"Is the first program of the Islamic multicast security across networks. It represents the highest level of technical multicast encrypted but far superior. All communications software, which are manufactured by major companies in the world so that integrates all services communications encrypted in the small-sized portable. Release I of the "secrets of the mujahideen" the bulletin brothers in the International Islamic Front and the media have registered so scoop qualitatively in the field of information and jihadist exploit the opportunity to thank them for their wonderful and distinctive. And the continuing support of a media jihadist group loyalty in the technical development of a network of Islamic loyalty program and the issuance of this version, in support of the mujahideen general and the Islamic State of Iraq in particular."
Key features in the first version :
-- Encryption algorithms using the best five in cryptography. (AES finalist algorithms)
-- Symmetrical encryption keys along the 256-bit (Ultra Strong Symmetric Encryption)
-- Keys and encryption algorithms changing technology ghost (Stealthy Cipher)
-- Program consisting of one file Facility file does not need assistance to install and can run from the memory portable
-- Multicast encrypted via text messages supporting the immediate use forums (Secure Messaging)
-- Transfer files of all kinds to be shared across texts forums (Files to Text Encoding)
-- Production of digital signature files and make sure it is correct
-- Digital signature of messages and files and to ensure the authenticity of messages and files
So far, Reuters picked up the topic - Jihadi software promises secure Web contacts :
"The efficacy of the new Arabic-language software to ensure secure e-mail and other communications could not be immediately gauged. But some security experts had warned that the wide distribution of its earlier version among Islamists and Arabic-speaking hackers could prove significant. Al Qaeda supporters widely use the Internet to spread the group's statements through hundreds of Islamist sites where anyone can post messages. Al Qaeda-linked groups also set up their own sites, which frequently have to move after being shut by Internet service providers."