SlideShare a Scribd company logo
iTwin let's you access your files from anywhere, simply & securely
Sree vidhya,II CSE,
VIKAS COLLEGE OF
ENGINEERING & TECHNOLOGY
It is a device that allows its users to share files from
computer to computer without installing or configuring any
software or USB’s or the cables.
 It provides a simple plug and play remote file access.
Bi-Directional File Access: connection between the 2
computers is completely symmetrical.
.
Electrical and Electronic Engineering
from IIT in Chennai and a Masters
degree from IISc in Bangalore.
FOUNDER & DESIGNER
iTwin is like the two ends of a cable, without the cable
1. Plug iTwin into
USB port and share
your files and
folders.
2. Detach one half. 3.Plug that half into
another computer and
files are transferred
securely via internet.
1. Back up your data from anywhere.
2. Don't pay for cloud storage. Don't
pay subscription fees for file
access.
3. You have all the storage you need on
your computer and home hard
drive.
4. Create your own personal cloud.
Secured by hardware-grade
encryption.
5. It is cross platform. Can work with
almost all present computer
operating systems.
With AES-256 hardware-
enabled encryption It's
as secure & simple.
Register for your iTwin disable
code.
Disable Code:
When you physically pair
two iTwin devices and
plug into a computer,
iTwin software requests
you to create an iTwin
Disable Code. It can be
think of as a suicide
trigger for the device. If
you lose one half of your
device, you simply provide
us this Disable code
(suicide trigger) and we
remotely disable your lost
half of your iTwin,
preventing any data loss.
1. When you plug iTwin into a computer for the first time,
iTwin software gets installed on the computer.
2. Requires a min 512 MB.
3. Requires 15 MB hard-disk space.
4. USB 2.0 port
5. Requires broad-band Internet access 1Mbps upload speed
recommended.
6. Need administrator rights to access. Can be uninstalled.
7. Automatic Updates.
No Storage Limitations
1. iTwin does not store any of your data on itself. iTwin is a
data access device between two computers.
2. The only limit is the size of your computer's hard drive. If
you have a 1 TB hard-drive and desire to access it
completely, you can do so with iTwin.
3. Any network files folders that you can access from your
computer can be shared using iTwin. Network sharing.
4. No "Temp Files“ Unplug iTwin and all temp files are
purged automatically. This is especially useful when using
a computer that does not belong to you.
Size and weight
•Length : 3.54 inches
(90 mm).
•Width : 0.82 inch (21
mm).
•Depth : 0.314 inch
(8.0 mm).
•Weight : 0.11 pound
(50g).
Operating Requirements
•Operating temperature:
32° to 158° F (0° to 70° C).
•Relative humidity: 5% to
95% non-condensing.
•Maximum operating
altitude: 10,000 feet (3000
m).
LED Indicator
LED lights indicate status.
•Constant Blue light : iTwin is fully functional.
•Blinking Blue light : on-going data transfer.
•Constant red light : error.
Transfer Limits
1. Unlike many cloud based storage services, iTwin allows
you to transfer as much data as you want.
2. The only constraint is the limit of your ISP's bandwidth
allowances.
3. With iTwin, you don't need to worry about monthly
allowances or bandwidth limits when you transfer large files
online.
1. iTwin detects almost all types of proxies, firewalls and
NATs and self-configures.
2. In case, one or both iTwin are not directly accessible
(behind firewalls), iTwin encrypted data traffic is
relayed through globally distributed servers. (amazon
EC2 based).
3. iTwin uses Amazon Web Services infrastructure with
99.5% availability to ensure fast, safe and secure data
relays.
1. In case of Internet disruption, iTwin file transfers pause.
2. When the internet connection is resumed, iTwin software
continues the file transfer from where it left off.
3. iTwin's progress bar indicates the amount left to be
transferred.
1. All data is encrypted before it leaves your computer.
2. Your data remains encrypted until it reaches the
computer to which the second half of iTwin is attached.
3. Your data is never stored on any iTwin SERVER. Your
data is stored only on your computer.
1. As doesn't store any data on itself. Your remote data
can only be accessed if you have the physical iTwin with
you. You can set up your iTwin to require a password.
2. Two iTwins together generate a random 256-bit AES
key, everytime they are physically paired and plugged
into a computer.
3. Advanced Encryption Standard (AES) 256 bit encryption is
used to protect all data communication & its standard has
not been broken so far and many consider AES to be
military grade.
1. Passwords of any length can be set. iTwin's password is
stored on itself, not on any server.
2. If you forget your password, simply pair both halves of
your iTwin, plug them into a computer and set a new
password. No need for tech support!
1. Two iTwins together generate a random 256-bit AES
key, every time they are physically paired and plugged
into a computer.
2. Smart Key generation is assisted by the computer to add
randomness.
3. Smart crypto key resides only on the two halves of the
paired iTwin.
4. Smart Crypto key is used for encrypting all data traffic
between two iTwins.
1. Before allowing any data transfer, every iTwin is
authenticated by iTwin's TwinTrust servers.
2. All communication between iTwin and TwinTrust is
secured using industry strength HTTPS (RSA 1024 bit,
128 bit RC4) protocol.
3. After successful authentication by TwinTrust,
TwinTrust assist iTwin to discover its other half.
4. After authenticating with TwinTrust, two halves of
iTwin mutually authenticate each other using their pre-
shared AES 256 bit crypto key.
5. If password is set, then verification is performed on
both iTwins before data transfer is initiated.
i-Twin-Limitless-Pendrive-Technology.ppt
i-Twin-Limitless-Pendrive-Technology.ppt

More Related Content

Similar to i-Twin-Limitless-Pendrive-Technology.ppt

BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSMd Abu Syeem Dipu
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdf
ssusera1b6c7
 
Week13
Week13Week13
Week13
Satosyu
 
Week13
Week13Week13
Week13
Satosyu
 
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overviewPraetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
Brent Bernard, CISSP & PCI-QSA
 
Preatorian Secure partners with Cipher loc - New Encryption Technology
Preatorian Secure partners with Cipher loc -  New Encryption Technology Preatorian Secure partners with Cipher loc -  New Encryption Technology
Preatorian Secure partners with Cipher loc - New Encryption Technology
Austin Ross
 
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overviewPraetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
Brent Bernard, CISSP & PCI-QSA
 
Nexetic Shield Backup for Windows & MAC
Nexetic Shield Backup for Windows & MACNexetic Shield Backup for Windows & MAC
Nexetic Shield Backup for Windows & MAC
Nexetic Ltd
 
Nexetic Shield Backup for Windows & MAC
Nexetic Shield Backup for Windows & MACNexetic Shield Backup for Windows & MAC
Nexetic Shield Backup for Windows & MAC
Nexetic Ltd
 
Ce hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computersCe hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computers
Vi Tính Hoàng Nam
 
Power point presentation on cyber security
Power point presentation on cyber securityPower point presentation on cyber security
Power point presentation on cyber security
VaishnaviGunji
 
Week13
Week13Week13
Week13
Satosyu
 
Week13
Week13Week13
Week13
Satosyu
 
Week13
Week13Week13
Week13
Satosyu
 
Week13
Week13Week13
Week13
Satosyu
 
Simplifying IoT by Solving Software Complexity at the Edge
Simplifying IoT by Solving Software Complexity at the EdgeSimplifying IoT by Solving Software Complexity at the Edge
Simplifying IoT by Solving Software Complexity at the Edge
Samy Fodil
 
cisco-nti-Day20
cisco-nti-Day20cisco-nti-Day20
cisco-nti-Day20
eyad alaa
 
VPN
VPNVPN
Nexetic Shield Backup for Windows & MAC
Nexetic Shield Backup for Windows & MACNexetic Shield Backup for Windows & MAC
Nexetic Shield Backup for Windows & MAC
Tommi Tanttu
 

Similar to i-Twin-Limitless-Pendrive-Technology.ppt (20)

BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdf
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overviewPraetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
 
Praetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_OverviewPraetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_Overview
 
Preatorian Secure partners with Cipher loc - New Encryption Technology
Preatorian Secure partners with Cipher loc -  New Encryption Technology Preatorian Secure partners with Cipher loc -  New Encryption Technology
Preatorian Secure partners with Cipher loc - New Encryption Technology
 
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overviewPraetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
 
Nexetic Shield Backup for Windows & MAC
Nexetic Shield Backup for Windows & MACNexetic Shield Backup for Windows & MAC
Nexetic Shield Backup for Windows & MAC
 
Nexetic Shield Backup for Windows & MAC
Nexetic Shield Backup for Windows & MACNexetic Shield Backup for Windows & MAC
Nexetic Shield Backup for Windows & MAC
 
Ce hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computersCe hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computers
 
Power point presentation on cyber security
Power point presentation on cyber securityPower point presentation on cyber security
Power point presentation on cyber security
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Simplifying IoT by Solving Software Complexity at the Edge
Simplifying IoT by Solving Software Complexity at the EdgeSimplifying IoT by Solving Software Complexity at the Edge
Simplifying IoT by Solving Software Complexity at the Edge
 
cisco-nti-Day20
cisco-nti-Day20cisco-nti-Day20
cisco-nti-Day20
 
VPN
VPNVPN
VPN
 
Nexetic Shield Backup for Windows & MAC
Nexetic Shield Backup for Windows & MACNexetic Shield Backup for Windows & MAC
Nexetic Shield Backup for Windows & MAC
 

More from tpvvsreenivasarao

SOFTWAREENGINEERING CONCEPTS INJNTUK MO
SOFTWAREENGINEERING CONCEPTS INJNTUK  MOSOFTWAREENGINEERING CONCEPTS INJNTUK  MO
SOFTWAREENGINEERING CONCEPTS INJNTUK MO
tpvvsreenivasarao
 
CNS_06 DES ALGORITHM AND ITS IMPLEMENTAT
CNS_06 DES ALGORITHM AND ITS IMPLEMENTATCNS_06 DES ALGORITHM AND ITS IMPLEMENTAT
CNS_06 DES ALGORITHM AND ITS IMPLEMENTAT
tpvvsreenivasarao
 
ch-15 Key-Management IN CNS STUDENTSASEE
ch-15 Key-Management IN CNS STUDENTSASEEch-15 Key-Management IN CNS STUDENTSASEE
ch-15 Key-Management IN CNS STUDENTSASEE
tpvvsreenivasarao
 
ch-13 Digital Signature FOR CNS STUDENTS
ch-13 Digital Signature FOR CNS STUDENTSch-13 Digital Signature FOR CNS STUDENTS
ch-13 Digital Signature FOR CNS STUDENTS
tpvvsreenivasarao
 
AI algorithms with alpha beta stratagy 1
AI algorithms with alpha beta stratagy 1AI algorithms with alpha beta stratagy 1
AI algorithms with alpha beta stratagy 1
tpvvsreenivasarao
 
concepts-of-computer.ppt
concepts-of-computer.pptconcepts-of-computer.ppt
concepts-of-computer.ppt
tpvvsreenivasarao
 
lec-9.pptx
lec-9.pptxlec-9.pptx
lec-9.pptx
tpvvsreenivasarao
 
CSE WIBREE ppt.ppt
CSE WIBREE ppt.pptCSE WIBREE ppt.ppt
CSE WIBREE ppt.ppt
tpvvsreenivasarao
 

More from tpvvsreenivasarao (8)

SOFTWAREENGINEERING CONCEPTS INJNTUK MO
SOFTWAREENGINEERING CONCEPTS INJNTUK  MOSOFTWAREENGINEERING CONCEPTS INJNTUK  MO
SOFTWAREENGINEERING CONCEPTS INJNTUK MO
 
CNS_06 DES ALGORITHM AND ITS IMPLEMENTAT
CNS_06 DES ALGORITHM AND ITS IMPLEMENTATCNS_06 DES ALGORITHM AND ITS IMPLEMENTAT
CNS_06 DES ALGORITHM AND ITS IMPLEMENTAT
 
ch-15 Key-Management IN CNS STUDENTSASEE
ch-15 Key-Management IN CNS STUDENTSASEEch-15 Key-Management IN CNS STUDENTSASEE
ch-15 Key-Management IN CNS STUDENTSASEE
 
ch-13 Digital Signature FOR CNS STUDENTS
ch-13 Digital Signature FOR CNS STUDENTSch-13 Digital Signature FOR CNS STUDENTS
ch-13 Digital Signature FOR CNS STUDENTS
 
AI algorithms with alpha beta stratagy 1
AI algorithms with alpha beta stratagy 1AI algorithms with alpha beta stratagy 1
AI algorithms with alpha beta stratagy 1
 
concepts-of-computer.ppt
concepts-of-computer.pptconcepts-of-computer.ppt
concepts-of-computer.ppt
 
lec-9.pptx
lec-9.pptxlec-9.pptx
lec-9.pptx
 
CSE WIBREE ppt.ppt
CSE WIBREE ppt.pptCSE WIBREE ppt.ppt
CSE WIBREE ppt.ppt
 

Recently uploaded

Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 

Recently uploaded (20)

Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 

i-Twin-Limitless-Pendrive-Technology.ppt

  • 1. iTwin let's you access your files from anywhere, simply & securely Sree vidhya,II CSE, VIKAS COLLEGE OF ENGINEERING & TECHNOLOGY
  • 2.
  • 3.
  • 4. It is a device that allows its users to share files from computer to computer without installing or configuring any software or USB’s or the cables.  It provides a simple plug and play remote file access. Bi-Directional File Access: connection between the 2 computers is completely symmetrical. . Electrical and Electronic Engineering from IIT in Chennai and a Masters degree from IISc in Bangalore. FOUNDER & DESIGNER iTwin is like the two ends of a cable, without the cable
  • 5. 1. Plug iTwin into USB port and share your files and folders. 2. Detach one half. 3.Plug that half into another computer and files are transferred securely via internet.
  • 6.
  • 7.
  • 8. 1. Back up your data from anywhere. 2. Don't pay for cloud storage. Don't pay subscription fees for file access. 3. You have all the storage you need on your computer and home hard drive. 4. Create your own personal cloud. Secured by hardware-grade encryption. 5. It is cross platform. Can work with almost all present computer operating systems. With AES-256 hardware- enabled encryption It's as secure & simple.
  • 9. Register for your iTwin disable code. Disable Code: When you physically pair two iTwin devices and plug into a computer, iTwin software requests you to create an iTwin Disable Code. It can be think of as a suicide trigger for the device. If you lose one half of your device, you simply provide us this Disable code (suicide trigger) and we remotely disable your lost half of your iTwin, preventing any data loss.
  • 10. 1. When you plug iTwin into a computer for the first time, iTwin software gets installed on the computer. 2. Requires a min 512 MB. 3. Requires 15 MB hard-disk space. 4. USB 2.0 port 5. Requires broad-band Internet access 1Mbps upload speed recommended. 6. Need administrator rights to access. Can be uninstalled. 7. Automatic Updates.
  • 11. No Storage Limitations 1. iTwin does not store any of your data on itself. iTwin is a data access device between two computers. 2. The only limit is the size of your computer's hard drive. If you have a 1 TB hard-drive and desire to access it completely, you can do so with iTwin. 3. Any network files folders that you can access from your computer can be shared using iTwin. Network sharing. 4. No "Temp Files“ Unplug iTwin and all temp files are purged automatically. This is especially useful when using a computer that does not belong to you.
  • 12. Size and weight •Length : 3.54 inches (90 mm). •Width : 0.82 inch (21 mm). •Depth : 0.314 inch (8.0 mm). •Weight : 0.11 pound (50g). Operating Requirements •Operating temperature: 32° to 158° F (0° to 70° C). •Relative humidity: 5% to 95% non-condensing. •Maximum operating altitude: 10,000 feet (3000 m).
  • 13. LED Indicator LED lights indicate status. •Constant Blue light : iTwin is fully functional. •Blinking Blue light : on-going data transfer. •Constant red light : error. Transfer Limits 1. Unlike many cloud based storage services, iTwin allows you to transfer as much data as you want. 2. The only constraint is the limit of your ISP's bandwidth allowances. 3. With iTwin, you don't need to worry about monthly allowances or bandwidth limits when you transfer large files online.
  • 14. 1. iTwin detects almost all types of proxies, firewalls and NATs and self-configures. 2. In case, one or both iTwin are not directly accessible (behind firewalls), iTwin encrypted data traffic is relayed through globally distributed servers. (amazon EC2 based). 3. iTwin uses Amazon Web Services infrastructure with 99.5% availability to ensure fast, safe and secure data relays.
  • 15. 1. In case of Internet disruption, iTwin file transfers pause. 2. When the internet connection is resumed, iTwin software continues the file transfer from where it left off. 3. iTwin's progress bar indicates the amount left to be transferred. 1. All data is encrypted before it leaves your computer. 2. Your data remains encrypted until it reaches the computer to which the second half of iTwin is attached. 3. Your data is never stored on any iTwin SERVER. Your data is stored only on your computer.
  • 16. 1. As doesn't store any data on itself. Your remote data can only be accessed if you have the physical iTwin with you. You can set up your iTwin to require a password. 2. Two iTwins together generate a random 256-bit AES key, everytime they are physically paired and plugged into a computer. 3. Advanced Encryption Standard (AES) 256 bit encryption is used to protect all data communication & its standard has not been broken so far and many consider AES to be military grade.
  • 17. 1. Passwords of any length can be set. iTwin's password is stored on itself, not on any server. 2. If you forget your password, simply pair both halves of your iTwin, plug them into a computer and set a new password. No need for tech support!
  • 18. 1. Two iTwins together generate a random 256-bit AES key, every time they are physically paired and plugged into a computer. 2. Smart Key generation is assisted by the computer to add randomness. 3. Smart crypto key resides only on the two halves of the paired iTwin. 4. Smart Crypto key is used for encrypting all data traffic between two iTwins.
  • 19.
  • 20. 1. Before allowing any data transfer, every iTwin is authenticated by iTwin's TwinTrust servers. 2. All communication between iTwin and TwinTrust is secured using industry strength HTTPS (RSA 1024 bit, 128 bit RC4) protocol. 3. After successful authentication by TwinTrust, TwinTrust assist iTwin to discover its other half. 4. After authenticating with TwinTrust, two halves of iTwin mutually authenticate each other using their pre- shared AES 256 bit crypto key. 5. If password is set, then verification is performed on both iTwins before data transfer is initiated.