Let's assume you have MarpX Privacy installed on a flash drive.
- Walk up to almost any Windows PC, plug the flash drive into a USB port.
- Click once on the Windows Explorer button (in Windows 10 the File Explorer button). That's the icon that looks like a file folder, usually next to the Start icon at the lower left edge of the screen.
- Browse to the flash drive. Within its MarpX directory, double click on the MarpxPrivacy app (which may show .exe at the end of the name).
- You are in the app, ready to take more control of your privacy -- make files or messages private, restore files and messages to their original, paste encrypted content onto social media pages or emails so that you share only with the people you want.
If you want your content to be more secure, disconnect the computer from the Internet while you attend to private matters. Want more security? Drag that old Windows XP computer out of your closet, plug it in, but never attach it to the Internet. Still more security? MarpX Privacy offers multiple levels of protection.
Marpx Privacy level Type of key Example of key Count of possible keys Marpx Privacy Level One 5 digits 07220 105 = 100 thousand Marpx Privacy Level Two 7 digits 2754505 107 = 10 million Marpx Privacy Level Three 7 capital letters or digits C42QZE8 367 = 78 billion Marpx Privacy for Government 7 letters or digits OR one time keys C42qZe8 627 = 3.5 trillion OR > 10100
The focus here is on the three levels of protection offered by MarpX Privacy™. The separate government version is listed in the above table for comparison. All the levels look and feel very much alike. The only differences to be seen are the heading and the description of the keys that you may use. The big difference among the levels shows up in the last column of the table above-- the count of possible keys. That count really matters.
Here are some notes on the three levels:
- Level One -- good protection of files and messages at zero cost
- Level Two -- hundredfold enhanced protection of personal privacy
- Level Three -- high strength cybersecurity for organizations
... and notes on specialty applications: