Privacy Blog

"Friends don’t let friends get spied on.' – Richard Stallman, President of the Free Software Foundation and longtime advocate of privacy in technology.

cb Time App Brings a Vault Hidden in a Clock

The best place to hide things often is in plain sight, especially if it looks like something else. Many companies will sell you things to hide money, jewelry or other physical items. I have seen books with hollowed out pages, all sorts of common-looking cans with screw-off bottoms, and other products that are disguised as one thing but actually are hiding places for your valued posssessions. Now a new app for iPhone, iPad, and iPod touch will do the same.

cb Time looks like a clock displayed on your mobile device’s screen. In fact, it IS a clock, displaying the current time and it also functions as an alarm clock. However, this clock also functions as as a safe, allowing you to place notes, voice memo recordings or documents in pre-defined folders (e.g. your credit card info). cb Time protects each single piece of data with the strongest available 256-Bit AES algorithm. The AES-256 Bit encryption is one of the worlds best data encryption systems, and is being used to secure industrial and military – documents under the highest level of secrecy.

If a thief gains access to your cell phone, do you think he or she will spend much time looking at the clock displayed in the screen to find valuable data?

cb Time also can be set to panic mode, which means that all data will be erased after five unsuccessful code entries. This way, you won’t ever have to worry about losing your phone again. In order to ensure the highest possible level of security, your data will not only be deleted, but also overwritten.

cb Time also has a clever method of setting the password that I doubt if any thief will ever figure out. Hint: it doesn’t use the keyboard.

For a very limited time, cb Time 1.0.4 is Free (regularly priced at 4.99 USD) and available worldwide exclusively through the App Store in the Utilities category.

Categories: Offline Privacy & Security, Online Privacy & Security

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.