Trusted Encrypted File (TEF)

From Deletionpedia.org: a home for articles deleted from Wikipedia
Jump to: navigation, search
This article was considered for deletion at Wikipedia on February 28 2017. This is a backup of Wikipedia:Trusted_Encrypted_File_(TEF). All of its AfDs can be found at Wikipedia:Special:PrefixIndex/Wikipedia:Articles_for_deletion/Trusted_Encrypted_File_(TEF), the first at Wikipedia:Wikipedia:Articles_for_deletion/Trusted_Encrypted_File_(TEF). Purge

oooh, orphan

Template:Infobox file format

TEF[1] stands for “Trusted Encrypted File” and is the format used by Circles of Trust[2] to denote that a file has been encrypted for a particular Circle. If you have the Trust Edit[3] client installed on your computer, .tef files belonging to a Circle of which you are a member will not appear as a .tef file, instead the file would have a Circles of Trust badge in the bottom corner to indicate that the file you are looking at is indeed encrypted.

Overview

TEF stands for “Trusted Encrypted File”[4] and is the format used by Circles of Trust to denote that a file has been encrypted for a particular Circle. If you have the Trust Edit[3] client installed on your computer, .tef files belonging to a Circle of which you are a member will not appear as a .tef file, instead the file would have a Circles of Trust badge in the bottom corner to indicate that the file you are looking at is indeed encrypted. If you have Trust Edit installed on your computer, and the file still appears as a .tef, then there are a few reasons why this may be:

  1. You are not a member of the Circle protecting that file. contact whoever sent you the file and request an invitation.
  2. You have a pending invitation to join the Circle. Open your Circles of Trust application and accept the invitation.
  3. The file has been marked as View Only.[5] The file must be opened using the Trust View reader application.

Intellectual property

CryptoMill Technologies[6] is the owner / creator of the TEF file (Trusted Encrypted File).
CryptoMill Technologies is an innovative security software company, with disruptive technologies that address security and privacy related issues from the edge to the.[7]
CryptoMill suite[8] of security software eliminates the risks associated with data breaches from a hacker attack on Network, Cloud[7] (any cloud), Emails, as well as data leaks through lost or stolen devices.

Software

Levels of Access:[8] Trust Edit empowers users to collaborate securely. Trust View creates a view-only sandbox, that prevents the copying and forwarding of your data to untrusted parties. Web View[9] provides instant secure view access from any web browser, without the need to install any plug-ins or software.
Product Overview: Circles of Trust is an enterprise security software system that eliminates the risks associated with data breaches from a hacker attack on network, cloud (any cloud), or emails, as well data leaks through lost or stolen devices.
Using CryptoMill Trust boundary[10] technology, data is cryptographically bound to a select group of users and devices. Circles of Trust employs folder-centric file encryption[11] to provide an intuitive “trusted-circle” document sharing capability. The application encrypts files in a user’s specific folders, protecting each one within a Circle of Trust. Once protected, the files can be shared and used by only members of the Circle. If a protected file ends up in the wrong hands (a non-member), it is unreadable and unusable - it stays protected and cannot be decrypted.
Circles of Trust supports all file formats[12] - no plugins required. It offers central management, multiple device sync, mobile device readers and protection of cloud storage.
Circles of Trust security capability is API-driven and can be integrated with existing business processes. Encryption can be automated so that any time sensitive data is exported, it is protected. You also have the ability to revoke access to any files anytime, anywhere.

References

  1. "What is a TEF file?" http://cryptomill.com/what-is-a-tef.html
  2. "Circles of Trust". CryptoMill Technologies Cybersecurity Solutions. August 2014. http://cryptomill.com/cryptomill-circles-of-trust.html. 
  3. 3.0 3.1 "Trust Edit - Levels of Access". CryptoMill Technologies Cybersecurity Solutions. http://cryptomill.com/cryptomill-circles-of-trust.html#levelsofaccess. 
  4. "What is a TEF file?". CryptoMill Technologies Cybersecurity Solutions. http://cryptomill.com/what-is-a-tef.html. 
  5. "Trust View - Levels of Access". CryptoMill Technologies Cybersecurity Solutions. http://cryptomill.com/cryptomill-circles-of-trust.html#levelsofaccess. 
  6. "CryptoMill About Page". CryptoMill Technologies Cybersecurity Solutions. http://cryptomill.com/cryptomill-company.html#top. 
  7. 7.0 7.1 "Circles of Trust Cloud Protection". CryptoMill Technologies Cybersecurity Solutions. http://cryptomill.com/cryptomill-circles-of-trust.html#dataprotectioneverywhere. 
  8. 8.0 8.1 "Levels of Access". CryptoMill Technologies Cybersecurity Solutions. http://cryptomill.com/cryptomill-circles-of-trust.html#levelsofaccess. 
  9. "Web View - Levels of Access". CryptoMill Technologies Cybersecurity Solutions. http://cryptomill.com/cryptomill-circles-of-trust.html#levelsofaccess. 
  10. "Trust Boundary". http://cryptomill.com/cryptomill-circles-of-trust.html#pwesupportallfileformats. 
  11. "folder-centric file encryption". CryptoMill Technologies Cybersecurity Solutions. https://www.cryptomill.com/cryptomill-circles-of-trust.html#pseamlessandtransparent. 
  12. "Support all file formats". CryptoMill Technologies Cybersecurity Solutions. http://cryptomill.com/cryptomill-circles-of-trust.html#pwesupportallfileformats. 

External links

This page could use some categorization… if it was still on Wikipedia. On Deletionpedia.org, we don't really care so much.