How To Encrypt Your Teach Secrets
You may think that keeping your secrets is a headache. Actually, they are not. Encrypting your Teach Packets is a matter of encrypting a single password.
Teach secret sends a web server announcement to your own address when a user makes a successful submission to a website (by clicking the submit button). This website authenticates the user by responding with a HTML form that contains a one-time password. If the form data is not properly verified the webserver returns an error alert.
Subsequently, encrypt the message data with a one-time password (TPM), and then store the encrypted data on the device. Also, encrypt the message data with a strong cryptographic algorithm to make it kind of impossible to decrypt.
The device configuration Option enables the encrypting of the message data with a particular algorithm for the TPM, which then creates a dedicated encryption algorithm for the webserver.
The PAM system uses a different encryption algorithm for the same reason.
The Teach I/O uses a hardware scheme to encrypt the data, which then authenticates the user via an external device, using the same method as the webserver.
This means that any user can securely send data to you, securely store data on your own system and securely receive data from you without ever needing to connect to the internet.
The user does not even need to know about crypto-security; all they have to do is use their own Teach I/O device and a Teach I/O application on their own computer.
Teachers, Students, and Parents can use one of many online messaging applications to communicate with their kids or students. You can also hook into their online games or hang out at their social networking site. You can even bounce your bounced email off to them or do Anything else you want to do with them.
The encrypted transmission of information ishooked into the system entirely by accident, when a student accidentally sends you a file instead of a question. Teachers and students bounce messages without even realizing it. One time, a student accidentally sent a file to a teacher who was not expecting it. The teacher opened the file and was horrified to see images of a sexual nature in the image. The backlash almost caused the student to drop out of school. Imagine what would have happened if the student had sent a diary-length sexually explicit email to their teacher instead of a question about a homework project. The teacher would have been more concerned, especially since the school is a likely target for a variety of predators, myself included.
The internet is an Easy Way to Handle Anything.
The internet is becoming a safe place for kids, and you as a parent have the right to monitor what your kids are doing on it. Hardware and software manufacturers made it easy for parents to monitor where their kids are surfing, and they made it easy to include parental controls so that you can protect your little monsters.
Sometimes, predators make a switch via cell phone or home computer. Sometimes they Citizen Mail anonymously, and many times, they use a fake IP address. When you see a strange website or image, take action, hook up your internet modem and call the customer service number right away.
This is how you can help save little Johnny’s life and make sure that you yourself have a safe browsing experience.