▄
▄▄▓▄▄
█▀▓ ▀
▀ ▀ ▀▄ ▀ ░
▀ █░ ▄▓▄ ▀▄░
▀ █▓░ ▀░ ▀ ▓█
▀ ░ ▀▀▄ ▀ ░▄▀
▄ ▀ ▄█▀ ▀░ ░▀ ▄ ▓▓░░ ░ ▄ ▄▄▀ ▀ ▄ ▀ ░█▓░ ▄ ▀
▀▓▀ ▄█▀ ▄ ▀ ▄▄█▓░░ ░ ▀▓▀ ▄█ ▀▓▀ ▄ ▀ ▀▀ ▄▄█▓░
▄▄ ▓█ ▀▓▀ █▄▄█████░░ ▀ ▄▄███ ▄ ▀▓▀ █▄▄█████░░ ░
▄▀▀▀█▄ ▀▀ ▄▄▀█▓ █████░ ▄ ░ ▄▄▄▀█████ ▄ ▄▄▀█▓ █████░ ▄▓▄
▀▓▀ ▄█ ▄▀█████ █░ █████ ▀█████ █████ ▓█ █████ █░ █████ ▀▄▀
▄█▓ █████ █ █████░░ ░█████ ▀▓███ ░█ ▄█████ █ █████ ░██
█▓░ ▀█████░█ ▓████▓ ░█████▀ ▓▄ ▀▄▄▀ █████ ▓ ░█████ ░▓█
██ █████ █ ███▀ ░ ███████ ▀ ▀ ▀ ▄▓▄▀▀██ ▀ ▓████▓ ░▓█
█ ▀ ██▀▀▓ █ ▀ ▓ █████▀▀████▄ ▄ ▀ ░▀ ▀▄███▀ ▀ ▄▀ ▀
▀▄ ▄▀ ░ █▓ ▄▓▄ ▄ ▄▀███▓ █████ ▄ ░ ▄▄█▀▀▀ ▄▄▄▄░
░ ▀▓▀ ██ ▀ ▓ ▄ ▀ ░ ████▓ ▀▓▀ █████ ▄ ▄▓███░ ▀▄░
▄ ▄▀ ▄▄ ██ ▄ ▄▄ ▀ █████ ░ ▓████ █ ░█████ ░▓█░
▄█ ▄▄███████▄▀█ ▀▓▀ ▄▄████▄ ▄███▀▀ ▄ █████ █ █████ ▀ ░▓█
█▓▀ ████▀█████▀▀ ▀████▀█████▀ ▀▀▓█ █████ ▓ ░████▀ ▓█░
█▓░██▀ ▄ ▀█▀ ▄██▄ █▀ ▄▄ ▀█▀ ▄██▄ ▓█ ████▀▄░ ▄█▀░ ▄██▄▀░
▀█░ ▀█▄▄ ▄▄▀▀ ▄█▓ ▀█▄▄ ▀ ▄▄▀▀ ▄█▓ █▀ ▀█▄▄ ▀▀ ▄▄▀▀ ▄█▓
▄▓▄ ▀▄ ▀▀▀▀▀▓ ▀ █▀▀░ ▄ ▀▀▀▀▀▓ ▄ ▀ ▄▀ ▄ ▀▀▀▀▀▓ █▀▀░
▀ ▀ ░ ▄▄
▀ ▄▀▀█▄ ▄ ░ ▀▄ ▀ ▀ ▀ ▄ ░ ▄▓▄▀ ▀▄
▀▓▀ █▓ ▄ SAFETY ▄ ░▀░ ▄█▀▓▀
█▓░ THE ▀▓▀ ▀▓▀ ░█▄ ▄
▄ ▀▓▄ ▄ ░ ▄ ▄▄▀ ▀▄▄ ▄ ZONE ░▄▓▀
▀███▄▄▄▄▀ ▄▄▓▓█▀ ▀█▓▓▄▄ ▄ ░▄▄▄▄▄███▀
░▀▓███████▄▄███▓██▀ is ▀ █▓████▄▄▄██████▓▀░█░
▄▓▄█▄ ░▄███▀▀▓█████▀█▀ presenting ░▀▀▀████▀▀▓███▄ ▓
▀ ▄▓███▓ ░ ▓ ▓ ▀ you: ░▓███▄ ░
░ ░▓████▀░ █ ▀ ░▀ ▀░ ░ ▀███▓▄░ ░ ░
▀ ░▓███░ ░███▓░ ▄▓▄
▄▓▄ ░▄▄███▀ ░ ░ ▀▓██▄▄ ▀ ▄
▀ ░▄▄████▀░ ShyFile v6.0 ▀ ░▀████▄▄
▓█████▓░ ░ ░ ░ ░▓████▓░
░█████▓░ ▄ ▄ ░▓█████░
▓█████▓░ ▀▓▀ ▀ ▄ ▀ ▀▓▀ ░▓█████░
░█▓▀███▓▄▄░ ▄▄▄████▄▄░ ▄ ░ ░▄▄████▄▄▄░ ▄▄▓███▀▀░
░█░ ░▀▀▀██████▀▀▀▓████░ ░████▓▀▀▀██████▀▀▀█░▄
░█ ░ ░░ ░▓████▄ ▄ ▄ ░▓████▓▄▓▄ ▄ ░░ █ ░
▓ ▀ ▄▓▄ ░▓█████▀ ▀ ▀░▀ ▀ ▀██████▓░▀ ░ ░ ▓
░ ▄ ▀ ░▄███▀▀░░ ▀▀████▄ ▄ ░
▄ ▀▀▀▀ ▀▀▀▀ ▀
SUPPLIER : Foduck DATE : 2003-01-25
PACKAGER : Foduck OS : WinALL
CRACKER : Foduck DISCS : 08
PROTECTION : Serial LANGUAGE : English
URL: http://www.shyfile.net
▄
▄▄ ░ ▓░ ▄
░ ▀▄▄▄ ░ ▄ ▄ ░▄▄▄██▀
▄▓▄ ▓ ░▀████▓▄ ▄▀▀▄ ▄ ▄ ▄▓▄ ▄ ░░ ▄██████▄▄ ▄
▀ █▄▄▄███▓▀▀▀▀█▄▀ ▀▓▀ .o. info .o. ▄ ▀ ▄▀▀██▄░█ ▄
▄██▀▀░ ▄ ▀ ▄ ░ ▀▀▀█▄ ░▓▀
▀ ▄ ░ ▓ ▀
░
How to create self-decrypting files
that contain your encrypted text:
It takes just a few easy steps to encrypt some text and to put it
into a self-decrypting, yet harmless HTML-application file. Enter
your key, enter your text, select a folder to save your ShyFile in
and click the Encode button. That's it. Any recipient of an email
having a ShyFile attached to it simply uses an Internet browser
[preferably MSIE 5.0 and above] to decode. The HTML-application file
is wrapped around the actual JavaScript self-decrypting algorithm
that will decode its contents.
encrypting HTML webpages:
The latest version also allows the user to encrypt HTML webpages of
up to 80k (ShyFile encrypts the source code only) and turns them
into self-decrypting files to be uploaded to a website. Use your
browser to decode, no installation of ShyFile and no extra applet
necessary.
encrypting binary files:
ShyFile will also encode all kinds of binary files [e.g. those
having a -jpg, -gif, -bmp, -doc, -xls, -cls, -mp3 or even an -exe
extension]. It has never been easier to encrypt, e.g. your MS
Word-document in a way no Secret Service on this planet could ever
get access to. But those files containing encoded binary information
cannot be opened using an Internet browser alone, i.e. they require
the actual ShyFile software to decode. Any ShyFile installation can
be used to decode, regardless whether it's the full version or an
expired evaluation copy.
Unique 1on1 (symmetric) key entries prevent anyone -even us- from
accessing your messages (as long as you don't give your passphrase
out, of course). No cryptographic experts, nor any military crypto
experts in particular, who do not know the passphrase, were ever
able to crack and decode a document previously encoded by ShyFile.
No key recovery. There is no master key. If a ShyFile user loses his
key entry, nobody will be able to retrieve the original text (or
original plain binary data) anymore, neither the user nor the
software developer.
ShyFile does not provide any information of key entries to a
so-called Trusted 3rd Party nor does it employ any Public keys. You
don't have to worry about having to trust any Trusted 3rd Parties.
ShyFile secures your regular 1on1 communication, from one ordinary
email account to the other, no 3rd party in between, no extra
registration at any additional service providers, nor any
key-validation hosted by a 3rd party necessary.
ShyFile's decoding algorithm is published on the open source
code-page at our website..
One of the most interesting aspects of this application is that in
the process of encoding, the userÆs plain text (or plain binary
data) is mixed up with randomly created junk data. The junk data is
created by an exclusively developed random generator and not by the
random generator that comes within the Windows operating system.
This is done to avoid any discussions whether the Windows random
generator is as random as it should be. Therefore, upon every
installation of the software, the user will need to enter a few
arbitrary characters to initialize that random generator.
How does ShyFile's algorithm work?
The ASCII value of one character is added to next characterÆs ASCII
value, regardless whether itÆs a plain text character or a
junk-data-character. An interim sum is rendered of those two values
that represents a new ASCII character itself. The interim sum of the
first two characters is the basis for the next rendition of interim
sums to generate next ciphertext-characters to follow, and so on . .
. All values representing the ciphertext characters are influenced
by the junk-data-characters added in the outset. This way, a single
encoded character cannot be related to a character of the original
plain text, no so-called æcodebookÆ could be found anymore.
From that point on, all characters are separated into nibbles (4bit
half-bytes) and the sequence thereof is twisted pseudo randomly by
the information the user has entered as the actual key
(pass-phrase).
ShyFile's enhanced TL6144D algorithm
There are algorithms out there that distort the plain text
information in the fanciest ways but keep the actual order of all
encoded characters (ciphertext) as they were in the outset. ShyFile
twists the order of those bytes and nibbles of the whole ciphertext
like a whirlwind.
When decoding a ShyFile, the key entry entered by the user, is not
used to simply determine whether subsequently a certain algorithm is
initialized to decode your data, or not, but it rather becomes a
major part of the whole algorithm itself. Within a ShyFile the
symmetric key entry per se is not transmitted. Your key entry
directly determines the way your text is encrypted. Your key entry
becomes the algorithm itself.
ShyFile employs a variable key length of minimum 32 characters
(rendering 192bit encryption) or even 64, 128, 256, 512 and up to
1024 characters (rendering 6144bit in a military fashion). You may
enter any character as your key, whether it's a letter or something
like "#{}[]-_( *)&^%$#!" just make sure you enter at least 32
characters.
ShyFile encodes your sensitive data with an algorithm rendering a
depth of encryption of up to 6144bit, which means it will take a
potential hacker not knowing your password 2 to the power of 6144
possibilities (that equals a figure with 1,850 digits) to crack it.
Ten thousand years won't be enough time to go through all these
possibilities using the best technology available (127 Giga
keys/sec.).
Imagine you encode the same text a thousand times, at every time
using the same key entry, ShyFile will render some encoded data
(ciphertext) that at every time is different in its contents from
the one before. If the user enters a 192bit key (made of 32
characters min.) there are max. 2 to the power of 192 possibilities
a potential hacker needs to go through in order to crack the plain
text. And, this is the interesting part, there will be also 2 to the
power of 192 variations how the encoded data stream can look like.
If the user chooses to enter a 6144bit key (made of 1,024 characters
min.) there will be up to 2 to the power 6144 variations the encoded
data stream can look like.
Use the integrated random key generator to get a 6144bit key entry
consisting of 1,024 characters easily generated by a single click on
a button. Those characters are also generated by ShyFile's own
internal random generator.
No product is secure if used improperly. You can be the weakest link
in the chain if you use any encryption product carelessly. Make sure
not to let other people gain access to your key entries.
Don't be fooled! It is a known fact that asymmetrical encryption of
512bit can be cracked by applying factorization to it. Even if you
decide not to use ShyFile don't go for any asymmetrical encryption
that does not even at least reach that minimum depth of encryption.
Remember that ShyFile is a symmetric encryption tool. To compare
asymmetry and symmetry encryption, a 1024bit asymmetric is
approximately equivalent to an 80bit symmetric key. Therefore even a
depth of symmetric encryption of something less than 512bit will be
sufficient to provide very good security. However, that's about the
only comparison in key size that can be made, in that symmetric /
asymmetric systems have different design properties as well as
attack methods.
Unlike some other applications on a Windows system ShyFile is a very
stable running software.
According to German Law we do not have to leave a backdoor open for
any public agencies, so we didn't.
If strong encryption software is made in the USA, can it be
exported? Strong cryptography is considered dangerous munitions by
the United States and requires approval from the US Bureau of Export
Administration, under the US Department of Commerce, before it can
leave the country. Chances are, if the software has been approved
for export, the algorithm is weak or crackable. However, ShyFile is
a German product and there are no restrictions on limiting the depth
of encryption of products exported out of Germany.
File Shredder:
ShyFile also features an integrated File Shredder to provide secure
file deletion. Click the File Shredder button and browse for a file
which sensitive contents you want to have completely erased. Normal
file deletion only removes a file's directory entry, but leaves the
data contained in the file on your disk drive. File Shredder
completely overwrites the contents of a file 7 times, changes its
date and then deletes it. Files selected for shredding can not be
recovered using an undelete program. The purpose of the File
Shredder is to completely wipe confidential files and their contents
from you disk drive. Once a file has been shredded it can not be
recovered using sophisticated file restoration utilities.
▄
▄▄ ░ ▓░ ▄
░ ▀▄▄▄ ░ ▄ ▄ ░▄▄▄██▀
▄▓▄ ▓ ░▀████▓▄ ▄▀▀▄ ▄ .o. install .o. ▄ ▄▓▄ ▄ ░░ ▄██████▄▄ ▄
▀ █▄▄▄███▓▀▀▀▀█▄▀ ▀▓▀ crack ▄ ▀ ▄▀▀██▄░█ ▄
▄██▀▀░ ▄ ▀ notes ▄ ░ ▀▀▀█▄ ░▓▀
▀ ▄ ░ ▓ ▀
░ ░
Unzip, unrar, install, and use the supplied TSZ keygenerator to
register your product.
▄▄ ░ ▓░ ▄
░ ▀▄▄▄ ░ ▄ ▄ ░▄▄▄██▀
▄▓▄ ▓ ░▀████▓▄ ▄▀▀▄ ▄ ▄ ▄▓▄ ▄ ░░ ▄██████▄▄ ▄
▀ █▄▄▄███▓▀▀▀▀█▄▀ ▀▓▀ .o. news .o. ▄ ▀ ▄▀▀██▄░█ ▄
▄██▀▀░ ▄ ▀ ▄ ░ ▀▀▀█▄ ░▓▀
▀ ▄ ░ ▓ ▀
░ ░
open positions:
crackers, experienced only
shell supplier (eu/us)
░ ▄
▄▄ ▓ ░ ▓░ ▄
░ ▀▄▄▄▀ ░ ▄ ▄ ░▄▄▄██▀
▄▓▄ ▓ ░▀████▓▄ ▄▀▀▄ ▄ .o. contact .o. ▄ ▄▓▄ ▄ ░░ ▄██████▄▄ ▄
▀ █▄▄▄███▓▀▀▀▀█▄▀ ▀▓▀ ▄ ▀ ▄▀▀██▄░█ ▄
▄██▀▀░ █ ▄ ▀ ▄ ░ ▀▀▀█▄ ░▓▀
▀▀▓ █ EMAIL: [email protected] ░ ▓ ▀
▀ █ ░ ░▄ █░
▀█▓▄ ▄▓▄ ░ ▀ ▀▓▄▄ ░
▀██▄ ▀▄▄ ▀ ░ ░█▀████▄▄
▀▓█▓▄ ░ ▄▄▄▀ ░▀▄▄▄▄ ▄ ▀▀▓██▓
███▓▄▄ ▄▄▄██████▀ ▀▓███▓▄▄▄▄░░▄▄▄▓██▓░
▄ ░██▀██████▓█▀▀▓▀ ▀█▀▀████████▀▀▀
▀█▓ ▄ ▓██▀▀ ░▄ ░ ▀ ▄ ▄▓███▀ ░
░ ▀▀ ▄████▄▄ ▀▓▀ some greets to: ░▄██████▓
▄▄███████░ ▀ ▀ ▀▀████▓███░ ▄▓▄
▓█████▓▀▀ ░ ▀███████░ ▀
██████▓▓░ TMG . ECL . UCF . TNO . dF . CORE ░ ░▓████▓██░ ░
██▀█████▀▀▀▀ ░▓███████
▄▀▀░ ████▓▓ ▀ ░▓█████▀███▄
░ ░ ▀▓▀█░█▓██▓░ ░ ░█████▓░ ░▀▓█
█▓░▄██▓█ ▀ ░ ░ ▓ ░▀ ▀████▄ ▄▀
█▓░▓█▓▓░ ░ ▓ ░▄▄▄▀ ▀▄▄▄░ █ ░ ▓████ █░
█▓░ ███▓▄▄░ ▄▄▄██████▀ ▀▓███▓▓▄▄ ▄▄▄███▀░ ▓
▀▄▄ ░▀▀███████▓██▀▓▀ .ascii^jered. ░ ▀█▀▀████████▀▀ ░
▓▀▀▀▀ █ ░ ▓ ▓▀▀█░
░ ▓ LAST UPDATED: JUNE 2002 ░ █
░ ▓
░