When used properly, ICLOAK can turn even virus infested computers into a secure computer. It's designed to use anonymous networks like Tor to browse the internet Anonymously without leaving any trace of internet activity on the computer.
With the touch of a button even the most non-technical person can secure their own computer. Welcome to the world of knowing that you are using some of the best, most sophisticated tools that, until now have only been the province of hackers, security professionals, governments and criminals.
This tiny device contains an entire secure computer environment that you can use at home, at work, or wherever you go. Until now, security pros, governments, hackers and cyber criminals have been able to use these tools. Now, all of us have access to powerful security tools to protect our passwords, money, safety and security.
One year of Free Feature Upgrades *
Subsequent years of upgrades are $50 per year
Lifetime of free security updates
Unconditional money back guarantee
Lifetime of FREE feature upgrades *
*Best Overall Value
*Does not include premium services
ICLOAK lives only in the part of the memory that gets erased every time you tun off your computer. Turn your computer off, start it normally and nothing that you did has been saved, unless you want it saved. Because we don’t access your hard drive ever, ICLOAK can never be infected by the nasty programs hackers use to violate your privacy, steal your passwords or compromise your identity.
There are plenty of schemes that purport to make you anonymous or "untraceable" on the internet. The most misunderstood is "incognito" mode on a browser.
Sorry, but if the hard drive is active, you are easy prey to hackers and criminals who would do you harm.
All of these methods solve only part of the problem. ICLOAK solves them all.
Web browsers consider lots of factors when running on your computer, including the system fonts installed, extensions installed, etc. These configurations can be used to make a unique identifier that can be tracked between websites to follow your online activity. ICLOAK does a great job at making you look like every other icloak user, so its harder to pinpoint who is who.
* No security system will ever be perfect, not even ICLOAK®. Excercise caution when you use any security system
Welcome to the world of knowing that you are using some of the best, most sophisticated tools that, until now have only been the provence of hackers, security professionals, governments and criminals. That little stick in your hand packs a heavy punch.
If you're a Mac user, turn off your machine , insert the Stik, then turn the machine back on holding down the option button to boot from ICLOAK
If you're a Windows user, keep the computer on and insert the Stik. Open the program named ICLOAK helper and there is a list of USB boot keys depending on your machine. Find the one that lists your machine. It's an exhaustive list, but
if your machine is not listed then search for <your computer type> USB Boot Key.
Once you know which button to press while your computer is turning on, turn off your computer, insert the Stik while holding the USB Boot key. The ICLOAK interface will come up with all the pre-loaded programs you need to be
anonymous and secure.
REMEMBER TO TURN OFF THE MACHINE AND REMOVE THE STIK WHEN YOU ARE DONE WITH YOUR ICLOAK SESSION. YOU WONT BE ANONYMOUS IF YOU DON'T.