LOGINtorney : Where it all begins.
BECOME A CLIENT
SAFER LOGIN, SAFER BROWSING, SAFER YOU.
3 steps to unified passwordless login security from tools we deploy.
Turnkey since we host everthing for you.
Via a limited-scope legal mandate, we further become your sidekick and Digital Citizenship Gatekeeper.
> Always deployed first
> Always issued by an Attorney
> Always hosted with security leaders.
ENCRYPTED COMMUNICATIONS TOOLS:
> Secure emails with Tutanota and SendSafely.
> Secure instant messages and voice with Threema Work.
> Yubikey Security Keys and Google Advanced Protection Program on their Enterprise Cloud Identity Premium setup.
PASSWORDLESS ACCESSES ON DAY ONE:
> Triple redundancy tools and true passwordless freedom with LastPass, Saaspass & Google single sign-on dashboard.
1) COMMUNICATIONS ENCRYPTED EVERYWHERE
Using a new & secure ID always issued by an Attorney, we ensure we can communicate with you while having achieved holistic end-to-end encryption. Communicate with systems from third-parties we picked and manage to evolve your digital life.
Encryption for your existing emails: with nearly unlimited file attachment size, powered by SendSafely.
Encrypted storage: start with 1TB and 365 days continuous backup via Sync.com
Private instant messages and voice calls: encrypted via Threema Work network.
Encrypted collaboration: Video Calls, Messaging, Scheduling, (coming soon)
2) A UNIFIED IDENTITY WITH ANTI-PHISHING TOOLS
Easy training on the best tools. Foundations designed with tools from audited security leaders.
On-boarding feels like your first smartphone: unfamiliar at first, but enjoyable very fast.
3) PASSWORDLESS FROM DAY ONE
Witness "passwordless" efficiencies everywhere, then appreciate trusting it everyday as it proves over and over its safety and cyber-resiliency.
Achieving these foundations opens up further potential:
Remote end-point controls
Digital transformation-ready workspaces
From this new baseline for your everyday digital life, SAFETY can emerge: you can now evolve with an attorney by your digital side.
IDtorney helps you protect creativity's worth and value otherwise impossible to envision if easily hacked.
IDtorney helps you protect what has value: because if you don't know how to protect a secret, you can't ensure its value.
Fortunately, it's just the start when you let IDtorney help you manage your sensitive digital secrets. This only describes service level 1 of 4...
> Foundational safe zone where you own your encryptions keys.
STEP 1: END-TO-END ENCRYPTION FOR EMAIL & STORAGE DATA BACKUP.
+ a VPN to protect your internet traffic on up to 6 devices.
> Turnkey new login identity as simple as using a smartphone.
STEP 2: DIGITAL IDENTITY SECURED IN THE CLOUD: passwordless & protections with ephemeral browsing in enterprise profiles.
> Any digital access is now protected via attorney-hosted technology tools.
STEP 3: SECRETS MANAGEMENT + PASSWORDS REMOVAL & STRENGTHENING VIA SINGLE SIGN-ON TECHNOLOGIES
Designed to be trustworthy from inception and your PERSONA for cybersecurity.
> Attorney hosting: Safer-by-design now
Long-term cyber-defense planning
Adaptability without conflict of interest or single provider dependency
Digital ID perennial planning for succession to heirs
Tools legally engineered to reduce the hacking surface of attack.
AND ONLY WHEN YOU ARE READY, WE HAVE MORE:
> Future-proofing tomorrow:
Encrypted privacy pushed further with Blockchain: 70+ Productivity apps ready to be tested on a hosted IDtorney.ID secured domain . Own your encryption keys and have IDtorney cover you protecting them.
(Powered by Blockstack.org)
DNS based Identity acting as universal login technology, private-by-design and portable, Typically preferable for public sector matters.
(powered by ID4ME.org)
We have aggregated
> Tech Reliability
WITH "CLIENT-ATTORNEY" PRIVILEGES PROTECTION
Privacy for your secrets with advanced recovery and succession protocols.
See further, never look back.
Click for more
All our tools are built around:
strong encryption by design
strong user ownership of their encryption keys
strong recovery protocols
Because our foundations are trustworthy, you don't have to feel alone... ever again.
> Long term
Because security is how you create trust in society
...Trust is what we create.
We believe in:
Click for more
Strong encryption, in transit and at rest for key communications and storage tools.
You own the encryption key everywhere possible.
You are never alone facing the task to custody your encryption keys: your attorney is by your side, ready to handle the recovery protocols.
Yet, your attorney will have no natural access to your data, and every access shall be logged and auditable.
Zero-trust knowledge is a core value deployed everywhere possible.
Powered by the SendSafely.com Removing the headache out of easily exchanging encrypted information of any size with anyone on any device.
Use tech from our licensors that make you DAY 1 compliant with safety:
We primarily deploy end-to-end encrypted products
We record our use of ISO 270001 and SOC 2 certified technology providers
When possible, we favor the zero-trust knowledge model
We manage natively the life-cycle of any access granted.
Everything possible is recorded and available for audit