Click here for Public PGP key.
Contact: mailhead [at] unchartedcharters.com
A web application that allows to upload TMX files to a server for viewing over the network. Once deployed, users go to http://server:port/tmx to get the index page. The rest is self explanatory. The latest version also supports .tbx files. Maximum tested file size was just over 8MB with about 15 000 entries. Files are uploaded into the directory "uploads" under "user.home". The folder will be created on first use if it does not exist. The content of a tmx file is displayed in a table that has as many columns as the tmx has languages (xml:lang attribute values). In the latest version, of 8/8/2016, a parameter in the web xml was added. The parameter "edit" is set to "false" by default, which removes the table onclick event. If you want users to be able to edit a tmx, change the web xml parameter to "true". To edit an entry, click it, and make the desired change. When the mouse cursor leaves the text field, the change is sent to the server. The changed file is saved under the name "output.tmx". NOTE: In this initial version, there is no synchronization for different concurrent users. You can, however, collaborate using the output.tmx (rename a desired file to output.tmx). Download the .war file here. or get the Netbeans sources Netbeans sources with all libraries and build it yourself. Requirements: Java 1.8 and Tomcat 8.x (8.0.27 or higher, or equivalent). The TmxViewer is brought to you by http://www.vigoursoft.com/
The term "key" is used here instead of "cipher". Cipher just sounds odd and off-putting. Grandma does not need this, and key is the conceptual bridge to the hide-a-key for the house.How much text can you process in one operation? Around 1 MB, which is, for example, the plain text version of Mark Twain's Huckleberry Finn.
Hide-a-KeyText removes the scary and confusing parts of setting up usable encryption. Trade-offs exist, of course. For instance, cryptography experts would point out that the quality of the encryption varies depending on the web page or the image used as keys.. Click here for the executable program for end users. Click here for the Netbeans source project.
When you start Hide-a-KeyText, default values are set for the four fields above the message text area. This is a convenience feature. For later use, set up your own values as described right below.
Click Settings, Users, and click anywhere on the row of the Test user. Then click Use current row in Main window to transfer the data into the four fields above the text message ara of the main Hide-a-KeyText window. Close the Users window.
In the main window, you can now click Scramble to see how the text type message here is scrambled. Click Unscramble to get the text back.
Delete type message here (Edit, Delete), and type your own message.
When you are done, open your preferred webmail, hit Compose, copy the scrambled text into the webmail text window. Add the recipient, send the mail.
This feature is useful for sending a public PGP key to someone without triggering an email scanner that says "oh, a PGP key, let me make a note to check future emails of this person".
The Fake Language setting is not critical but it must be the same on your machine and on that of the recipient. Leave as is is fine. If you select any of the other options, your scrambled text pretends to be the selected language or "alphabet".
|Website or local filename from default users table||Output||Comments|
|http://www.unchartedcharters.com/TrueRandomText.xml||188 175 180 220 144 166 219 186 172 172 202 171 81 183 181 167 158||This xml file has truly random strings, which makes it a very secure key. The 3 digit numbers are a result of the English alphabet text. The file is from the FREE services section of www.random.org. If you want to use this keytext to communicate with someone, you must transmit this exact file to the recipient first.|
|http://www.unchartedcharters.com||1196 1206 1189 1189 1111 204 1181 1197 1210 1183 1193 196 1113 1181 1187 1188 1190||The 4 digit numbers are a result of the Russian text at the end of the web page.|
|http://www.unchartedcharters.com/phili09.png||309 314 305 292 220 288 275 285 309 283 287 287 210 264 259 274 267||The pixel values of an image are between 0 and 255. This results in a 3 digit encryption output for an English text. The best images to use as "keys" are noisy, very busy images, in which colors and shapes change a lot.|
|/localimagekeys/randompixels1.png||263 230 152 262 288 258 334 308 329 155 299 146 256 358 161 278 162||The file randompixels1.png contains pixel values generated using the Java SecureRandom class.|
|http://www.asahi.com/articles/ASGCL5TPMGCLUTFK00W.html||12493 12535 12468 12491 12460 12482 35804 20560 12541 12521 12498 32105 26497 38659 22370 12509 12504||5 digit encrypted output because the Japanese page characters in Unicode start very high up.|
Images are now downloaded into their own local folder localimagekeys to help better organize everything.
Finally, the .png files with the encrypted text also have their own folder encrypted_text_output.
Do not change theses folder names. We'll make them configurable later.
Why this is useful? If grandma is afraid to make a mistake in the copy/paste method, she can now Compose a new email and attach the encrypted file. The subject should not say anything about the attachment. The message text shoud be a simple "hi from grandma".
Note that the format of this image file will change in one of the next versions. This first cut wastes a lot of space in the image.
Once Hide-a-KeyText has downloaded an image, you can set it as a local file as shown in the example entry
Downloaded image local. If you use the same image to encrypt more text, the process will be faster because
no connection to the web is made.