IDtorney Flagship Products



SAFER LOGINS, SAFER BROWSING, SAFER YOU



SAFER CREDENTIALS FROM IDtorney.

Where it all starts.


Use a safer ID we create for you that is dedicated to safety.

Become holistically safer in 3 steps:

LOGINtorney + MAILtorney + SECRETtorney






Components designed to be trustworthy from inception and your PERSONA for cybersecurity.





Besides establishing your core username @IDtorney ecosystem, the suite of E2EE tools are available at the touch of a button:

Videoconferencing, Voice calls, Messaging, Email, private calendar & address books, large files transmission which automatically also include a portal for your clients to reach you safely







Ready to fully leverage your LOGINtorney tools? to secure the accesses and devices where you store digital secrets?







Ready to put your LOGINtorney tools to work?

There's a whole world opening when you know you already have the rights tools to be safer working with cloud apps, whether at work or remotely.







On-boarding to hardware wallets, online wallets, speculation and dAPPS


Ready to discover real use-cases with Blockchains?

Storage, logins, payments, speculation, dAPPS, all is fair-play as long as you are securely set-up. We get you there.





TO APPS THAT DON'T REALLY NEED IT BUT FORCE YOU INTO DIVULGING.

Use an IDtorney generated phone number for public use and filtering.






SOCIAL MEDIA DIVERSIFICATION with accounts aliases hardening

Ready to be sovereign with your online identity and make yourself censorship resistant?






Become the Digital Citizenship Gatekeeper of your clients.

Feel safe relying on IDtorney techology stack.

Feel supported knowing IDtorney Support Services has your back.

Coming soon.




We have aggregated

> Tech Reliability



WITH "CLIENT-ATTORNEY" PRIVILEGES PROTECTION

Privacy for your secrets with advanced recovery and succession protocols.


See further, never look back.

Click for more

All our tools are built around:

  • strong encryption by design

  • strong user ownership of their encryption keys

  • strong recovery protocols

Because our foundations are trustworthy, you don't have to feel alone... ever again.



You get


> Long term


TRUSTWORTHY-BY-DESIGN

Because security is how you create trust in society

...Trust is what we create.

We believe in:

Click for more

  • Strong encryption, in transit and at rest for key communications and storage tools.

  • You own the encryption key everywhere possible.

  • You are never alone facing the task to custody your encryption keys: your attorney is by your side, ready to handle the recovery protocols.

  • Yet, your attorney will have no natural access to your data, and every access shall be logged and auditable.

  • Zero-trust knowledge is a core value deployed everywhere possible.

1) COMMUNICATIONS ENCRYPTED EVERYWHERE

Using a new & secure ID always issued by an Attorney, we ensure we can communicate with you while having achieved holistic end-to-end encryption. Communicate with systems from third-parties we picked and manage to evolve your digital life.


  • Secure emails for your ID: with our secure email portal powered by Tutanota. We offer 20 domains you can choose from.


  • Encryption for your existing emails: with nearly unlimited file attachment size, powered by SendSafely.


  • Encrypted storage: start with 1TB and 365 days continuous backup via Sync.com


  • Private instant messages and voice calls: encrypted via Threema Work network.


  • Encrypted collaboration: Video Calls, Messaging, Scheduling & File Sharing via Tauria

2) A UNIFIED IDENTITY WITH ANTI-PHISHING TOOLS

Easy training on the best tools. Foundations designed with tools from audited security leaders.


  • Security keys (like Yubikey) to protect your logins whenever possible.





On-boarding feels like your first smartphone: unfamiliar at first, but enjoyable very fast.

3) PASSWORDLESS FROM DAY ONE


Witness "passwordless" efficiencies everywhere, then appreciate trusting it everyday as it proves over and over its safety and cyber-resiliency.

Efficient login synergies with accesses redundancy achieving an enterprise-grade setup with:




  • InWebo for deviceless authentication in elaborate existing infrastructures that don't need to take their digital transformation in strides.



Achieving these foundations opens up further potential:


  • Remote end-point controls

  • Digital transformation-ready workspaces

From this new baseline for your everyday digital life, SAFETY can emerge: you can now evolve with an attorney by your digital side.


  • IDtorney helps you protect creativity's worth and value otherwise impossible to envision if easily hacked.

  • IDtorney helps you protect what has value: because if you don't know how to protect a secret, you can't ensure its value.

Fortunately, it's just the start when you let IDtorney help you manage your sensitive digital secrets. This only describes service level 1 of 4...



Digital Identity + Cybersecurity: 7 bundles at price points designed to help all.

Be safe with a turn-key very advanced implementation of the "BEYOND CORP" safety model,

>> but scaled as much for enterprise THAN individuals.



Use tech from our licensors that make you DAY 1 compliant with safety:

  • We primarily deploy end-to-end encrypted products

  • We record our use of ISO 270001 and SOC 2 certified technology providers

  • When possible, we favor the zero-trust knowledge model

  • We manage natively the life-cycle of any access granted.

  • Everything possible is recorded and available for audit