecurity.

Our mission is to identify and celebrate outstanding contributions in the field. We aim to provide a benchmark of excellence for everyone to aspire to. We envision a future where every international cybersecurity innovation is recognized and celebrated. This recognition encourages continuous improvement and the adoption of best practices worldwide. With support from our sponsors, participation in the awards remains free. Each finalist receives a complimentary ticket to the ceremony, minimizing barriers to entry and making participation accessible to all.

http://www.thenationalcyberawards.org

Contact: Future Tech Events, Fergus Bruce, info@futuretechevents.com

2024 Finalists for The National Cyber Awards in the Category “Cyber Defence Product of the Year 2024”

Candidate Summary

  • Product: DataShielder Auth NFC HSM
  • Category: Cyber Defence Product of the Year 2024
  • Name: Jacques Gascuel
  • Company: Freemindtronic
  • Email: contact@freemindtronic.com
  • Company Bio: Freemindtronic specializes in designing, publishing, and manufacturing counter-espionage solutions. Our latest innovation, the DataShielder Auth NFC HSM, serves as a dual-use counter-espionage solution for both civilian and military applications. We first presented this solution to the public on June 17, 2024, at Eurosatory 2024. It actively combats identity theft, espionage, and access to sensitive and classified data and messages through AES 256 CBC post-quantum encryption. Furthermore, it operates offline, without servers, without databases, and without needing users to identify themselves or change their habits of storing sensitive data, messaging services, or communication protocols, all while avoiding infrastructure costs.

Additional Product Features

  • Compatibility with Various Communication Systems: DataShielder Auth NFC HSM supports multiple communication systems, including emails, chats, webmails, SMS, MMS, RCS, and both public and private instant messaging services. This universal compatibility allows seamless integration into existing communication environments, ensuring continuous protection without significant infrastructure changes.
  • Protection Against AI-Assisted Attacks: DataShielder Auth NFC HSM provides advanced protection against sophisticated AI-assisted attacks. With robust encryption and strong authentication, the product eliminates risks posed by identity theft attempts using advanced social engineering techniques, ensuring enhanced security for users.
  • Key Management Methods: The product utilizes hardware security modules with NFC technology to securely create and manage keys. The DataShielder devices securely store the randomly generated encryption keys. The system operates without servers or databases, offering end-to-end anonymity and significantly reducing potential points of vulnerability.

DataShielder NFC HSM products are exclusively available in France through AMG Pro and internationally through Fullsecure Andorra.

We thank all the members of the jury for their interest in our latest revolutionary product, the DataShielder NFC HSM.

Judges – The National Cyber Awards

  • Mary Haigh: CISO, BAE Systems
  • Rachael Muldoon: Barrister, Maitland Chambers
  • Shariff Gardner: Head of Defence, Military and Law Enforcement, UK, Ireland & Nordics, SANS Institute
  • Damon Hayes: Regional Commander, National Crime Agency
  • Miriam Howe: Head of International Consulting, BAE Systems Digital Intelligence
  • Myles Stacey OBE: Special Adviser to the Prime Minister, 10 Downing Street
  • Daniel Patefield: Head of Programme, Cyber & National Security, techUK
  • Sir Dermot Turing: Trustee, Bletchley Park Trust
  • Nicola Whiting MBE: Chair of Judges
  • Oz Alashe MBE: CEO & Founder, CybSafe
  • Professor Liz Bacon: Principal & Vice-Chancellor, Abertay University
  • Richard Beck: Director of Cyber, QA
  • Martin Borret: Technical Director, IBM Security
  • Bronwyn Boyle: CISO, PPRO
  • Charlotte Clayson: Partner, Trowers & Hamlins LLP
  • Pete Cooper: Founder, Aerospace Village
  • Professor Danny Dresner: Professor of Cyber Security, University of Manchester
  • Ian Dyson QPM DL: City of London Police
  • Mike Fell OBE: Director of Cyber, NHS England
  • Tukeer Hussain: Strategy Manager, Department for Culture, Media & Sport
  • Dr Bob Nowill: Chair, Cyber Security Challenge
  • Chris Parker MBE: Director, Government, Fortinet (Cybersecurity)
  • Dr Emma Philpott MBE: CEO, IASME Consortium Ltd
  • Peter Stuart Smith: Author
  • Rajinder Tumber MBE: Security Consultancy Team Lead, Sky
  • Saba Ahmed: Managing Director, Accenture Security
  • Charles White: Director, The Cyber Scheme
  • Professor Lisa Short: Areta Business Performance / XTCC
  • Emma Wright: Partner, Harbottle & Lewis LLP
  • Dr Budgie Dhanda MBE: Managing Consultant, PA Consulting
  • Jacqui Garrad: Museum Director, The National Museum of Computing
  • Dr Vasileios Karagiannopoulos: Co-Director of Centre for Cybercrime and Economic Crime, University of Portsmouth
  • Debbie Tunstall: Account Director, Immersive Labs
  • Sarah Montague: HMRC


Explore our additional accolades, including the Cyber Defence Product of the Year finalist recognition, alongside our trophies and the silver and gold medals we’ve earned over the past decade. 🏆🌟👇



NEWS PROVIDED BY
The National Cyber ​​Awards 2024
August 2024

Other languages available: French and Catalan. [Click here for French] [Click here for Catalan]


SHARE THIS ARTICLE



How the attack against Microsoft Exchange on December 13, 2023 exposed thousands of email accounts

Digital shield by Freemindtronic repelling cyberattack against Microsoft Exchange

How to protect yourself from the attack against Microsoft Exchange?

The attack against Microsoft Exchange was a serious security breach in 2023. Thousands of organizations worldwide were hacked by cybercriminals who exploited vulnerabilities in Microsoft’s email servers. How did this happen? What were the consequences? How did Microsoft react? And most importantly, how can you protect your data and communications? Read our comprehensive analysis and discover Freemindtronic’s technology solutions.


2024 Digital Security

Cyberattack Exploits Backdoors: What You Need to Know

2024 Digital Security

Google Sheets Malware: The Voldemort Threat

2024 Articles Digital Security News

Russian Espionage Hacking Tools Revealed

2024 Digital Security Spying Technical News

Side-Channel Attacks via HDMI and AI: An Emerging Threat

Cyberattack against Microsoft: discover the potential dangers of stalkerware spyware, one of the attack vectors used by hackers. Stay informed by browsing our constantly updated topics.


Cyberattack against Microsoft: How to Protect Yourself from Stalkerware, a book by Jacques Gascuel, the innovator behind advanced sensitive data security and safety systems, provides invaluable knowledge on how data encryption and decryption can prevent email compromise and other threats.


How the attack against Microsoft Exchange on December 13, 2023 exposed thousands of email accounts

On December 13, 2023, Microsoft was the target of a sophisticated attack by a hacker group called Lapsus$. This attack exploited another vulnerability in Microsoft Exchange, known as CVE-2023-23415, which allowed the attackers to execute remote code on the email servers using the ICMP protocol. The attackers were able to access the email accounts of more than 10,000 Microsoft employees, some of whom were working on sensitive projects such as the development of GTA VI or the launch of Windows 12. The attackers also published part of the stolen data on a website called DarkBeam, where they sold more than 750 million fraudulent Microsoft accounts. Microsoft reacted quickly by releasing a security patch on December 15, 2023, and collaborating with the authorities to arrest the perpetrators of the attack. One of the members of the Lapsus$ group, an Albanian hacker named Kurtaj, was arrested on December 20, 2023, thanks to the cooperation between the American and European intelligence services1234.

What were the objectives and consequences of the attack?

The attack against Microsoft Exchange affected more than 20,000 email servers worldwide, belonging to businesses, institutions and organizations from different sectors. These servers were vulnerable because they used outdated versions of the software, which no longer received security updates. The attack exploited a critical vulnerability known as ProxyLogon (CVE-2023-23415), allowing the attackers to execute remote code on the servers and access the email accounts. Despite the efforts to solve the problem, many vulnerable servers remained active, exposing the email accounts of about 30,000 high-level employees, including executives and engineers. The attackers were able to steal confidential information, such as internal projects, development plans, trade secrets or source codes.

What were the objectives of the attack?

The attack was attributed to Lapsus$, a hacker group linked to Russia. According to Microsoft, the group’s main objective was to gain access to sensitive information from various targets, such as government agencies, think tanks, NGOs, law firms, medical institutions, etc. The group also aimed to compromise the security and reputation of Microsoft, one of the leading technology companies in the world. The attack was part of a larger campaign that also involved the SolarWinds hack, which affected thousands of organizations in 2020.

What were the impacts of the attack?

The attack had serious impacts on the victims, both in terms of data loss and reputation damage. The data stolen by the attackers included personal and professional information, such as names, addresses, phone numbers, email addresses, passwords, bank details, credit card numbers, health records, etc. The attackers also leaked some of the data on the DarkBeam website, where they offered to sell the data to the highest bidder. This exposed the victims to potential identity theft, fraud, blackmail, extortion, or other cybercrimes. The attack also damaged the reputation of Microsoft and its customers, who were seen as vulnerable and unreliable by their partners, clients, and users. The attack also raised questions about the security and privacy of email communication, which is widely used in the digital world.

What were the consequences of the attack?

The attack had several consequences for Microsoft and its customers, who had to take urgent measures to mitigate the damage and prevent further attacks. Microsoft had to release a security patch for the vulnerability, and urge its customers to update their software as soon as possible. Microsoft also had to investigate the origin and extent of the attack, and cooperate with the authorities to identify and arrest the attackers. Microsoft also had to provide support and assistance to its customers, who had to deal with the aftermath of the attack. The customers had to check their email accounts for any signs of compromise, and change their passwords and security settings. They also had to notify their contacts, partners, and clients about the breach, and reassure them about the security of their data. They also had to monitor their online activities and accounts for any suspicious or fraudulent transactions. The attack also forced Microsoft and its customers to review and improve their security policies and practices, and adopt new solutions and technologies to protect their data and communication.

How did the attack succeed despite Microsoft’s defenses?

The attack was sophisticated and stealthy, using several techniques to bypass Microsoft’s defenses. First, the attackers exploited a zero-day vulnerability, which means that it was unknown to Microsoft and the public until it was discovered and reported. Second, the attackers used a proxy tool to disguise their origin and avoid detection. Third, the attackers used web shells to maintain persistent access to the servers and execute commands remotely. Fourth, the attackers used encryption and obfuscation to hide their malicious code and data. Fifth, the attackers targeted specific servers and accounts, rather than launching a massive attack that would have raised more suspicion.

What are the communication vulnerabilities exploited by the attack?

The attack exploited several communication vulnerabilities, such as:

  • Targeted phishing: The attackers sent fake emails to the victims, pretending to be from legitimate sources, such as Microsoft, their bank, or their employer. The emails contained malicious links or attachments, that led the victims to compromised websites or downloaded malware on their devices. The attackers then used the malware to access the email servers and accounts.
  • SolarWinds exploitation: The attackers also used the SolarWinds hack, which was a massive cyberattack that compromised the software company SolarWinds and its customers, including Microsoft. The attackers inserted a backdoor in the SolarWinds software, which allowed them to access the networks and systems of the customers who installed the software. The attackers then used the backdoor to access the email servers and accounts.
  • Brute force attack: The attackers also used a brute force attack, which is a trial-and-error method to guess the passwords or encryption keys of the email accounts. The attackers used automated tools to generate and test a large number of possible combinations, until they found the right one. The attackers then used the passwords or keys to access the email accounts.
  • SQL injection: The attackers also used a SQL injection, which is a technique to insert malicious SQL commands into a web application that interacts with a database. The attackers used the SQL commands to manipulate the database, and access or modify the data stored in it. The attackers then used the data to access the email accounts.

Why did the detection and defense systems of Microsoft Exchange not work?

The detection and defense systems of Microsoft Exchange did not work because the attackers used advanced techniques to evade them. For example, the attackers used a proxy tool to hide their IP address and location, and avoid being traced or blocked by firewalls or antivirus software. The attackers also used web shells to create a backdoor on the servers, and execute commands remotely, without being noticed by the system administrators or the security software. The attackers also used encryption and obfuscation to conceal their malicious code and data, and prevent them from being analyzed or detected by the security software. The attackers also used zero-day vulnerability, which was not known or patched by Microsoft, and therefore not protected by the security software.

How did Microsoft react to the attack?

Microsoft reacted to the attack by taking several actions, such as:

The main actions of Microsoft

  • Releasing a security patch: Microsoft released a security patch for the vulnerability exploited by the attack, and urged its customers to update their software as soon as possible. The patch fixed the vulnerability and prevented further attacks.
  • Investigating the attack: Microsoft investigated the origin and extent of the attack, and collected evidence and information about the attackers and their methods. Microsoft also cooperated with the authorities and other organizations to identify and arrest the attackers.
  • Providing support and assistance: Microsoft provided support and assistance to its customers, who were affected by the attack. Microsoft offered guidance and tools to help the customers check their email accounts for any signs of compromise, and change their passwords and security settings. Microsoft also offered free credit monitoring and identity theft protection services to the customers, who had their personal and financial data stolen by the attackers.

Microsoft also released patches for the vulnerabilities exploited by the attack

Microsoft also released patches for the other vulnerabilities exploited by the attack, such as the SolarWinds vulnerability, the brute force vulnerability, and the SQL injection vulnerability. Microsoft also improved its detection and defense systems, and added new features and functions to its software, to enhance the security and privacy of email communication.

What are the lessons to be learned from the attack?

The attack was a wake-up call for Microsoft and its customers, who had to learn from their mistakes and improve their security practices. Some of the lessons to be learned from the attack are:

Email security

Email is one of the most widely used communication tools in the digital world, but also one of the most vulnerable to cyberattacks. Therefore, it is essential to ensure the security and privacy of email communication, by applying some best practices, such as:

  • Using strong and unique passwords for each email account, and changing them regularly.
  • Using multi-factor authentication (MFA) to verify the identity of the email users, and prevent unauthorized access.
  • Using encryption to protect the content and attachments of the email messages, and prevent them from being read or modified by third parties.
  • Using digital signatures to verify the authenticity and integrity of the email messages, and prevent them from being spoofed or tampered with.
  • Using spam filters and antivirus software to block and remove malicious emails, and avoid clicking on suspicious links or attachments.
  • Using secure email providers and platforms, that comply with the latest security standards and regulations, and offer features such as end-to-end encryption, zero-knowledge encryption, or self-destructing messages.

Multi-factor authentication

Multi-factor authentication (MFA) is a security method that requires the user to provide two or more pieces of evidence to prove their identity, before accessing a system or a service. The pieces of evidence can be something the user knows (such as a password or a PIN), something the user has (such as a smartphone or a token), or something the user is (such as a fingerprint or a face scan). MFA can prevent unauthorized access to email accounts, even if the password is compromised, by adding an extra layer of security. Therefore, it is recommended to enable MFA for all email accounts, and use reliable and secure methods, such as biometric authentication, one-time passwords, or push notifications.

Principle of least privilege

The principle of least privilege (POLP) is a security concept that states that each user or system should have the minimum level of access or permissions required to perform their tasks, and nothing more. POLP can reduce the risk of data breaches, by limiting the exposure and impact of a potential attack. Therefore, it is advisable to apply POLP to email accounts, and assign different roles and privileges to different users, depending on their needs and responsibilities. For example, only authorized users should have access to sensitive or confidential information, and only administrators should have access to system settings or configuration.

Software update

Software update is a process that involves installing the latest versions or patches of the software, to fix bugs, improve performance, or add new features. Software update is crucial for email security, as it can prevent the exploitation of vulnerabilities that could allow attackers to access or compromise the email servers or accounts. Therefore, it is important to update the software regularly, and install the security patches as soon as they are available. It is also important to update the software of the devices that are used to access the email accounts, such as computers or smartphones, and use the latest versions of the browsers or the applications.

System monitoring

System monitoring is a process that involves observing and analyzing the activity and performance of the system, to detect and resolve any issues or anomalies. System monitoring is vital for email security, as it can help to identify and stop any potential attacks, before they cause any damage or disruption. Therefore, it is essential to monitor the email servers and accounts, and use tools and techniques, such as logs, alerts, reports, or audits, to collect and analyze the data. It is also essential to monitor the email traffic and behavior, and use tools and techniques, such as firewalls, intrusion detection systems, or anomaly detection systems, to filter and block any malicious or suspicious activity.

User awareness

User awareness is a state of knowledge and understanding of the users, regarding the security risks and threats that they may face, and the best practices and policies that they should follow, to protect themselves and the system. User awareness is key for email security, as it can prevent many human errors or mistakes, that could compromise the email accounts or expose the data. Therefore, it is important to educate and train the email users, and provide them with the necessary information and guidance, to help them recognize and avoid any phishing, malware, or social engineering attacks, that could target their email accounts.

What are the best practices to strengthen information security?

Information security is the practice of protecting the confidentiality, integrity, and availability of the information, from unauthorized or malicious access, use, modification, or destruction. Information security is essential for email communication, as it can ensure the protection and privacy of the data and messages that are exchanged. Some of the best practices to strengthen information security are:

  • Adopt the Zero Trust model: The Zero Trust model is a security approach that assumes that no user or system can be trusted by default, and that each request or transaction must be verified and authorized, before granting access or permission. The Zero Trust model can enhance information security, by reducing the attack surface and preventing the lateral movement of the attackers, within the system.
  • Use advanced protection solutions: Advanced protection solutions are security solutions that use artificial intelligence, machine learning, or other technologies, to detect and respond to the most sophisticated and complex cyberattacks, that could target the email accounts or data. Some of these solutions are endpoint detection and response (EDR), identity and access management (IAM), or data encryption solutions.
  • Hire cybersecurity experts: Cybersecurity experts are professionals who have the skills and knowledge to design, implement, and maintain the security of the system and the information, and to prevent, detect, and respond to any cyberattacks, that could affect the email accounts or data. Cybersecurity experts can help to strengthen information security, by providing advice, guidance, and support, to the email users and administrators.

How can Freemindtronic technology help to fight against this type of attack?

Freemindtronic offers innovative and effective technology solutions such as EviCypher NFC HSM and EviPass NFC HSM and EviOTP NFC HSM and other PGP HSMs. They can help businesses to fight against this type of attack based on Zero Day and other threats. Their technology is embedded in products such as DataShielder NFC HSM and DataShielder HSM PGP and DataShielder Defense or PassCypher NFC HSM or PassCypher HSM PGP. These products provide security and communication features for data, email and password management and offline OTP secret keys.

  • DataShielder NFC HSM is a portable device that allows to encrypt and decrypt data and communication on a computer or on an Android NFC smartphone. It uses a contactless hardware security module (HSM) that generates and stores encryption keys securely and segmented. It protects the keys that encrypt contactless communication. This has the effect of effectively fighting against all types of communication vulnerabilities, since the messages and attachments will remain encrypted even if they are corrupted. This function regardless of where the attack comes from, internal or external to the company. It is a counter-espionage solution. It also offers other features, such as password management, 2FA – OTP (TOTP and HOTP) secret keys. In addition, DataShielder works offline, without server and without database. It has a configurable multi-authentication system, strong authentication and secure key sharing.
  • DataShielder HSM PGP is an application that transforms all types of physical storage media (USB key, S, SSD, KeyChain / KeyStore) connected or not connected into HSM. It has the same features as its NFC HSM version. However, it also uses standard AES-256 and RSA 4096 algorithms, as well as OpenPGP algorithms. It uses its HSMs to manage and store PGP keys securely. In the same way, it protects email against phishing and other email threats. It also offers other features, such as digital signature, identity verification or secure key sharing.
  • DataShielder Defense is a dual-use platform for civilian and military use that offers many functions including all those previously mentioned. It also works in real time without server, without database from any type of HSM including NFC. It also has functions to add trust criteria to fight against identity theft. It protects data and communication against cyberattacks and data breaches.

In summary

To safeguard against the Microsoft Exchange attack, prioritize security updates and patches. Embrace Freemindtronic’s innovative solutions for enhanced protection. Stay vigilant against phishing and employ robust authentication methods. Opt for encryption to shield communications. Engage cybersecurity experts for advanced defense strategies. By adopting these measures, you can fortify your defenses against cyber threats and ensure your data’s safety.

Ledger Security Breaches from 2017 to 2023: How to Protect Yourself from Hackers

Ledger Security Breaches from 2017 to 2023: How to Protect Yourself from Hackers

Ledger security breaches written by Jacques Gascuel, inventor specializing in safety and security of sensitive data, for Freemindtronic. This article will be updated with any new information on the topic.


Ledger security incidents: How Hackers Exploited Them and How to Stay Safe

Ledger security breaches have exposed the personal data and private keys of many users. Ledger is a French company that provides secure devices to store and manage your funds. But since 2017, hackers have targeted Ledger’s e-commerce and marketing database, as well as its software and hardware products. In this article, you will discover the different breaches, how hackers exploited them, what their consequences were, and how you can protect yourself from these threats.


2024 Digital Security

Cyberattack Exploits Backdoors: What You Need to Know

2024 Digital Security

Google Sheets Malware: The Voldemort Threat

2024 Articles Digital Security News

Russian Espionage Hacking Tools Revealed

2024 Digital Security Spying Technical News

Side-Channel Attacks via HDMI and AI: An Emerging Threat

Ledger Security Breaches from 2017 to 2023: How to Protect Your Cryptocurrencies from Hackers

Have you ever wondered how safe your cryptocurrencies are? If you are using a Ledger device, you might think that you are protected from hackers and thieves. Ledger is a French company that specializes in cryptocurrency security. It offers devices that allow you to store and manage your funds securely. These devices are called hardware wallets, and they are designed to protect your private keys from hackers and thieves.

However, since 2017, Ledger has been victim of several security breaches, which have exposed the personal data and private keys of its users. These breaches could allow hackers to steal your cryptocurrencies or harm you in other ways. In this article, we will show you the different breaches that were discovered, how they were exploited, what their consequences were, and how you can protect yourself from these threats.

Ledger Security Issues: The Seed Phrase Recovery Attack (February 2018)

The seed phrase is a series of words that allows you to restore access to a cryptocurrency wallet. It must be kept secret and secure, as it gives full control over the funds. In February 2018, a security researcher named Saleem Rashid discovered a breach in the Ledger Nano S, which allowed an attacker with physical access to the device to recover the seed phrase using a side-channel attack.

How did hackers exploit the breach?

The attack consisted of using an oscilloscope to measure the voltage variations on the reset pin of the device. These variations reflected the operations performed by the secure processor of the Ledger Nano S, which generated the seed phrase. By analyzing these variations, the attacker could reconstruct the seed phrase and access the user’s funds.

Simplified diagram of the attack

Figure Ledger Security Issues: The Seed Phrase Recovery Attack (February 2018)
Statistics on the breach

  • Number of potentially affected users: about 1 million
  • Total amount of potentially stolen funds: unknown
  • Date of discovery of the breach by Ledger: February 20, 2018
  • Author of the discovery of the breach: Saleem Rashid, a security researcher
  • Date of publication of the fix by Ledger: April 3, 2018

Scenarios of hacker attacks

  • Scenario of physical access: The attacker needs to have physical access to the device, either by stealing it, buying it second-hand, or intercepting it during delivery. The attacker then needs to connect the device to an oscilloscope and measure the voltage variations on the reset pin. The attacker can then use a software tool to reconstruct the seed phrase from the measurements.
  • Scenario of remote access: The attacker needs to trick the user into installing a malicious software on their computer, which can communicate with the device and trigger the reset pin. The attacker then needs to capture the voltage variations remotely, either by using a wireless device or by compromising the oscilloscope. The attacker can then use a software tool to reconstruct the seed phrase from the measurements.

Sources

1Breaking the Ledger Security Model – Saleem Rashid published on March 20, 2018.

2Ledger Nano S: A Secure Hardware Wallet for Cryptocurrencies? – Saleem Rashid published on November 20, 2018.

Ledger Security Flaws: The Firmware Replacement Attack (March 2018)

The firmware is the software that controls the operation of the device. It must be digitally signed by Ledger to ensure its integrity. In March 2018, the same researcher discovered another breach in the Ledger Nano S, which allowed an attacker to replace the firmware of the device with a malicious firmware, capable of stealing the private keys or falsifying the transactions.

How did hackers exploit the Ledger Security Breaches?

The attack consisted of exploiting a vulnerability in the mechanism of verification of the firmware signature. The attacker could create a malicious firmware that passed the signature check, and that installed on the device. This malicious firmware could then send the user’s private keys to the attacker, or modify the transactions displayed on the device screen.

Simplified diagram of the attack

Figure Ledger Security Flaws: The Firmware Replacement Attack (March 2018)

Statistics on the breach

  • Number of potentially affected users: about 1 million
  • Total amount of potentially stolen funds: unknown
  • Date of discovery of the breach by Ledger: March 20, 2018
  • Author of the discovery of the breach: Saleem Rashid, a security researcher
  • Date of publication of the fix by Ledger: April 3, 2018

Scenarios of hacker attacks

  • Scenario of physical access: The attacker needs to have physical access to the device, either by stealing it, buying it second-hand, or intercepting it during delivery. The attacker then needs to connect the device to a computer and install the malicious firmware on it. The attacker can then use the device to access the user’s funds or falsify their transactions.
  • Scenario of remote access: The attacker needs to trick the user into installing the malicious firmware on their device, either by sending a fake notification, a phishing email, or a malicious link. The attacker then needs to communicate with the device and send the user’s private keys or modify their transactions.

Sources

: [Breaking the Ledger Security Model – Saleem Rashid] published on March 20, 2018.

: [Ledger Nano S Firmware 1.4.1: What’s New? – Ledger Blog] published on March 6, 2018.

Ledger Security Incidents: The Printed Circuit Board Modification Attack (November 2018)

The printed circuit board is the hardware part of the device, which contains the electronic components. It must be protected against malicious modifications, which could compromise the security of the device. In November 2018, a security researcher named Dmitry Nedospasov discovered a breach in the Ledger Nano S, which allowed an attacker with physical access to the device to modify the printed circuit board and install a listening device, capable of capturing the private keys or modifying the transactions.

How did hackers exploit the breach?

The attack consisted of removing the case of the device, and soldering a microcontroller on the printed circuit board. This microcontroller could intercept the communications between the secure processor and the non-secure processor of the Ledger Nano S, and transmit them to the attacker via a wireless connection. The attacker could then access the user’s private keys, or modify the transactions displayed on the device screen.

Simplified diagram of the attack

figure Ledger Security Incidents: The Printed Circuit Board Modification Attack (November 2018)

Statistics on the breach

  • Number of potentially affected users: unknown
  • Total amount of potentially stolen funds: unknown
  • Date of discovery of the breach by Ledger: November 7, 2019
  • Author of the discovery of the breach: Dmitry Nedospasov, a security researcher
  • Date of publication of the fix by Ledger: December 17, 2020

Scenarios of hacker attacks

  • Scenario of physical access: The attacker needs to have physical access to the device, either by stealing it, buying it second-hand, or intercepting it during delivery. The attacker then needs to remove the case of the device and solder the microcontroller on the printed circuit board. The attacker can then use the wireless connection to access the user’s funds or modify their transactions.
  • Scenario of remote access: The attacker needs to compromise the wireless connection between the device and the microcontroller, either by using a jammer, a repeater, or a hacker device. The attacker can then intercept the communications between the secure processor and the non-secure processor, and access the user’s funds or modify their transactions.

Sources

  • [Breaking the Ledger Nano X – Dmitry Nedospasov] published on November 7, 2019.
  • [How to Verify the Authenticity of Your Ledger Device – Ledger Blog] published on December 17, 2020.

Ledger Security Breaches: The Connect Kit Attack (December 2023)

The Connect Kit is a software that allows users to manage their cryptocurrencies from their computer or smartphone, by connecting to their Ledger device. It allows to check the balance, send and receive cryptocurrencies, and access services such as staking or swap.

The Connect Kit breach was discovered by the security teams of Ledger in December 2023. It was due to a vulnerability in a third-party component used by the Connect Kit. This component, called Electron, is a framework that allows to create desktop applications with web technologies. The version used by the Connect Kit was not up to date, and had a breach that allowed hackers to execute arbitrary code on the update server of the Connect Kit.

How did hackers exploit the Ledger Security Breaches?

The hackers took advantage of this breach to inject malicious code into the update server of the Connect Kit. This malicious code was intended to be downloaded and executed by the users who updated their Connect Kit software. The malicious code aimed to steal the sensitive information of the users, such as their private keys, passwords, email addresses, or phone numbers.

Simplified diagram of the attack

Figure Ledger Security Breaches The Connect Kit Attack (December 2023)

Statistics on the breach

  • Number of potentially affected users: about 10,000
  • Total amount of potentially stolen funds: unknown
  • Date of discovery of the breach by Ledger: December 14, 2023
  • Author of the discovery of the breach: Pierre Noizat, director of security at Ledger
  • Date of publication of the fix by Ledger: December 15, 2023

Scenarios of hacker attacks

  • Scenario of remote access: The hacker needs to trick the user into updating their Connect Kit software, either by sending a fake notification, a phishing email, or a malicious link. The hacker then needs to download and execute the malicious code on the user’s device, either by exploiting a vulnerability or by asking the user’s permission. The hacker can then access the user’s information or funds.
  • Scenario of keyboard: The hacker needs to install a keylogger on the user’s device, either by using the malicious code or by another means. The keylogger can record the keystrokes of the user, and send them to the hacker. The hacker can then use the user’s passwords, PIN codes, or seed phrases to access their funds.
  • Scenario of screen: The hacker needs to install a screen recorder on the user’s device, either by using the malicious code or by another means. The screen recorder can capture the screen of the user, and send it to the hacker. The hacker can then use the user’s QR codes, addresses, or transaction confirmations to steal or modify their funds.

Sources

Ledger Security Breaches: The Data Leak (December 2020)

The database is the system that stores the information of Ledger customers, such as their names, addresses, phone numbers and email addresses. It must be protected against unauthorized access, which could compromise the privacy of customers. In December 2020, Ledger revealed that a breach in its database had exposed the personal data of 292,000 customers, including 9,500 in France.

How did hackers exploit the breach?

The breach had been exploited by a hacker in June 2020, who had managed to access the database via a poorly configured API key. The hacker had then published the stolen data on an online forum, making them accessible to everyone. Ledger customers were then victims of phishing attempts, harassment, or threats from other hackers, who sought to obtain their private keys or funds.

Simplified diagram of the attack :

Statistics on the breach

  • Number of affected users: 292,000, including 9,500 in France
  • Total amount of potentially stolen funds: unknown
  • Date of discovery of the breach by Ledger: June 25, 2020
  • Author of the discovery of the breach: Ledger, after being notified by a researcher
  • Date of publication of the fix by Ledger: July 14, 2020

Scenarios of hacker attacks

  • Scenario of phishing: The hacker sends an email or a text message to the user, pretending to be Ledger or another trusted entity. The hacker asks the user to click on a link, enter their credentials, or update their device. The hacker then steals the user’s information or funds.
  • Scenario of harassment: The hacker calls or visits the user, using their personal data to intimidate them. The hacker threatens the user to reveal their identity, harm them, or steal their funds, unless they pay a ransom or give their private keys.
  • Scenario of threats: The hacker uses the user’s personal data to find their social media accounts, family members, or friends. The hacker then sends messages or posts to the user or their contacts, threatening to harm them or expose their cryptocurrency activities, unless they comply with their demands.

Sources:
– [Ledger Data Breach: A Cybersecurity Update – Ledger Blog] published on January 29, 2021.

Comparison with other crypto wallets

Ledger is not the only solution to secure your cryptocurrencies. There are other options, such as other hardware wallets, software wallets, or exchanges. Each option has its advantages and disadvantages, depending on your needs and preferences. For example, other hardware wallets, such as Trezor or Keepser, offer similar features and security levels as Ledger, but they may have different designs, interfaces, or prices. Software wallets, such as Exodus or Electrum, are more convenient and accessible, but they are less secure and more vulnerable to malware or hacking. Exchanges, such as Coinbase or Binance, are more user-friendly and offer more services, such as trading or staking, but they are more centralized and risky, as they can be hacked, shut down, or regulated. Another option is to use a cold wallet, such as SeedNFC HSM, which is a patented HSM that uses NFC technology to store and manage your cryptocurrencies offline, without any connection to the internet or a computer. It also allows you to create up to 100 cryptocurrency wallets and check the balances from this NFC HSM.

Technological, Regulatory, and Societal Projections

The future of cryptocurrency security is uncertain and challenging. Many factors can affect Ledger and its users, such as technological, regulatory, or societal changes.

Technological changes

It changes could bring new threats, such as quantum computing, which could break the encryption of Ledger devices, or new solutions, such as biometric authentication or segmented key authentication patented by Freemindtronic, which could improve the security of Ledger devices.

Regulatory changes

New rules or restrictions could affect Cold Wallet and Hardware Wallet manufacturers and users, such as Ledger. For example, KYC (Know Your Customer) or AML (Anti-Money Laundering) requirements could compromise the privacy and anonymity of Ledger users. They could also ban or limit the use of cryptocurrencies, which could reduce the demand and value of Ledger devices. On the other hand, other manufacturers who have anticipated these new legal constraints could have an advantage over Ledger. Here are some examples of regulatory changes that could affect Ledger and other crypto wallets:

  • MiCA, the proposed EU regulation on crypto-asset markets, aims to create a harmonized framework for crypto-assets and crypto-asset service providers in the EU. It also seeks to address the risks and challenges posed by crypto-assets, such as consumer protection, market integrity, financial stability and money laundering.
  • U.S. interagency report on stablecoins recommends that Congress consider new legislation to ensure that stablecoins and stablecoin arrangements are subject to a federal prudential framework. It also proposes additional features, such as limiting issuers to insured depository institutions, subjecting entities conducting stablecoin activities (e.g., digital wallets) to federal oversight, and limiting affiliations between issuers and commercial entities.
  • Revised guidance from the Financial Action Task Force (FATF) on virtual assets and virtual asset service providers (VASPs) clarifies the application of FATF standards to virtual assets and VASPs. It also introduces new obligations and recommendations for PSAVs, such as the implementation of the travel rule, licensing and registration of PSAVs, and supervision and enforcement of PSAVs.

These regulatory changes could have significant implications for Ledger and other crypto wallets. They could require them to comply with new rules and standards, to obtain new licenses or registrations, to implement new systems and processes, and to face new supervisory and enforcement actions.

Societal changes

Societal changes could influence the perception and adoption of Ledger and cryptocurrencies, such as increased awareness and education, which could increase the trust and popularity of Ledger devices, or increased competition and innovation, which could challenge the position and performance of Ledger devices. For example, the EviSeed NFC HSM technology allows the creation of up to 100 cryptocurrency wallets on 5 different blockchains chosen freely by the user.

Technological alternatives

Technological alternatives are already available, such as EviCore NFC HSM, EviCore HSM OpenPGP, EviCore NFC HSM Browser Extension and the NFC HSM devices that work without contact, developed and manufactured by Freemindtronic in Andorra. These are new cyber security and safety technologies that use HSMs with or without NFC. They offer a wide range of security features to manage your cryptocurrencies and other digital assets. These technologies also offer the hardware management of complex and complicated passwords by EviPass NFC HSM, OTP (2FA) keys by EviOTP NFC HSM, Seed Phrases by EviSeed NFC HSM, and the creation of multiple cryptocurrency wallets on the same device.

Conclusion

Ledger, the French leader in cryptocurrency security, has faced several security breaches since 2017. As a result of these breaches, hackers could steal the private keys and funds of Ledger users. In response to these threats, Ledger reacted by publishing security updates, informing its users, and strengthening its protection measures. However, Ledger users must be vigilant and follow the recommendations of Ledger to protect themselves from these attacks. Despite these challenges, Ledger remains a reliable and secure device to manage cryptocurrencies, as long as the best practices of digital hygiene are respected. If you want to learn more about Ledger and its products, you can visit their official website or read their blog. Additionally, you can also check their security reports and their help center for more information.

Dual-Use Encryption Products: a regulated trade for security and human rights

Dual-Use encryption products a regulated trade for security and human rights by Freemindtronic-from Andorra

Dual-use encryption products by Jacques Gascuel: This article will be updated with any new information on the topic.


Dual-use encryption products: a challenge for security and human rights

Encryption is a technique that protects data and communications. Encryption products are dual-use goods, which can have civilian and military uses. The export of these products is controlled by the EU and the international community, to prevent their misuse or diversion. This article explains the EU regime for the export of dual-use encryption products, and how it has been updated.


2024 Cyberculture

Electronic Warfare in Military Intelligence

2024 Articles Cyberculture Legal information

ANSSI Cryptography Authorization: Complete Declaration Guide

2024 Articles Cyberculture

EAN Code Andorra: Why It Shares Spain’s 84 Code

The international regulations on dual-use encryption products

The main international regulations that apply to dual-use encryption products are the Wassenaar Arrangement and the EU regime for the control of exports of dual-use goods.

The Wassenaar Arrangement

The Wassenaar Arrangement is a multilateral export control regime that aims to contribute to regional and international security and stability. It promotes transparency and responsibility in the transfers of conventional arms and dual-use goods and technologies. It was established in 1996 and currently has 42 participating states, including the United States, Canada, Japan, Australia, Russia, China and most of the EU member states.

The Wassenaar Arrangement maintains a list of dual-use goods and technologies that are subject to export control by the participating states. The list is divided into 10 categories, with subcategories and items. Category 5, part 2, covers information security, including encryption products. The list of encryption products includes, among others, the following items:

  • Cryptographic systems, equipment, components and software, using symmetric or asymmetric algorithms, with a key length exceeding 56 bits for symmetric algorithms or 512 bits for asymmetric algorithms, or specially designed for military or intelligence use.
  • Cryptanalytic systems, equipment, components and software, capable of recovering the plain text from the encrypted text, or of finding cryptographic keys or algorithms.
  • Cryptographic development systems, equipment, components and software, capable of generating, testing, modifying or evaluating cryptographic algorithms, keys or systems.
  • Non-cryptographic information security systems, equipment, components and software, using techniques such as steganography, watermarking, tamper resistance or authentication.
  • Technology for the development, production or use of the above items.

The participating states of the Wassenaar Arrangement are required to implement national export controls on the items listed in the arrangement, and to report annually their exports and denials of such items. However, the arrangement does not impose binding obligations on the participating states, and each state is free to decide whether to grant or refuse an export license, based on its own policies and national interests.

The EU regime for the control of exports of dual-use goods

The common legal framework of the EU for dual-use goods

The EU regime for the control of exports of dual-use goods is a common legal framework. It applies to all EU member states, and it has two main goals. First, it aims to ensure a consistent and effective implementation of the international obligations of export control. Second, it aims to protect the security and human rights of the EU and its partners. The regime is based on the Regulation (EU) 2021/821, which was adopted in May 2021 and entered into force in September 2021. This regulation replaces the previous Regulation (EC) No 428/2009.

The Regulation (EU) 2021/821: the principles and criteria of export control

The Regulation (EU) 2021/821 establishes a Union list of dual-use goods. These are goods that can have both civilian and military uses, such as software, equipment and technology. These goods are subject to an export authorization, which means that exporters need to obtain a permission from the competent authorities before exporting them. The Regulation also sets out a set of general principles and criteria for granting or refusing such authorization. The Union list of dual-use goods is based on the international export control regimes, including the Wassenaar Arrangement. It covers the same categories and items as the latter. However, the EU list also includes some additional items that are not covered by the international regimes. These are cyber-surveillance items that can be used for internal repression or human rights violations.

The Union list of dual-use goods: the categories and items subject to an export authorization

The Union list of dual-use goods consists of ten categories, which are:

  • Category 0: Nuclear materials, facilities and equipment
  • Category 1: Materials, chemicals, micro-organisms and toxins
  • Category 2: Materials processing
  • Category 3: Electronics
  • Category 4: Computers
  • Category 5: Telecommunications and information security
  • Category 6: Sensors and lasers
  • Category 7: Navigation and avionics
  • Category 8: Marine
  • Category 9: Aerospace and propulsion

Each category contains a number of items, which are identified by a code and a description. For example, the item 5A002 is “Information security systems, equipment and components”. The items are further divided into sub-items, which are identified by a letter and a number. For example, the sub-item 5A002.a.1 is “Cryptographic activation equipment or software designed or modified to activate cryptographic capability”.

The novelties of the Regulation (EU) 2021/821: the due diligence obligation, the catch-all clause, the human security approach and the transparency and information exchange mechanism

The Regulation (EU) 2021/821 also provides for different types of export authorizations. These are individual, global, general or ad hoc authorizations, depending on the nature, destination and end-use of the items. Moreover, the Regulation introduces some novelties, such as:

  • A due diligence obligation for exporters. This means that exporters have to verify the end-use and the end-user of the items, and to report any suspicious or irregular transaction.
  • A catch-all clause. This allows the competent authorities to impose an export authorization on items that are not listed, but that can be used for weapons of mass destruction, a military end-use, human rights violations or terrorism.
  • A human security approach. This requires the competent authorities to take into account the potential impact of the items on human rights, international humanitarian law, regional stability and sustainable development, especially for cyber-surveillance items.
  • A transparency and information exchange mechanism. This requires the competent authorities to share information on the authorizations, denials and consultations of export, and to publish annual reports on their export control activities.

The dual-use encryption products: sensitive goods for security and human rights

The dual-use encryption products are a specific type of dual-use goods that fall under the category 5 of the Union list. These are products that use cryptographic techniques to protect the confidentiality, integrity and authenticity of data and communications. These products can have both civilian and military uses, and they raise important issues for security and human rights.

The dual-use encryption products: a definition and examples

The dual-use encryption products are defined by the Regulation (EU) 2021/821 as “information security systems, equipment and components, and ‘software’ and ‘technology’ therefor, which use ‘cryptography’ or cryptanalytic functions”. The Regulation also provides a list of examples of such products, such as:

  • Cryptographic activation equipment or software
  • Cryptographic equipment for mobile cellular systems
  • Cryptographic equipment for radio communication systems
  • Cryptographic equipment for computer and network security
  • Cryptanalytic equipment and software
  • Quantum cryptography equipment and software

The dual-use encryption products: security issues

The dual-use encryption products can have a significant impact on the security of the EU and its partners. On the one hand, these products can enhance the security of the EU and its allies, by protecting their sensitive data and communications from unauthorized access, interception or manipulation. On the other hand, these products can also pose a threat to the security of the EU and its adversaries, by enabling the encryption of malicious or illegal activities, such as terrorism, espionage or cyberattacks. Therefore, the export of these products needs to be carefully controlled, to prevent their misuse or diversion to undesirable end-users or end-uses.

The dual-use encryption products: human rights issues

The dual-use encryption products can also have a significant impact on the human rights of the EU and its partners. On the one hand, these products can protect the human rights of the EU and its citizens, by safeguarding their privacy and freedom of expression on the internet. On the other hand, these products can also violate the human rights of the EU and its partners, by enabling the repression or surveillance of dissidents, activists or journalists by authoritarian regimes or non-state actors. Therefore, the export of these products needs to take into account the potential consequences of the items on human rights, international humanitarian law, regional stability and sustainable development, especially for cyber-surveillance items.

The modification of the Union list of dual-use goods by the Delegated Regulation (EU) 2022/1

The Union list of dual-use goods is not static, but dynamic. It is regularly updated to reflect the changes in the technological development and the international security environment. The latest update of the list was made by the Delegated Regulation (EU) 2022/1 of the Commission of 20 October 2021, which modifies the Regulation (EU) 2021/821.

The changes made by the international export control regimes in 2020 and 2021

The Delegated Regulation (EU) 2022/1 reflects the changes made by the international export control regimes in 2020 and 2021. These are the Wassenaar Arrangement, the Nuclear Suppliers Group, the Australia Group and the Missile Technology Control Regime. These regimes are voluntary and informal arrangements of states that coordinate their national export control policies on dual-use goods. The EU is a member of these regimes, and it aligns its Union list of dual-use goods with their lists of controlled items. The changes made by these regimes include the addition, deletion or modification of some items, as well as the clarification or simplification of some definitions or technical parameters.

The new items added to the Union list of dual-use goods: the quantum technologies, the drones and the facial recognition systems or biometric identification systems

The Delegated Regulation (EU) 2022/1 also adds some new items to the Union list of dual-use goods. These are items that are not covered by the international export control regimes, but that are considered to be sensitive for the security and human rights of the EU and its partners. These items include:

  • Certain types of software and technology for the development, production or use of quantum computers or quantum cryptography. These are devices or techniques that use the principles of quantum physics to perform computations or communications that are faster or more secure than conventional methods.
  • Certain types of equipment, software and technology for the development, production or use of unmanned aerial vehicles (UAVs) or drones. These are aircraft or systems that can fly without a human pilot on board, and that can be used for various purposes, such as surveillance, reconnaissance, delivery or attack.
  • Certain types of equipment, software and technology for the development, production or use of facial recognition systems or biometric identification systems. These are systems or techniques that can identify or verify the identity of a person based on their facial features or other biological characteristics, such as fingerprints, iris or voice.

The entry into force and application of the Delegated Regulation (EU) 2022/1

The Delegated Regulation (EU) 2022/1 entered into force on 7 January 2022. It applies to all exports of dual-use goods from the EU from that date. The exporters of dual-use goods need to be aware of the changes and updates to the Union list of dual-use goods, and to comply with the export control rules and procedures established by the Regulation (EU) 2021/821. The competent authorities of the member states need to implement and enforce the new Union list of dual-use goods, and to cooperate and coordinate with each other and with the Commission. The Commission needs to monitor and evaluate the impact and effectiveness of the new Union list of dual-use goods, and to report to the European Parliament and the Council.

The national regulations on dual-use encryption products

How some countries have their own rules on dual-use encryption products

The case of the United States

Some countries have their own national regulations on dual-use encryption products, which may differ or complement the existing regimes. For example, the United States has a complex and strict export control system, based on the Export Administration Regulations (EAR). The EAR classify encryption products under category 5, part 2, of the Commerce Control List (CCL). The EAR require an export license for most encryption products, except for some exceptions, such as mass market products, publicly available products, or products intended for certain countries or end-users. The EAR also require that exporters submit annual self-classification reports, semi-annual sales reports, and encryption review requests for certain products.

The case of Andorra

Andorra is a small country between France and Spain. It is not an EU member, but it has a customs union with it. However, this customs union does not cover all products. It only covers those belonging to chapters 25 to 97 of the Harmonized System (HS), which are mainly industrial products. Agricultural products and products belonging to chapters 1 to 24 of the HS are free of import duties in the EU. But they are subject to the most-favored-nation (MFN) treatment in Andorra.

Andorra has adopted the EU list of dual-use goods. It requires an export or transfer authorization for these goods, according to the Regulation (EU) 2021/821. This regulation came into force on 9 September 2021 and replaced the previous Regulation (EC) No 428/2009. Andorra has also adopted the necessary customs provisions for the proper functioning of the customs union with the EU. These provisions are based on the Community Customs Code and its implementing provisions, by the Decision No 1/2003 of the Customs Cooperation Committee.

Andorra applies the EU regulation, as it is part of the internal market. Moreover, Andorra has adopted the Delegated Regulation (EU) 2022/1 of the Commission of 20 October 2021, which modifies the EU list of dual-use goods. This modification reflects the changes made by the international export control regimes in 2020 and 2021. It also adds some new items, such as software and technologies for quantum computing, drones or facial recognition. The Delegated Regulation (EU) 2022/1 came into force on 7 January 2022, and applies to all exports of dual-use goods from the EU from that date.

Andorra entered the security and defense sector for the first time by participating in Eurosatory 2022. This is the international reference exhibition for land and airland defense and security. Andorra became the 96th country with a security and defense industry on its territory. Among the exhibitors, an Andorran company, Freemindtronic, specialized in counter-espionage solutions, presented innovative products. For example, DataShielder Defense NFC HSM, a device to protect sensitive data against physical and logical attacks. It uses technologies such as EviCypher NFC HSM and EviCore NFC HSM, contactless hardware security modules (NFC HSM). The president of Coges events, a subsidiary of GICAT, identified these products as dual-use and military products. They need an export or transfer authorization, according to the Regulation (EU) 2021/821. Freemindtronic also showed its other security solutions, such as EviKey NFC HSM, a secure USB key, a security token. These products were displayed in the Discover Village, a space for start-ups and SMEs innovations.

Switzerland

Switzerland is not an EU member, but it has a free trade agreement with it. Switzerland has adopted the Regulation (EU) 2021/821 by the Ordinance of 5 May 2021 on the control of dual-use goods. Switzerland applies the EU list of dual-use goods and requires an export or transfer authorization for these goods, according to the Regulation (EU) 2021/821. Switzerland has also adopted the Delegated Regulation (EU) 2022/1 of the Commission of 20 October 2021, which modifies the EU list of dual-use goods.

Turkey

Turkey is not an EU member, but it has a customs union with it. Turkey has adopted the Regulation (EU) 2021/821 by the Presidential Decree No 3990 of 9 September 2021 on the control of exports of dual-use goods. Turkey applies the EU list of dual-use goods and requires an export or transfer authorization for these goods, according to the Regulation (EU) 2021/821. Turkey has also adopted the Delegated Regulation (EU) 2022/1 of the Commission of 20 October 2021, which modifies the EU list of dual-use goods.

United Kingdom

The United Kingdom left the EU on 31 January 2020. It has adopted the Regulation (EU) 2021/821 by the Dual-Use Items (Export Control) Regulations 2021, which came into force on 9 September 2021. The United Kingdom applies the EU list of dual-use goods and requires an export or transfer authorization for these goods, according to the Regulation (EU) 2021/821. The United Kingdom has also adopted the Delegated Regulation (EU) 2022/1 of the Commission of 20 October 2021, which modifies the EU list of dual-use goods.

The challenges and opportunities for the exporters of dual-use encryption products

The exporters of dual-use encryption products face several challenges and opportunities in the current context of export control regulations. Among the challenges, we can mention:

  • The complexity and diversity of the regulations, which may vary depending on the countries, the products, the destinations and the end-uses, and which require a deep knowledge and a constant monitoring from the exporters.
  • The costs and delays related to the administrative procedures, which can be high and unpredictable, and which can affect the competitiveness and profitability of the exporters, especially for small and medium enterprises (SMEs).
  • The legal and reputational risks, which can result from an involuntary or intentional violation of the regulations, or from a misuse or diversion of the products by the end-users, and which can lead to sanctions, prosecutions or damages to the image of the exporters.

Among the opportunities, we can mention:

  • The growing demand and innovation for encryption products, which are increasingly used in many sectors and domains, such as finance, health, education, defense, security, human rights, etc.
  • The contribution to the security and human rights of the exporters, their customers and the general public, by enabling the protection of data, privacy, freedom of expression, access to information and democratic participation, thanks to encryption products.
  • The cooperation with the competent authorities, the civil society and the international community, to ensure the compliance and accountability of the exporters, and to support the development and implementation of effective and balanced encryption policies and regulations, that respect the security and human rights of all stakeholders.

Conclusion

Dual-use encryption products can have both civil and military uses. They are subject to export control regulations at different levels: international, regional and national. These regulations aim to prevent the risks that these products can pose for security and human rights. At the same time, they allow the development and trade of these products. Therefore, the exporters of dual-use encryption products must comply with the regulations that apply to their products. They must also assess the impact of their products on security and human rights. The exporters of dual-use encryption products can benefit from the demand and innovation for these products. These products are essential for the digital economy and society. They can also enhance the security and human rights of the exporters, their customers and the public.

Freemindtronic Andorra is a company that specializes in dual-use encryption products. It offers secure and innovative solutions for data, communication and transaction protection. Freemindtronic Andorra respects the export control regulations that apply to its products. It is also committed to promoting and supporting the responsible and lawful use of its products. It follows the principles of security and human rights. Freemindtronic Andorra cooperates with the authorities, the civil society and the international community. It ensures the transparency and accountability of its activities. It also participates in the development and implementation of effective and balanced encryption policies and regulations. It respects the interests and needs of all stakeholders.

NFC Business Cards with Cardokey free for life: How to Connect without Revealing

Cardokey NFC vCard Business: Edit, Read, and Import Contacts Seamlessly on iPhone.

NFC Business Cards with Cardokey by Jacques Gascuel: This article will be updated with any new information on the topic.


How to Create NFC Business Cards with Cardokey

Do you want to create your contact information in a simple, fast and eco-friendly way? Do you want to use NFC technology without spending a fortune or compromising your privacy? Then you need to read this article about Cardokey, the app that’s revolutionizing NFC business cards.


2024 Articles Cardokey EviSwap NFC NDEF Technology GreenTech Technical News

NFC vCard Cardokey: Revolutionizing Digital Networking

2023 Articles Cardokey Eco-friendly EviSwap NFC NDEF Technology GreenTech

NFC Business Cards with Cardokey free for life: How to Connect without Revealing

2023 Articles Cyberculture Eco-friendly Electronics GreenTech Technologies

The first wood transistor for green electronics

Eco-friendly GreenTech

Hardware secrets manager Eco-friendly

NFC Business Cards: Create your NFC vCard with Cardokey, the Eco-Friendly and Secure NFC App

Are you looking for an eco-friendly way to create contactless business cards? Do you want to benefit from affordable NFC technology and prioritize privacy? You’ll love Cardokey – the app revolutionizing NFC business cards! Cardokey, the NFC business card that connects you while protecting your privacy.

What is Cardokey and how does it work?

Cardokey: Free App for Eco-Friendly NFC Business Cards

You can easily and free create and share your business cards, your social network links or links to your favorite sites for life. Recycle any NFC Tag, NFC Ticket, NFC Sticker or NFC card allowing the use of the NDEF format.
Use of the free Cardokey application is completely anonymous and does not ask for any personal or professional information. You therefore do not need to create an account or identify yourself to use Cardokey.

Cardokey: a compliant and sustainable solution

Cardokey adheres to various standards like ISO/IEC 7816-4, ISO/IEC 14443, NFC Forum Type 2, ISO/IEC 18092, and ISO/IEC 15693 without compromising your privacy or security. It also complies with international data protection laws such as GDPR, PIPEDA, CCPA, and more.

Cardokey is an eco-designed solution that contributes to the UN Goal 12. Consequently, it complies with international standards for eco-responsible practices, circular and solidarity economy, sustainable economy and carbon footprint reduction.

Cardokey: a compatible and versatile app

NFC business cards created with Cardokey are compatible with all NFC phones, Android and iPhone. The application works in real time, offline, without a database, including in airplane mode. This means that you can modify the information contained in the memory of your NFC media at any time. The app also allows you to format any NFC Media to NDEF format and also erase almost all types of NFC chips.

Cardokey: a simple and fast way to share your contact information

Digital business cards created with Cardokey can be shared in seconds. In fact, your interlocutor does not need to download a specific application in order to be able to read the information you wish to share. All he has to do is place the digital business card under his phone equipped with NFC technology to see the information.

How to create an NFC business card with Cardokey that fits the memory size of your NFC media?

The intelligent system of Cardokey

One of the most interesting features of Cardokey is the automatic management of the memory size of forms. The contact form indicates in real time the actual occupancy of the NDEF memory based on the number of characters. The Cardokey user knows the type of vCard information. He can store it according to the memory size. The memory size depends on the NFC media.

The different types of NFC Media and their memory size

It is possible to make a vCard with a minimum of name, surname and email information for a very small NFC memory4. For example, on an NTAG Nano, which has a capacity of 160 bytes and can store NDEF messages of up to 128 bytes, one can store basic information like a person’s name, surname, phone number, and email address.

Or, more complete information can be stored on a ST25TV02K chip, which has a capacity of 256 bytes and can store NDEF messages of up to 224 bytes. In this case, one can include a person’s name, surname, title, organization, phone number, email address, and postal address.

The steps to create an NFC business card with Cardokey

You can create NFC business cards that fit the memory size of your media without losing information. This allows you to optimize the use of your NFC Media and take advantage of their full capabilities.

To create NFC business cards that fit the memory size of your media, simply follow these steps:

  • Open the Cardokey app and choose the type of content you want to create (business card, URL link, social media link).
  • Enter the information you want to share in the contact form. The form tells you in real time how much memory your data is occupying and how much memory is available on your media.
  • Hover your smartphone to the NFC media of your choice. The app writes the data to the NFC media and confirms that the NFC business card has been created successfully.
  • Test your NFC business card by scanning it with your smartphone or another NFC phone. You’ll see the information you’ve shared on the screen.

That’s it, you’ve created an NFC business card adapted to the memory size of your media, thanks to Cardokey’s automatic form memory size management feature

What are the benefits of NFC business cards with Cardokey?

Cardokey is free and anonymous

Cardokey is a free app that lets you create NFC vCard business cards easily. You can create as many NFC business cards as you want, without paying any fees or signing up for any subscriptions. Moreover, Cardokey is completely anonymous and does not ask for any personal or professional information from the user. You don’t need to create an account or fill in any data. Everything works offline, in real-time, without a database.

Cardokey is easy to use

Cardokey is very easy to use, with one-click installation and operation. You don’t need any technical knowledge or specific hardware to create your NFC business cards. All you have to do is download the app on your smartphone, choose the type of content you want to create, enter the information you want to share, and swipe your smartphone on the NFC media of your choice. And there you have it, your NFC business card is ready! Furthermore, Cardokey features an intelligent system that optimizes the NDEF memory management of NFC media. This provides an optimal user experience.

How Cardokey protects your data with EviSwap NFC NDEF technology

The innovative features of EviSwap NFC NDEF technology

Cardokey uses EviSwap NFC NDEF technology by Freemindtronic for cybersecurity. This is an innovative technology that lets you create and share digital contacts contactless for life. With a simple click, you can create NFC business cards on any NFC media, whether it is disposable or not. You can give a new use to NFC tickets, cards, labels, and tags. You can also rewrite your NFC business cards at least a million times without any risk of error. You can use them for more than 40 years without needing a power source.

The standard and secure format of EviSwap NFC NDEF technology

EviSwap NFC NDEF technology is a technology that uses NFC to facilitate data exchange by implementing the NDEF NFC standard. NDEF stands for NFC Data Exchange Format. It is a standardized format that contains structured data, such as contacts, links, texts, images, etc. NDEF files are compatible with most computer and phone terminals, which can read and write them directly on the NFC memory. EviSwap NFC NDEF technology is especially used by Freemindtronic to exchange encrypted data from human to human from an NFC media, ensuring data security and privacy.

The performance and durability of EviSwap NFC NDEF technology for industrial chips

EviSwap NFC NDEF technology is also compatible with all NFC NDEF media, but it has the advantage of being optimized for Freemindtronic’s NFC HSM industrial chips. These chips can operate in a wide range of temperatures, from -40°C to +85°C. They can withstand harsh environments and resist shocks, vibrations, and water. They are ideal for applications that require reliability and robustness, such as logistics, manufacturing, or security. Moreover, EviSwap NFC NDEF technology is optimized to exchange the largest quantity of information stored in a large NFC memory. For example, it is possible to store NDEF messages of up to 7.9 kilobytes on an M24LR64E-R chip, which has a capacity of 8 kilobytes. In this case, one can add all types of vCard data as well as security keys, digital signature keys and other custom data.

Cardokey: the anonymous and reusable solution for creating NFC business cards

Cardokey is a secure and reusable solution. The Cardokey app works anonymously. It is not connected to a remote service. It does not store in the phone the data. It does not ask you for any information about the user. Finally, it works in real time in Air Gap Network Security . The EviSwap technology also includes an intelligent system to optimize the memory management of NFC media. The goal is to improve the user experience. The intelligent system informs the user in real time of the limits imposed by the maximum size of the NDEF memory available in the media. This allows you to easily store data according to the memory size.

Cardokey, an eco-friendly application

Cardokey isn’t just a universal app for people worldwide; it’s also eco-friendly, allowing you to recycle NFC media and reduce their environmental impact.

How Cardokey recycles NFC Media

NFC media, such as tags, cards or bracelets, are made of several elements and materials, such as PET (polyethylene terephthalate), aluminum or copper for the antenna, a silicon NFC chip, gold or other metals, and an adhesive. These materials are not all easily recyclable, and can cause pollution or waste problems. For example, PET is a common plastic, that is used in many consumer products, like water bottles or packaging. Although PET is recyclable, when it is used in large quantities and in the form of an NFC tag, it is hard to separate PET from other components for recycling, and it tends to clog the treatment filters. Moreover, the metal of an NFC antenna is difficult to recover and recycle. Finally, the NFC chip itself contains precious metals, that are often lost during the recycling process.

To avoid these problems, Cardokey offers an innovative and ecological solution: it allows you to recycle NFC media by reusing them to create new NFC business cards. Instead of throwing away your old NFC tags, cards or bracelets, you can transform them into NFC business cards with Cardokey, and give them a new life. You can also use existing NFC media, such as transport tickets, or access badges, and convert them into NFC business cards with Cardokey. You can thus enjoy all the benefits of NFC technology, without generating additional waste.

How Cardokey works with different types of NFC chips

Cardokey recycles all types of NFC chips (1, 2, 3, 4 and 5), regardless of ISO standards (14443, 15693, 18092). It detects chip types and adjusts accordingly for maximum compatibility. For example, Cardokey can read and write to NFC chips that have enough memory to store information, such as NTAG, MIFARE or ICODE chips. However, Cardokey will not be able to format, erase or modify NFC chips that are permanently locked.

How Cardokey helps you create personalized NFC business cards

By using Cardokey, you can recycle NFC media and turn them into personalized NFC business cards, that contain the information you want to share, such as your name, company, title, website, email, phone number, and more. You can also create URL links to documents or presentations that are useful for your business, such as quotes, contracts, portfolios, and more. You can also create pre-configured links to your favorite social networks, such as Deviantart, Discord, Facebook, Flickr, GitHub, ICQ, Instagram, LinkedIn, Mastodon, Medium, Pinterest, Reddit, Skype, Slack, Snapchat, SoundCloud, Spotify, Steam, Telegram, TikTok, Tumblr, Twitch, Twitter, VKontakte, WeChat, WhatsApp, YouTube, etc. Finally, you can manage your data and contacts in the NFC card, edit or delete them at any time, and view them on your phone or card.

How Cardokey contributes to the preservation of the planet

If we consider the 14 languages ​​available in the Cardokey application, this represents more than 3.7 billion potential users. These potential users can each recycle 10 NFC media each year. This represents 37 billion NFC supports annually. This reduces the environmental impact of NFC and helps preserve the planet.

How Cardokey is eco-friendly and compliant

Cardokey is an eco-designed solution that contributes to the UN Goal 12. This goal aims to ensure sustainable consumption and production patterns. It complies with ISO 14001, Basel and WEEE standards. It also follows international standards for eco-responsible practices, circular and solidarity economy, sustainable economy and carbon footprint reduction. In addition, Cardokey complies with various standards and regulations. These include ISO/IEC 7816-4, ISO/IEC 14443, NFC Forum Type 2, ISO/IEC 18092 and ISO/IEC 15693. It also follows international law rules on the protection of private and professional data. These include the General Data Protection Regulation (GDPR), the Personal Information Protection and Electronic Documents Act (PIPEDA), the California Consumer Privacy Act (CCPA), and others.

Unlike other NFC business card solutions, which are often paid, limited, complex or not very environmentally friendly, Cardokey offers you a free, unlimited, simple and eco-designed solution.

Cardokey therefore offers you an innovative and ecological solution to create NFC business cards that look like you and that suit your needs. Thanks to its recycling feature, you can also reuse NFC media and turn them into personalized NFC business cards.

Cardokey: a universal app

Cardokey is designed to let you create and manage your NFC business cards in a simple and efficient way. But did you know that Cardokey is also a universal app, which can be used by people from all over the world, regardless of their language?
Indeed, Cardokey is available in 14 languages: Arabic, Catalan, Chinese, English, French, German, Hindi, Italian, Japanese, Portuguese, Romanian, Russian, Spanish, and Ukrainian. This represents more than 86.02% of the languages spoken in the world, and more than 3.7 billion people who can use the app in their native language or in a language they master.

Moreover, Cardokey automatically adapts to the language of the phone where it is installed. If the user changes the language of their phone, Cardokey will do the same. Thus, you can create and manage your NFC business cards in the language of your choice, and enjoy all the features of the app.

You can also choose to share your information in multiple languages, by creating different profiles for each language. For example, you can have a profile in French for your French-speaking contacts, a profile in English for your English-speaking contacts, and a profile in Chinese for your Chinese contacts.

Cardokey offers you great flexibility and creativity to create NFC business cards that suit you and your needs.

How NFC vCards work

NFC stands for Near Field Communication. It is a technology that allows two media to communicate with each other when they are close to each other. NFC business cards with Cardokey use this technology to share your contact information in a simple and fast way.

An NFC tag is a media that contains a tiny electronic chip that can store and exchange data. It can have different shapes, such as stickers, keychains or physical cards. When you bring your smartphone near an NFC tag, the data associated with the tag appears automatically on your screen.

NFC vCard business cards with Cardokey are a great alternative to paper business cards, which are often thrown away, lost or outdated. They are eco-friendly, reusable and updated. They also save you time and money, as you don’t need to print or carry them. Moreover, they are more secure and anonymous, as you don’t need to share your personal data or connect to the Internet to use them.

What are the features of Cardokey NFC vCard business cards?

Cardokey offers many features that allow you to create and manage your NFC digital business cards. Here’s a table that summarizes Cardokey’s features:

Function Available
Create a vCard (contact) taking into account the available space ✔️
Create an NDEF NFC Vcard (Manually) ✔️
Create a vCard from an existing contact in the phone ✔️
Modify any existing NFC vCard created by other paid or free apps to make it easier to recycle and update them ✔️
Delete data stored in the NDEF of an NFC media ✔️
Format all types of NFC media to add NDEF compatibility ✔️
Create and store in the NDEF memory of any existing NFC media: your pre-configured links for social networks, the url of your choice, a vCard contact ✔️
Data management in the NFC Media: Create, Read, Update, Delete (CRUD) ✔️
Explanation of each pcictogram and its feature in the application ✔️
Show contact on phone and NFC Media ✔️
Automatic management of the memory size of the NFC card ✔️
Translation into 14 languages: CA, FR, EN, UK, ES, DE, IT, PT, RO, RU, AR, HI, ZH,JP ✔️
Information de contact de Freemindtronic ✔️
Information about the publisher of the Freemindtronic software ✔️
Direct link on the play store to buy the Cardokey Pro version and NFC Medial ✔️
Cardokey is a recycling solution for all types of disposable or non-disposable NFC Media ✔️

 

With these features, you can create a custom NFC business card, which contains the information you want to share, such as your name, company, title, website, email, phone number, and more. You can also create URL links to documents or presentations that are useful for your business, such as quotes, contracts, portfolios, and more. You can also create pre-configured links to your favorite social networks, such as Deviantart, Discord, Facebook, Flickr, GitHub, ICQ, Instagram, LinkedIn, Mastodon, Medium, Pinterest, Reddit, Skype, Slack, Snapchat, SoundCloud, Spotify, Steam, Telegram, TikTok, Tumblr, Twitch, Twitter, VKontakte, WeChat, WhatsApp, YouTube, etc. Finally, you can manage your data and contacts in the NFC card, edit or delete them at any time, and view them on your phone or card. These features give you a lot of freedom and creativity to create NFC business cards that look and match you.

What are the use cases for NFC business cards with Cardokey?

There are many of them, whether for business or personal needs. Here are some examples of use cases:

Andorra: keep in memory a special event

During the winter, a family visits Andorra’s Granvalira for their child’s first ski lesson and to experience their first snowflake, star, etc. The family keeps the NFC ski ticket formatted in NDEF format. Then, they save a URL that links to a page with all the photos and videos of this event. The ski ticket has become a souvenir object that will be kept for several years. In this case, Cardokey allows you to create an NFC business card with a URL that links to a page where there are all the photos, videos of this event.

Exhibitor: a connected poster with NFC tags

At a booth event, Marius uses self-adhesive NFC tags that they stick behind a poster holder advertising their products with a URL link that directs the visitor to their product information on the poster. The exhibitor can change the poster of his support with Cardokey. He can put a new poster and change the URL link of his new poster. This way, the exhibitor makes a simple poster a connected poster. In this case, Cardokey allows you to create an NFC business card with a URL link that directs the visitor to your product information on the poster.

Goodies: Offer NFC business cards

During a trade show, Mary offers her visitors NFC business cards with her brand as goodies. This allows her to make herself known and retain the loyalty of his potential clients, who will be able to scan her NFC business card with their smartphone to access her website, her LinkedIn profile, her portfolio, etc. Mary can purchase her NFC media from any NFC media e-commerce site or order from Cardokey NFC Cards with an extremely long lifespan of up to 1 million writes and 40 years of vCard retention NFC or URL or network link. In this case, Cardokey allows you to create an NFC vCard with all of Mary’s contact details to offer to her visitors.

Tourist: NFC business cards in different languages

While traveling abroad, Tao uses Cardokey to create his NFC business card with his contact details in his native language. This allows him to easily introduce himself to the people he meets. In fact, they will be able to scan his vcard with their smartphone to see the information translated into their language. He can also use Cardokey to save URL links to websites or applications useful for his trip, such as tourist guides, maps, booking services, etc. In this case, Cardokey allows you to create an NFC business card with your contact details in your native language.

Family: An NFC business card collecting memories

During a family reunion, a family member uses Cardokey to store links to photos and memories on NFC media. Before leaving each other, everyone takes their NFC media. Later, they will be able to relive their life moments with their loved ones, who will simply scan the NFC vcards with their smartphone to view their images, videos, messages, etc. They will also be able to use Cardokey to create URL links to websites or applications that are important to them, such as associations, causes, passions, etc. In this case, Cardokey allows you to create an NFC business card with your photos and memories.

How to download and install Cardokey?

To use Cardokey, you need an NFC-enabled smartphone, i.e. one that has an NFC chip and can read and write NFC data. Most recent smartphones are NFC-enabled, but you can check your smartphone’s compatibility on the Cardokey website.

Cardokey is available in 14 languages (Arabic, Catalan, Chinese, German, English, French, Hindi, Italian, Japanese, Portuguese, Romanian, Russian, Ukrainian). You can download it in any country that accepts the Google play store or app store platform.

To download and install Cardokey on your smartphone, all you need to do is follow these steps:

  • Go to the Google Play Store or App Store and search for “Cardokey”.
  • Select the app and click “Install”.
  • Open the app and agree to the terms of use.
  • Start creating your NFC business cards!

If you are interested in Cardokey, feel free to download it now by clicking on the following link:

In short

Cardokey is a free, user-friendly, eco-conscious app compliant with global privacy and data protection laws. It allows you to create NFC vCard business cards for all Android and iPhone NFC phones. It also lets you reuse and customize NFC media.

Cardokey is the NFC business card that connects you without revealing you. It lets you exchange your contact details without contact and without paper. It offers you a free, unlimited, simple and eco-designed solution.

Definition of technical terms:

  • NFC (Near Field Communication): a technology that allows two devices to communicate with each other when they are close to each other.
  • NDEF (NFC Data Exchange Format): a standard format for storing and exchanging data on NFC media.
  • vCard: a digital format for storing and sharing contact information, such as name, phone number, email address, etc.
  • Air Gap
This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.