According to their website: > § 1 No Saving of Data in the Usage of the VPN Server >The OkayFreedom-Service saves neither the addresses nor contents that the user calls up, nor the IP addresses that OkayFreedom has allocated, nor their own IP address that they use on OkayFreedom. It is not possible for Steganos to determine what contents an OkayFreedom calls up. Neither the IP addresses of the users nor the IP addresses of the called server is saved.
I personally like to use Steganos Locknote.
Bunch of paid stuff, mostly email related. The article is also 6 months old... not sure why OP decided to post it.
Abine Blur Premium
PreVeil
ProtonMail
TrackOFF Basic
Virtru Email Protection for Gmail
Abine DeleteMe
Burner Mail
Icloak Stik
ManyMe
Private-Mail
StartMail
Ghostery Midnight
ShieldApps Cyber Privacy Suite
Steganos Privacy Suite
One ultra-simple way of keeping track of passwords is to use a free program called Steganos Locknote It is an open source encrypted version of notepad. It takes about 60 seconds to learn how to use it and when used for password storage, it allows you to have quick access to multiple passwords by only remembering one master password. The program requires no updates and uses AES encryption, so very secure. The file can be copied to a USB drive for portability.
Their Privacy Policy about restrictions on P2P traffic in case anyone is wondering.
> § 1 No Saving of Data in the Usage of the VPN Server The OkayFreedom-Service saves neither the addresses nor contents that the user calls up, nor the IP addresses that OkayFreedom has allocated, nor their own IP address that they use on OkayFreedom. It is not possible for Steganos to determine what contents an OkayFreedom calls up. Neither the IP addresses of the users nor the IP addresses of the called server is saved.
> SHA-256
You probably mean AES-256, and yes it's bad. If you delete a file from the harddrive by using a normal delete command or the recycle bin (and emptying it), it is not really gone, but merely the entry in the index is "crossed out". This allows somebody to restore the unencrypted copy from the drive if he knows what to look for. Overwriting the file with random stuff before deleting is no guarantee too if you have an SSD. if you want to use this method, use an application that will encrypt the file on its own. Steganos Locknote is such an example. It is particularly interesting because it modifies itself, meaning that the editor itself also contains the text.
I feel conflicted with this.
While it says this: >The OkayFreedom service saves neither addresses nor content accessed by the user, the IP address that OkayFreedom assigned to them; nor the user's own IP address through which they are using OkayFreedom. As a result, it is not possible for Steganos to ascertain the content an OkayFreedom user has accessed. Neither the IP address of the user nor that of the accessed servers are saved.
Later on it says this:
> We store user data on specially protected servers. Access is resticted to a few specially authorized persons.
I suggest emailing them to see what they mean with "we store user data".
Edit: grammar
This is an advent calender. so to get the coupons, just click today's date in the calendar and normally you have to give any email to get the activation code(if language is german just google translate it.). For today (december 12), the giveaway is Steganos Online Shield VPN. This giveaway goes on for the next few weeks.
Steganos don't work that way. Its much more believable they used Steganos to put messages into the images with passwords.
ELI5; Change the colors in an image ever so slightly that the ends of the binary create your message. This plus a proper password system would leave us in the dark.
I am using OkayFreeom about two months and it is pretty fine. Support service is a little bit slow though. Speed is also fine, with occassional slow downs. They also do not log, but they do not seem to be super crazy about privacy matters. I liked to use Steganos before and OkayFreedom is seem to be another good service of Steganos.
Drive to starbucks, log onto open wifi access point. turn on laptop, spoof mac address, turn on virutal machine, log into (i hope linux based VM), open TOR browser. Turn on Steganos and then turn on VM machine within machine, spook that IP and MAc address. Remote login from there to machine you have already targeted, from there use anatomizing client and TOR networks. Attack target. Did I mention since you were super paranoid you used a USB wireless card you bought from a second hand shop and once done smashed it to bits.
Couple more suggestions: 1) I don’t see Tree House on this list. They always have a lot of other beers besides their IPAs, and IMO, they do them well. We had some really good Czech dark lagers and doppelbocks when we were there in May. 2) There’s a little brewery further East from Portland called Boothbay Craft Brewery. Good beer, really good food, and a cool vibe. They had a two beers of note: Agrios & Steganos. Both phenomenal.
Technically it is possible, but it would take some work to reverse engineer how they are verifying the password create a script that attempts to brute force it. That would be a lot of work. Instead check out AutoIt, it will allow you to create a script to attempt all possible 4 digits for you. Although I suggest you start with a new Steganos Safe, create a known 4 digit pin, use AutoIt to crack it, and then use the same script on the vault with the unknown password.
DOWNLOAD LINK: Privacy Suite 21.0.6 Revision 12622 + Rus
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/u_Optimall45Serve) if you have any questions or concerns.
DOWNLOAD LINK: Privacy Suite 21.0.6 Revision 12622 + Rus
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/u_MoistGear435) if you have any questions or concerns.
Hello /u/AdministratorMike
It is against /r/giveaways rules to resubmit your post before 48 hours have elapsed. Your post has been removed.
Here is the original post: Steganos Password Manager 21 Giveaway (5 licenses) 5/19/2020 {WW}. This was posted 2m 40s before your post.
Please note that the bot may have made a mistake. If this is so, please message the mods
Transaction performed with /u/draz84
Could not record the transaction on Credo because neither /u/draz84 nor /u/dirtcheapcodes have Credo accounts.
Transaction performed with /u/SENKISEH
Could not record the transaction on Credo because neither /u/SENKISEH nor /u/dirtcheapcodes have Credo accounts.
looking at their privacy policy... Steganos does not pass on personal user data to third parties unless the user has given his express prior consent or there is a legal obligation to do so
no ty.... that proves they keep logs... NEVER use vpns by 'security suite' software makers... omg.. biggest mistake a person can ever make.. you want a vpn... by a company that does one thing.... make vpns..
Hint 1: As the good people from the discord have found, if you put this picture of the logo of Steganos (-> Steganography) in you will get 0rPKTE2, which in turn corresponds to
Hint 2: How do you find stuff on a map?
Hint 3: AB=12
Hint 4: If only there was a way to measure the width and height of an image...
Hint 5: What if you looked at the pixel with width = 98 and height = 239?
I would like to thank Steganos Team for sponsoring this giveaway for Promo2day users
We have 5 premium licenses each is valid for 1 year and can be activated on 5 devices
Giveaway will end June 20, 2018
Бесплатная лицензия Steganos Online Shield VPN на один год для анонимного посещения сайтов в интернете, обхода блокировки сайтов, с защитой подключения методом шифрования:
I'm testing Cobbler, which is a nice minimal alternative to an encrypted Text zip. No temp files.
Another such tool is Steganos Locknote but it seems to be abandoned.
Our marketing manager was out sick when Ernesto sent out the request for comment to us. We are now listed on page 2. We are mistakenly listed as the 2nd Steganos post (we have submitted a correction request).
It's hard to say what is "bulletproof". Since every other day, some new document leak or experiment seems to imply that every hardware/software vendor is paid off to allow a backdoor or vulnerability in design to allow the NSA to break in. And even if there isn't a backdoor of some kind, having physical access to a protected file is half the battle.
Once they have it, it's only a matter of time before they crack it (assuming you have a weak password). Or a new technology is invented that takes a few days to crack a file when it took 30 years before said technology.
I'm no expert by any means. I am aware of the following: AxCrypt, Bitlocker, TrueCrypt, and Steganos VPN.
Any or all of those could be useless since a 3rd party hasn't audited them AFAIK. TC was raising $ to get approved by an auditor last time I checked.
Lifehacker always seems to have email/IM/Dropbox encryption tools every month. Again, nothing is guaranteed.
CNET did a giveaway of Steganos VPN keys.. Using Steganos I can torrent on campus at around 4Mbps. Good luck!
I've kept a journal since 2006, just text files in Notepad, encrypted with Steganos LockNote. It's a basic recap of each day, but it's extremely useful sometimes.