SlideShare a Scribd company logo
1 of 22
iTwin let's you access your files from anywhere, simply & securely
Sree vidhya,II CSE,
VIKAS COLLEGE OF
ENGINEERING & TECHNOLOGY
It is a device that allows its users to share files from
computer to computer without installing or configuring any
software or USB’s or the cables.
 It provides a simple plug and play remote file access.
Bi-Directional File Access: connection between the 2
computers is completely symmetrical.
.
Electrical and Electronic Engineering
from IIT in Chennai and a Masters
degree from IISc in Bangalore.
FOUNDER & DESIGNER
iTwin is like the two ends of a cable, without the cable
1. Plug iTwin into
USB port and share
your files and
folders.
2. Detach one half. 3.Plug that half into
another computer and
files are transferred
securely via internet.
1. Back up your data from anywhere.
2. Don't pay for cloud storage. Don't
pay subscription fees for file
access.
3. You have all the storage you need on
your computer and home hard
drive.
4. Create your own personal cloud.
Secured by hardware-grade
encryption.
5. It is cross platform. Can work with
almost all present computer
operating systems.
With AES-256 hardware-
enabled encryption It's
as secure & simple.
Register for your iTwin disable
code.
Disable Code:
When you physically pair
two iTwin devices and
plug into a computer,
iTwin software requests
you to create an iTwin
Disable Code. It can be
think of as a suicide
trigger for the device. If
you lose one half of your
device, you simply provide
us this Disable code
(suicide trigger) and we
remotely disable your lost
half of your iTwin,
preventing any data loss.
1. When you plug iTwin into a computer for the first time,
iTwin software gets installed on the computer.
2. Requires a min 512 MB.
3. Requires 15 MB hard-disk space.
4. USB 2.0 port
5. Requires broad-band Internet access 1Mbps upload speed
recommended.
6. Need administrator rights to access. Can be uninstalled.
7. Automatic Updates.
No Storage Limitations
1. iTwin does not store any of your data on itself. iTwin is a
data access device between two computers.
2. The only limit is the size of your computer's hard drive. If
you have a 1 TB hard-drive and desire to access it
completely, you can do so with iTwin.
3. Any network files folders that you can access from your
computer can be shared using iTwin. Network sharing.
4. No "Temp Files“ Unplug iTwin and all temp files are
purged automatically. This is especially useful when using
a computer that does not belong to you.
Size and weight
•Length : 3.54 inches
(90 mm).
•Width : 0.82 inch (21
mm).
•Depth : 0.314 inch
(8.0 mm).
•Weight : 0.11 pound
(50g).
Operating Requirements
•Operating temperature:
32° to 158° F (0° to 70° C).
•Relative humidity: 5% to
95% non-condensing.
•Maximum operating
altitude: 10,000 feet (3000
m).
LED Indicator
LED lights indicate status.
•Constant Blue light : iTwin is fully functional.
•Blinking Blue light : on-going data transfer.
•Constant red light : error.
Transfer Limits
1. Unlike many cloud based storage services, iTwin allows
you to transfer as much data as you want.
2. The only constraint is the limit of your ISP's bandwidth
allowances.
3. With iTwin, you don't need to worry about monthly
allowances or bandwidth limits when you transfer large files
online.
1. iTwin detects almost all types of proxies, firewalls and
NATs and self-configures.
2. In case, one or both iTwin are not directly accessible
(behind firewalls), iTwin encrypted data traffic is
relayed through globally distributed servers. (amazon
EC2 based).
3. iTwin uses Amazon Web Services infrastructure with
99.5% availability to ensure fast, safe and secure data
relays.
1. In case of Internet disruption, iTwin file transfers pause.
2. When the internet connection is resumed, iTwin software
continues the file transfer from where it left off.
3. iTwin's progress bar indicates the amount left to be
transferred.
1. All data is encrypted before it leaves your computer.
2. Your data remains encrypted until it reaches the
computer to which the second half of iTwin is attached.
3. Your data is never stored on any iTwin SERVER. Your
data is stored only on your computer.
1. As doesn't store any data on itself. Your remote data
can only be accessed if you have the physical iTwin with
you. You can set up your iTwin to require a password.
2. Two iTwins together generate a random 256-bit AES
key, everytime they are physically paired and plugged
into a computer.
3. Advanced Encryption Standard (AES) 256 bit encryption is
used to protect all data communication & its standard has
not been broken so far and many consider AES to be
military grade.
1. Passwords of any length can be set. iTwin's password is
stored on itself, not on any server.
2. If you forget your password, simply pair both halves of
your iTwin, plug them into a computer and set a new
password. No need for tech support!
1. Two iTwins together generate a random 256-bit AES
key, every time they are physically paired and plugged
into a computer.
2. Smart Key generation is assisted by the computer to add
randomness.
3. Smart crypto key resides only on the two halves of the
paired iTwin.
4. Smart Crypto key is used for encrypting all data traffic
between two iTwins.
1. Before allowing any data transfer, every iTwin is
authenticated by iTwin's TwinTrust servers.
2. All communication between iTwin and TwinTrust is
secured using industry strength HTTPS (RSA 1024 bit,
128 bit RC4) protocol.
3. After successful authentication by TwinTrust,
TwinTrust assist iTwin to discover its other half.
4. After authenticating with TwinTrust, two halves of
iTwin mutually authenticate each other using their pre-
shared AES 256 bit crypto key.
5. If password is set, then verification is performed on
both iTwins before data transfer is initiated.
i-Twin-Limitless-Pendrive-Technology.ppt
i-Twin-Limitless-Pendrive-Technology.ppt

More Related Content

Similar to i-Twin-Limitless-Pendrive-Technology.ppt

BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSMd Abu Syeem Dipu
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdfssusera1b6c7
 
Preatorian Secure partners with Cipher loc - New Encryption Technology
Preatorian Secure partners with Cipher loc -  New Encryption Technology Preatorian Secure partners with Cipher loc -  New Encryption Technology
Preatorian Secure partners with Cipher loc - New Encryption Technology Austin Ross
 
Nexetic Shield Backup for Windows & MAC
Nexetic Shield Backup for Windows & MACNexetic Shield Backup for Windows & MAC
Nexetic Shield Backup for Windows & MACNexetic Ltd
 
Nexetic Shield Backup for Windows & MAC
Nexetic Shield Backup for Windows & MACNexetic Shield Backup for Windows & MAC
Nexetic Shield Backup for Windows & MACNexetic Ltd
 
Ce hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computersCe hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computersVi Tính Hoàng Nam
 
Simplifying IoT by Solving Software Complexity at the Edge
Simplifying IoT by Solving Software Complexity at the EdgeSimplifying IoT by Solving Software Complexity at the Edge
Simplifying IoT by Solving Software Complexity at the EdgeSamy Fodil
 
cisco-nti-Day20
cisco-nti-Day20cisco-nti-Day20
cisco-nti-Day20eyad alaa
 
Nexetic Shield Backup for Windows & MAC
Nexetic Shield Backup for Windows & MACNexetic Shield Backup for Windows & MAC
Nexetic Shield Backup for Windows & MACTommi Tanttu
 
Cubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit EncryptionCubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit EncryptionIan Ray
 

Similar to i-Twin-Limitless-Pendrive-Technology.ppt (20)

BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdf
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overviewPraetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
 
Preatorian Secure partners with Cipher loc - New Encryption Technology
Preatorian Secure partners with Cipher loc -  New Encryption Technology Preatorian Secure partners with Cipher loc -  New Encryption Technology
Preatorian Secure partners with Cipher loc - New Encryption Technology
 
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overviewPraetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
 
Praetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_OverviewPraetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_Overview
 
Nexetic Shield Backup for Windows & MAC
Nexetic Shield Backup for Windows & MACNexetic Shield Backup for Windows & MAC
Nexetic Shield Backup for Windows & MAC
 
Nexetic Shield Backup for Windows & MAC
Nexetic Shield Backup for Windows & MACNexetic Shield Backup for Windows & MAC
Nexetic Shield Backup for Windows & MAC
 
Ce hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computersCe hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computers
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Simplifying IoT by Solving Software Complexity at the Edge
Simplifying IoT by Solving Software Complexity at the EdgeSimplifying IoT by Solving Software Complexity at the Edge
Simplifying IoT by Solving Software Complexity at the Edge
 
cisco-nti-Day20
cisco-nti-Day20cisco-nti-Day20
cisco-nti-Day20
 
VPN
VPNVPN
VPN
 
Nexetic Shield Backup for Windows & MAC
Nexetic Shield Backup for Windows & MACNexetic Shield Backup for Windows & MAC
Nexetic Shield Backup for Windows & MAC
 
Cubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit EncryptionCubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit Encryption
 

Recently uploaded

microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 

Recently uploaded (20)

microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 

i-Twin-Limitless-Pendrive-Technology.ppt

  • 1. iTwin let's you access your files from anywhere, simply & securely Sree vidhya,II CSE, VIKAS COLLEGE OF ENGINEERING & TECHNOLOGY
  • 2.
  • 3.
  • 4. It is a device that allows its users to share files from computer to computer without installing or configuring any software or USB’s or the cables.  It provides a simple plug and play remote file access. Bi-Directional File Access: connection between the 2 computers is completely symmetrical. . Electrical and Electronic Engineering from IIT in Chennai and a Masters degree from IISc in Bangalore. FOUNDER & DESIGNER iTwin is like the two ends of a cable, without the cable
  • 5. 1. Plug iTwin into USB port and share your files and folders. 2. Detach one half. 3.Plug that half into another computer and files are transferred securely via internet.
  • 6.
  • 7.
  • 8. 1. Back up your data from anywhere. 2. Don't pay for cloud storage. Don't pay subscription fees for file access. 3. You have all the storage you need on your computer and home hard drive. 4. Create your own personal cloud. Secured by hardware-grade encryption. 5. It is cross platform. Can work with almost all present computer operating systems. With AES-256 hardware- enabled encryption It's as secure & simple.
  • 9. Register for your iTwin disable code. Disable Code: When you physically pair two iTwin devices and plug into a computer, iTwin software requests you to create an iTwin Disable Code. It can be think of as a suicide trigger for the device. If you lose one half of your device, you simply provide us this Disable code (suicide trigger) and we remotely disable your lost half of your iTwin, preventing any data loss.
  • 10. 1. When you plug iTwin into a computer for the first time, iTwin software gets installed on the computer. 2. Requires a min 512 MB. 3. Requires 15 MB hard-disk space. 4. USB 2.0 port 5. Requires broad-band Internet access 1Mbps upload speed recommended. 6. Need administrator rights to access. Can be uninstalled. 7. Automatic Updates.
  • 11. No Storage Limitations 1. iTwin does not store any of your data on itself. iTwin is a data access device between two computers. 2. The only limit is the size of your computer's hard drive. If you have a 1 TB hard-drive and desire to access it completely, you can do so with iTwin. 3. Any network files folders that you can access from your computer can be shared using iTwin. Network sharing. 4. No "Temp Files“ Unplug iTwin and all temp files are purged automatically. This is especially useful when using a computer that does not belong to you.
  • 12. Size and weight •Length : 3.54 inches (90 mm). •Width : 0.82 inch (21 mm). •Depth : 0.314 inch (8.0 mm). •Weight : 0.11 pound (50g). Operating Requirements •Operating temperature: 32° to 158° F (0° to 70° C). •Relative humidity: 5% to 95% non-condensing. •Maximum operating altitude: 10,000 feet (3000 m).
  • 13. LED Indicator LED lights indicate status. •Constant Blue light : iTwin is fully functional. •Blinking Blue light : on-going data transfer. •Constant red light : error. Transfer Limits 1. Unlike many cloud based storage services, iTwin allows you to transfer as much data as you want. 2. The only constraint is the limit of your ISP's bandwidth allowances. 3. With iTwin, you don't need to worry about monthly allowances or bandwidth limits when you transfer large files online.
  • 14. 1. iTwin detects almost all types of proxies, firewalls and NATs and self-configures. 2. In case, one or both iTwin are not directly accessible (behind firewalls), iTwin encrypted data traffic is relayed through globally distributed servers. (amazon EC2 based). 3. iTwin uses Amazon Web Services infrastructure with 99.5% availability to ensure fast, safe and secure data relays.
  • 15. 1. In case of Internet disruption, iTwin file transfers pause. 2. When the internet connection is resumed, iTwin software continues the file transfer from where it left off. 3. iTwin's progress bar indicates the amount left to be transferred. 1. All data is encrypted before it leaves your computer. 2. Your data remains encrypted until it reaches the computer to which the second half of iTwin is attached. 3. Your data is never stored on any iTwin SERVER. Your data is stored only on your computer.
  • 16. 1. As doesn't store any data on itself. Your remote data can only be accessed if you have the physical iTwin with you. You can set up your iTwin to require a password. 2. Two iTwins together generate a random 256-bit AES key, everytime they are physically paired and plugged into a computer. 3. Advanced Encryption Standard (AES) 256 bit encryption is used to protect all data communication & its standard has not been broken so far and many consider AES to be military grade.
  • 17. 1. Passwords of any length can be set. iTwin's password is stored on itself, not on any server. 2. If you forget your password, simply pair both halves of your iTwin, plug them into a computer and set a new password. No need for tech support!
  • 18. 1. Two iTwins together generate a random 256-bit AES key, every time they are physically paired and plugged into a computer. 2. Smart Key generation is assisted by the computer to add randomness. 3. Smart crypto key resides only on the two halves of the paired iTwin. 4. Smart Crypto key is used for encrypting all data traffic between two iTwins.
  • 19.
  • 20. 1. Before allowing any data transfer, every iTwin is authenticated by iTwin's TwinTrust servers. 2. All communication between iTwin and TwinTrust is secured using industry strength HTTPS (RSA 1024 bit, 128 bit RC4) protocol. 3. After successful authentication by TwinTrust, TwinTrust assist iTwin to discover its other half. 4. After authenticating with TwinTrust, two halves of iTwin mutually authenticate each other using their pre- shared AES 256 bit crypto key. 5. If password is set, then verification is performed on both iTwins before data transfer is initiated.