IDtorney Solutions
SAFER CREDENTIALS FROM IDtorney
Where it all starts
Use a safer ID we create for you that is dedicated to safety.
Become holistically safer in 3 steps:
LOGINtorney + MAILtorney + SECRETtorney
THE PROCESS:
> Always deployed first
> Always issued by an Attorney
> Always hosted with security leaders.
We start by creating a new email(*) dedicated to your cybersecurity.
It will be your passwordless gateway into your digital tools with IDtorney.
--> Everything else flows from it.
ENCRYPTED IDENTITIES COMMUNICATIONS TOOLS:
> Secure emails with Tutanota and
> Secure instant messages and voice with Threema Work
> Instant additional cellphone number with SMS capabilities and encrypted messaging with MySudo
PASSWORDLESS & EASY FROM DAY ONE:
> Triple redundancy tools and true passwordless freedom with LastPass + Saaspass SSO or Google Cloud Identity DashBoard or Azure MyApps.
EXTREMELY SECURE ACCESSES:
> Multi-Factor Authentication everywhere supplemented with SAASPASS offline MFA capabilities, Yubikey Security Keys and Google Advanced Protection Program.
Secure IDs or aliases, domains available(*):
1. @idtorney.me2. @torney.me3. @vocat.moi (fr)4. @idtorney.moi (fr)
General availability domains:
5. @idbook.life6. @idbook.org7. @idsafe.email8. @idtorney.email9. @mailtorney.com10. @mailtorney.me11. @squip.me12.@socialtorney.me
(*) or we may use any domain you already own.
Besides establishing your core username @IDtorney ecosystem, the suite of E2EE tools are available at the touch of a button:
Videoconferencing, Voice calls, Messaging, Email, private calendar & address books, large files transmission which automatically also include a portal for your clients to reach you safely
Components designed to be trustworthy from inception and your PERSONA for cybersecurity.
Ready to fully leverage your LOGINtorney tools? to secure the accesses and devices where you store digital secrets?
We have aggregated
> Tech Reliability
WITH ATTORNEY-CLIENT PRIVILEGE PROTECTION
Privacy for your secrets with advanced recovery and succession protocols.
See further, never look back.
Click for more
All our tools are built around:
strong encryption by design
strong user ownership of their encryption keys
strong recovery protocols
Because our foundations are trustworthy, you don't have to feel alone... ever again.
You get
> Long term
TRUSTWORTHY-BY-DESIGN
Because security is how you create trust in society
...Trust is what we create.
We believe in:
Click for more
Strong encryption, in transit and at rest for key communications and storage tools.
You own the encryption key everywhere possible.
You are never alone facing the task to custody your encryption keys: your attorney is by your side, ready to handle the recovery protocols.
Yet, your attorney will have no natural access to your data, and every access shall be logged and auditable.
Zero-trust knowledge is a core value deployed everywhere possible.
Digital Identity + Cybersecurity: 7 bundles at price points designed to help all.
Be safe with a turn-key very advanced implementation of the "BEYOND CORP" safety model,
>> but scaled as much for enterprise THAN individuals.
Use tech from our licensors that make you DAY 1 compliant with safety:
We primarily deploy end-to-end encrypted products
We record our use of ISO 270001 and SOC 2 certified technology providers
When possible, we favor the zero-trust knowledge model
We manage natively the life-cycle of any access granted.
Everything possible is recorded and available for audit