Index
Overview
Use without CerebraLock
Getting Started with CerebraLock
Create a Text Set
Create Your Own Locks
Setting Up a Secure Communication

Overview   top
Yes, well... in order to use CerebraLock properly, there is no getting around reading the documentation and learning what it is about. Here are some pointers to get started, and to help you determine if you want to commit more of your time to it.


Use without CerebraLock   top
CerebraLock is the method to secure all your data on the device. If you want to get an idea what functionality is available without setting up CerebraLock, do the following:

•  tap Log In. This logs you in automatically as the Default Identity - your documents will be insecure. In order to secure the documents you will have to export them to another identity.

•  tap to switch to the Main Screen.

•  use Data Sources () and Data () to create and manage documents and to familiarize yourself with the functionality.

•  the next step is to create a new identity. Tap on the current identity (the Default Identity) to return to the identities list. Tap and then Individual. This creates a new Incomplete Identity. You will be automatically logged in. Your documents will be insecure until setup is complete. Once fully set up, all your existing documents will be automatically locked for you.

•  tap on the identity to take a look at the identity options.

•  tap to start setting up your identity.


Getting Started with CerebraLock   top
Once you are ready to delve into CerebraLock, read the documentation (CerebraLock) to understand the principles behind it. While doing the next steps you may want to have a print-out of the documentation or a copy on a separate device to refer to (Documentation: Export and Print).

Create a new identity and create some practice locks for it:

•  tap Log In. This logs you in automatically as the Default Identity. You can only create new (master) identities when you are logged in as the Default Identity.

•  tap at the bottom of the identity list and then Individual. A new identity named 'Incomplete Identity' will be created, and you will be logged in.

•  tap at the bottom of the identity list. This switches you to the list of locks for the identity. Tap and then Practice Locks to switch to the 'Practice Locks' screen (Practice Locks).

•  select the first lock in the 'Locks (Text, Compare)' section and the first three locks in the 'Locks (Images, Compare)' section and create them. This will take a couple minutes or so.

•  tap on a lock and then tap Test Access to get familiar with access sequences. Try the coercion functionality as well. Practice locks signal coercion access with an orange confirmation screen rather than a green one.

•  tap to return to the identity list.

•  complete setting up the identity by tapping and assigning log in and data locks.

•  practice logging out and logging back in.

•  use and to create and manage documents. Now that the identity is complete, your documents will be automatically locked. Familiarize yourself with the locking and unlocking functionality.

Note: documents will be locked to the identity. In order to transfer them to another identity or otherwise use them, you will have to export them.

Once you are comfortable with access sequences, it is time to create your own locks. And then (at last) you are all set!


Create a Text Set   top
Text sets are easier to create, but harder to use. Image sets take more effort, but are easier - and more fun - to use. This being a 'quick start', we'll go with a text set.

•  if you haven't done so, create a new identity.

•  tap on the list of locks (), then on item sets (). This switches you to the list of item sets for the identity. Tap and then Text Set to create a new text set.

•  tap on the 'New Entry' text field and start entering first names of people you know. Use names which are not easily found out by someone snooping around in your life or even by someone who knows you. For example: favorite high school teachers, childhood friends, lovers, classmates, relatives etc. - any name which has special meaning to you. When you see one of these names, you should experience an immediate, unambigous sense of recognition.

•  enter 30 or so (but at least 20) of these known names. They will be capitalized for you. Duplicates will be ignored (you'll hear a beep). To edit an entry, tap on . To delete entries, tap the text to select or deselect, then to delete.

•  now you need to enter roughly the same number and kind of unknown names. Use names which mean nothing to you. Tap to add 25 random names; you can do this multiple times.

•  sort the list of names alphabetically (in ). Carefully look through your list of names. If you find names which you're not sure about, delete them. You should end up with a list of names which you can decisively categorize into known or unknown. The bigger the number of items in each category - but roughly the same - the better.

•  now enter one to five extra-special names to be used as coercion items. You should be able to identify them as a third category when encountering them.

•  tap and save your text set. Tap on it and enter a description. The item set is displayed in a reddish row to indicate that it is not yet ready to be used in a lock. Its items need to be categorized.

•  categorize the items. Tap on the item set and select Categorize Items. In the top row, select the category to set, then tap on each item to set its category. The categories are unused, coercion, known, unknown. Again, if you find ambiguity, mark those entries as unused!

•  tap and save. The item set should now be displayed in a green row to indicate that it is ready to be used in a lock.

•  now create a lock from your item set. See Create a Lock.

•  tap on the lock and then tap Test Access to test the lock and to get familiar with access sequences.

•  complete the identity by assigning log in and data locks to it.


Create Your Own Locks   top
Alright, by now you really should have read the CerebraLock documentation.

•  create a new identity.

•  create one or more item sets and categorize them. (For a step-by-step description of creating a text set, see Create a Text Set above.)

•  create locks from the item sets.

•  complete the identity by assigning log in and data locks to it.


Setting Up a Secure Communication   top
Here are the steps to set up a secure communication with another party. As the initiator of the communication, let's call you the 'sender' and the other party the 'recipient'.

The recipient must have CerebraLock on their device and they must have set up an identity and some locks. The locks can be practice locks, but for messages to be secure not only in transit but also on the device, they - and you - should use personal locks. The recipient should be available to do this with you. You can also try this with a second device.

SENDER
•  log in, go to the Main Screen and then to the 'Secure Data Exchange' screen.

•  tap to send an invitation. The 'Send Invitation' screen opens.

•  tap on 'Lock' to select a lock or to change the given one. This will also become the data lock for the communication document.

•  we'll use SMS (iMessage) in this example. Tap on 'Recipient SMS Number' to pick one from your contacts or type a number into the field.

•  tap then Send to send the invitation. Choose 'Message' from the sharing options which are displayed. You will get a standard SMS screen with an attachment filled in. The attachment contains the public encryption keys for the lock you chose. Send it.

•  a new communication was created.

RECIPIENT
•  you get a text message with an attachment. You should be logged in (you don't have to be, but it's simpler this way). In your Messages app, tap on the attachment. In the sharing options which pop up, tap 'Open in CerebraLock'.

•  you will be switched back to CerebraLock, the lock will be added to your list of received locks, and a communication document will be created. Go to the 'Secure Data Exchange' screen.

BOTH
At this point the sender has a communication document which can receive encrypted data and the recipient has one which can send encrypted data. The communications are linked by a common reference ID. To complete the handshake, the recipient has to send a lock. The recipient does that by accepting the invitation:

RECIPIENT
•  tap on the communication status icon. You may have to authenticate to access the communication. The 'Resend/Accept' screen opens. It is the same as the 'Send Invitation' screen. The recipient information is filled in from the received lock, but it can be edited.

•  tap on 'Lock' to select a lock or to change the given one. This will also become the data lock for the communication document.

•  tap then Send to accept the invitation. Choose 'Message' from the sharing options which are displayed. You will get a standard SMS screen with an attachment filled in. The attachment contains the public encryption keys for the lock you chose. Send it.

•  the status of your communication changes to complete: both arrows are green.

SENDER
•  you get a text message with an attachment. In your Messages app, tap on the attachment. In the sharing options which pop up, tap 'Open in CerebraLock'.

•  you will be switched back to CerebraLock, the lock will be added to your list of received locks, and the communication status will change to complete: both arrows are green.

BOTH
Now you are ready to communicate securely. Tap on the communication icon to open the communication. Enter text or data and tap Send. To receive the data, follow the steps above for receiving an attachment. Communication entries will be added to the communication. See Secure Communications (SMX) for more details.


Previous: Introduction  Next: CerebraLock
Copyright ©2014
bitSplit™ Enterprises.
All rights reserved.

Saturday, April 12, 2014