Update: iZiSecure, the first patent has been filed

iZiSecure Technology

Update: The first patent application of iZiSecure has been filed at INPI on December 4th 2015. A patent of invention has been requested for the « Système d’authentification d’accès à formats d’entrée multiples, méthode et logiciels associés » aka “Access authentication system with multiple input formats, methods and associated software”.

Original story: What’s up with iZiSecure?  It’s been over a year since my last post on iZiSecure. Well, I’m happy to report that things are moving a bit faster now. There are only a few more steps from reaching our goal, a patent on the core system of iZiSecure.

Life without Facebook, would it be better?



Social networks are part of our lives. Or should I say they invade our lives to a point beyond our control. Instead of doing something about it, we are embracing those so-called social technologies even more and more everyday. Let’s talk about Facebook, the most popular social network to date. While some of us are aware of the danger of using Facebook, others seem to neglect the privacy issues and the consequences of putting too much trust in Facebook. Have you ever asked what Facebook (could) have done with your wall posts? pictures of yours? and of those you tagged? or every single detail of your personal life, like the high school you went to 10 years ago and whom you got married to last weekend?

Facebook’s privacy rules are not that easy for users to understand. Therefore, they can get lost very easily in the pile of complicated privacy setting. And that’s exactly when they decide to let their guard down and pretend that there was no risk at all. A mistake indeed. Not everyone is reading what you post on Facebook with good intention.

Bear in mind that what you posted on the internet, would stay there f-o-r-e-v-e-r ! :) And the latest “Google forget me policy” won’t probably be any help to you. Wait a second, what’s Google doing here? Well, Facebook features an option allowing Google to index its content. So what you posted on your wall might also end up in Google search results.

I’m not dramatizing the situation here, but I really think it’s time for you to seriously reconsider the matter and to take control of what you post and share on Facebook. It’s not too late. Go to your Facebook timeline; tweak your post privacy setting to “Friends” or to those with whom you would like to share. And it’s done (for now).

Without privacy concerns, I admit that Facebook is one great social tool. I myself, use Facebook on a regular basis. It helps me get in touch with my family and friends from different corners of the world. Facebook also makes me laugh thanks to those nonsense status messages, compromising pictures and videos, some of which don’t even belong to my friends. Why is that? Well, Facebook is not that smart to warn you that what you are about to post is for the whole world and not for only your friends. I know right (/sarcasm).

Facebook is not the only social network we have become dependent on. Some of us misunderstand what social networks are for, and in time, start to lose sight of what probably matters to us the most: real life, real friends and real conversation without having to use ton of smilies which don’t even make sense.

So stop reading this post right now, go out, grab a beer with your friends, socialize differently. Leave Facebook for a while, it will be still there when you are back, while your friends won’t if you leave them behind too often.


image credit : pixabay.com

PicKey : Redevenez le maître de vos données mises sur le Cloud en un seul clic


Update :
En comptant le nombre de votes, PicKey a fini 3ème dans la catégorie “Business de Demain” et 5ème du concours (219 projets).

Original story : 

Abandonnez vos mots de passe alphanumériques et adoptez une image pour crypter et sécuriser vos données sur les Cloud

Quand vous utilisez les services Cloud, gratuits ou payants, êtes-vous certains que vos données personnelles ne sont accessibles que par vous ? Qui sont réellement propriétaires de ces données, vous ou les fournisseurs de service Cloud ? Quand les attaques informatiques et les vols de données ont eu lieu, vos données restent-elles confidentielles et sécurisées ?

Protégez totalement vos données stockées dans les Cloud avec PicKey ! PicKey vous propose une solution la plus pragmatique et la plus sécurisée vous redonnant ainsi le contrôle total de vos données sur le Cloud (Google Drive, DropBox, One Drive, etc.).

PicKey vous facilite la vie ! L’utilisation de n’importe quelle image (JPG, PNG ou GIF) comme clé de cryptage vous permet de sécuriser vos données sur les Cloud.

Maître de vos données, vous aurez l’esprit tranquille avec seulement une image à retenir : les clés peuvent être facilement dissimulées parmi les milliards d’images en ligne sur Facebook, Twitter, Flikr, Picasa, etc.

Quelqu’un a volé votre image clé ? Pas de panique, vous seul(e), le(a) propriétaire de PicKey et de l’image clé pouvez décrypter les fichiers cryptés avec PicKey.

Si vous partagez notre vision sur la sécurité des données Cloud et souhaitez voter pour nous : 

– Visitez ce lien
– Cliquez J’AIME! tout en bas de la présentation du projet. Merci :)


Les technologies développées dans le cadre du projet PicKey tout comme les applications PicKey et la plateforme de gestion des clés Master sont issues de recherches spécifiques et de mise au point d’algorithmes propriétaires et de logiciels de cryptographie développés par l’ENSIM et l’équipe du projet (Jonathan COULON, Gweltaz LOQUIN et moi même). L’ENSIM et l’équipe du projet sont pleinement propriétaires des droits afférents. L’ENSIM est en cours de demande d’une protection de son innovation auprès de la cellule de valorisation des travaux de recherche de l‘université du Maine. L’ENSIM est accompagné dans cette démarche par la SATT (Sociétés d’Accélération du Transfert de Technologies).

A quick look back at user’s perception in E-learning security and privacy Issues

Researchers have proven with both theoretical and empirical studies that technologies could enhance learning. Meanwhile, technologies could also create barriers to the latter. Particularly, when the use of technologies causes security and privacy concerns, E-learning becomes less fruitful as the participants are too afraid to be exposed by what has been provided to help them learn in the first place.

I dedicated a section in my PhD thesis (cf. Chapter 1) to a study on user’s perception in using E-learning technologies and the relevant issues. What I had in mind back then was to raise the awareness of security and privacy issues, which are often overlooked in the research efforts that implicate user tracking and personal data usage for instructional purposes.

Within the past ten years, we witness a strong growth of research efforts which aim at developing technologies that better support user participation and interactivity while others attempt to provide new technological approaches, such as “user tracking”, to make online learning and teaching easier and more efficient in terms of student monitoring and evaluation.

Using tracking systems has been done in numerous ways in E-learning in accordance with the technological progress being made. In the meantime, it has increased security and privacy problems, which lead to a situation where security and privacy protection are becoming essential for the users. This paper gives a quick look at how students see the way their personal data being exploited and our point of view on that matter.

Read more after the break…

Continue reading