Leonid demonstrates a Silent Alarm for Stolen Laptops. I was originally #29, but finally presented in the 40s. You will find more information about my company at http://www.crashproofsolutions.com I intend to re-record this demo as I originally intended to show it. The network on-stage was too fast, which made the demo run extremely fast. As the entire product has no user interface by design, it was a challenge to slow it down. In the demo, we have a secret document F:\secret.jpg that exposes our cat-loving secretary as a wannabe dictator. We detected the system is authorized to receive its key and transmitted the decryption key remotely. That unlocked the F:\ TrueCrypt container. We also demonstrated SMS alerts and SMS two factor authentication powered by Twilio. Unfortunately, the resolution was too high to show the Twilio response. We developed this technology to address the challenge of unencrypted data on stolen laptops. Our competitors focus on recovering the laptop hardware. We focus on making sure the customer is not exposed to a lawsuit liability due to unencrypted documents.

Leonid demonstrates a Silent Alarm for Stolen Laptops. I was originally #29, but finally presented in the 40s. You will find more information about my company at http://www.crashproofsolutions.com I intend to re-record this demo as I originally intended to show it. The network on-stage was too fast, which made the demo run extremely fast. As the entire product has no user interface by design, it was a challenge to slow it down. In the demo, we have a secret document F:\secret.jpg that exposes our cat-loving secretary as a wannabe dictator. We detected the system is authorized to receive its key and transmitted the decryption key remotely. That unlocked the F:\ TrueCrypt container. We also demonstrated SMS alerts and SMS two factor authentication powered by Twilio. Unfortunately, the resolution was too high to show the Twilio response. We developed this technology to address the challenge of unencrypted data on stolen laptops. Our competitors focus on recovering the laptop hardware. We focus on making sure the customer is not exposed to a lawsuit liability due to unencrypted documents.

September 16, 2012 at 9:48pm on TechCrunch TV 17,042 followers

Flag this content

Please select your reason for flagging this video as inappropriate from the dropdown below. We promise to review each and every submission within 24-48 hours.

If you are a copyright owner, or are authorized to act on behalf of one or authorized to act under any exclusive right under copyright, please do not flag this content but instead report alleged copyright violations on our DMCA notice form.

Cancel or
TechCrunch TV

TechCrunch TV

News - Other News

17,042 followers 6,176,457 views
TechCrunch is a leading technology media property, dedicated to obsessively profiling startups, reviewing new Internet products, and breaking tech news.