
 Invisible Secrets 2.01, free version 
 Developed and copyright (c) 1999 by Secretec Software
 All Rights Reserved.

 Distributed by InnovaTools
 The Home of Innovative Computer Tools & Solutions
 http://www.innovatools.com


 CONTENTS
 
 1. Disclaimer
 2. What is Invisible Secrets?
 3. The Sponsored Edition
 4. Installing Invisible Secrets 2.0
 5. What is new in Version 2.0
 6. Contacting the Author
 
 
 1. DISCLAIMER
 
 (I) WARRANTY LIMITATIONS

    THIS SOFTWARE AND THE ACCOMPANYING FILES ARE SOLD "AS IS" AND 
 WITHOUT WARRANTIES AS TO PERFORMANCE OR MERCHANTABILITY OR ANY OTHER 
 WARRANTIES WHETHER EXPRESSED OR IMPLIED. Because of the various 
 hardware and software environments into which Invisible Secrets 
 may be put, NO WARRANTY OF FITNESS FOR A PARTICULAR PURPOSE IS OFFERED.
   Good data processing procedure dictates that any program be 
 horoughly tested with non-critical data before relying on it. 
 The user must assume the entire risk of using the program. 
 ANY LIABILITY OF THE SELLER WILL BE LIMITED EXCLUSIVELY TO PRODUCT 
 REPLACEMENT OR REFUND OF PURCHASE PRICE.


 (II) CRYPTOGRAPHY RESTRICTIONS 

   WE ARE NOT LIABLE FOR ANY FORBIDDEN EXPORT,IMPORT, OR USE OF 
 "INVISIBLE SECRETS". 

   THE U.S. GOVERNMENT CLASSIFIES ENCRYPTION SOFTWARE AS DANGEROUS
 MUNITIONS. ENCRYPTION SOFTWARE HAS RESTRICTIONS FOR EXPORT 
 ONLY FOR U.S. VENDORS. THERE ARE NO RESTRICTIONS ON IMPORTING 
 CRYPTOGRAPHIC PRODUCTS INTO THE U.S. 

   THE U.S. GOVERNMENT CLASSIFIES ENCRYPTION SOFTWARE AS DANGEROUS
 MUNITIONS. ENCRYPTION SOFTWARE HAS RESTRICTIONS FOR EXPORT.
 BECAUSE OF THE CRYPTOGRAPHY ALGORITHM IMPLEMENTED IN INVISIBLE
 SECRETS IT IS REGARDED AS "STRONG CRYPTOGRAPHY".

 THE UNREGISTERED VERSION OF THIS SOFTWARE RESTRICTS KEY LENGTH
 TO ONLY 5 CHARACTERS (40-BITS). THEREFORE THE UNREGISTERED VERSION
 OF INVISIBLE SECRETS IS RE-EXPORTABLE FROM THE U.S.

 (III) JURISDICTION

   This agreement shall be governed by the laws of Romania. Valid in
 all questions of law is the Romanian law and the Romanian
 jurisdiction. All users of this software agree to the Romanian law
 and the Romanian jurisdiction.

   Any action or proceeding brought by anyone arising out of or related
 to these terms and conditions shall be brought only in a court of 
 competent jurisdiction located in Oradea, Romania, and the parties
 hereby consent to the jurisdiction and venue of said court.

 (IV) ACKNOWLEDGMENT
 
   BY INSTALLING AND USING THIS SOFTWARE, YOU ARE AGREEING TO BE 
 BOUND BY ALL THE TERMS AND CONDITIONS OF THIS AGREEMENT. IF YOU 
 DO NOT AGREE TO THESE TERMS, PROMPTLY DESTROY ALL COPIES OF THE 
 SOFTWARE IN YOUR POSSESSION.
 
 2. WHAT IS "INVISIBLE SECRETS 2.0"?
 
   The only way to secure your data, and make it readable only to 
 authorized persons, is to use strong cryptography and a password 
 long enough to resist any brute-force attacks... But is this enough ?...

   Many cryptographic programs just transforms data into an unreadble
 encrypted data saving it as an usual file. If someone takes a look at 
 that file, will soon understand that it is an encoded message 
 - since it doesnt have any meaning - and will try to break the code.

 Invisible Secrets 2.0 offers you the possibility to encrypt and hide 
 files in other files (carriers) which are not suspect of encryption.
 First, Invisible Secrets will encrypt the sensitive data using a 
 specified password and cryptosystem (algorithm). After the encryption, 
 the chipertext will be inserted in the carrier. The resulted carrier 
 (which contains the real message) can be attached to an email message 
 (which is a fake message), or published on a web page near hundreds of 
 other pictures (or other carriers) from where the addressee (the only 
 person who knows which is the right image) can download it without 
 revealing his/hers identity.

 This method has the advantage of making the message almost invisible, 
 and considerably raise the work of any experienced code-breaker, 
 who must first find the right carrier, extract the message from it, 
 and only after that (if he gets this far) - the hard work of 
 breaking the code.
 
 3. THE SPONSORED EDITION

 This is free software. It is a sponsored software. You are hereby 
 licensed to use this software for unlimited time without charge. 
 If you would like to remove the advertisments and personalize the
 software you must purchase the registered version.
 The registered version allows passwords larger than 5 characters.
 
 4. INSTALLING INVISIBLE SECRETS 2.0

 To install Invisible Secrets 2.0, please run the invsecr2.exe file. 

 5. WHAT IS NEW IN VERSION 2.0

 - Invisible Secrets 2.0 is an easy-to-use yet a powerful 
   wizard-interfaced encryption/steganography program. 
 - It is also very flexible: The user can develop his own algorithms 
   or carriers and integrate them very easy in the program
 - Three Carriers: JPG, PNG (without any data length restriction) 
   and BMP (source data proportional with the size of the image).
 - Data compression before the encrypt/hide process 
 - Mail the resulted carrier after the process or place it somewhere 
   on the Internet through a FTP Connection.
 - A very well organized FTP Servers Library
 - Secured algorithms and carriers libraries through activation keys

 Invisible Secrets 2.0 includes all the features of the previous version:
 - strong encryption: Blowfish /CBC
 - fake messages generator
 - perfect local security: all the temporary files used in the 
   process are wiped out 
 - the posibility to wipe the source data or the original carrier 
   after the process
 Version 2.0 uses the complex wiping method - seven pass wiping with 
 randomly generated patterns which makes hardware recovery impossible.



 6. CONTACTING THE AUTHOR

 Invisible Secrets 2.0 (tm) is developed by Secretec Software
 and distributed by 
 
 InnovaTools
 The Home of Innovative Computer Tools & Solutions
 http://www.innovatools.com

 InnovaTools is specialized in distributing innovative and high quality
 software products. Visit the InnovaTools Web site to download great
 utilities that will help you work faster and better.

 Distributing innovation, this is what InnovaTools is all about.

 Invisible Secrets(tm) Home Page:
 http://www.innovatools.com/software/isecrets/

 Invisible Secrets(tm) Ordering Page:
 http://www.innovatools.com/buy/isecrets/

 Mail address:
 InnovaTools
 Ady Endre 66
 3700, Oradea
 Romania

 E-mail address for sales questions & support: secretec@innovatools.com
