When used properly, ICLOAK can turn even virus infested computers into a secure computer. It's designed to use anonymous networks like Tor to browse the internet Anonymously without leaving any trace of internet activity on the computer.
With the touch of a button even the most non-technical person can secure their own computer. Welcome to the world of knowing that you are using some of the best, most sophisticated tools that, until now have only been the province of hackers, security professionals, governments and criminals.
This tiny device contains an entire secure computer environment that you can use at home, at work, or wherever you go. Until now, security pros, governments, hackers and cyber criminals have been able to use these tools. Now, all of us have access to powerful security tools to protect our passwords, money, safety and security.
How it works
ICLOAK lives only in the part of the memory that gets erased every time you turn off your computer. Turn your computer off, start it normally and nothing that you did has been saved, unless you want it saved. Because we don’t access your hard drive ever, ICLOAK can never be infected by the nasty programs hackers use to violate your privacy, steal your passwords or compromise your identity.
There are plenty of schemes that purport to make you anonymous or "untraceable" on the internet. The most misunderstood is "incognito" mode on a browser.
Sorry, but if the hard drive is active, you are easy prey to hackers and criminals who would do you harm.
All of these methods solve only part of the problem. ICLOAK solves them all.
VERY SIMPLE TO USE
Welcome to the world of knowing that you are using some of the best, most sophisticated tools that, until now have only been the provenance of hackers, security professionals, governments and criminals. That little stick in your hand packs a heavy punch.
If you're a Mac user, turn off your machine , insert the Stik, then turn the machine back on holding down the option button to boot from ICLOAK
If you're a Windows user, keep the computer on and insert the Stik. Open the program named ICLOAK helper and there is a list of USB boot keys depending on your machine. Find the one that lists your machine. It's an exhaustive list, but if your machine is not listed then search for <your computer type> USB Boot Key.
Once you know which button to press while your computer is turning on, turn off your computer, insert the Stik while holding the USB Boot key. The ICLOAK interface will come up with all the pre-loaded programs you need to be anonymous and secure.
REMEMBER TO TURN OFF THE MACHINE AND REMOVE THE STIK WHEN YOU ARE DONE WITH YOUR ICLOAK SESSION. YOU WONT BE ANONYMOUS IF YOU DON'T.