Safe

When used properly, ICLOAK can turn even virus infested computers into a secure computer. It's designed to use anonymous networks like Tor to browse the internet Anonymously without leaving any trace of internet activity on the computer.

Simple

With the touch of a button even the most non-technical person can secure their own computer. Welcome to the world of knowing that you are using some of the best, most sophisticated tools that, until now have only been the province of hackers, security professionals, governments and criminals.

Powerful

This tiny device contains an entire secure computer environment that you can use at home, at work, or wherever you go. Until now, security pros, governments, hackers and cyber criminals have been able to use these tools. Now, all of us have access to powerful security tools to protect our passwords, money, safety and security.

ICLOAK USB stick in product packaging
Two Powerful Choices
ICLOAK® Pro
$99
BUY

One year of Free Feature Upgrades *


Subsequent years of upgrades are $50 per year


Lifetime of free security updates


Unconditional money back guarantee

ICLOAK® Pro+
$149
BUY

Lifetime of FREE feature upgrades *


*Best Overall Value


Lifetime of free security updates


Unconditional money back guarantee

*Does not include premium services

HOW IT WORKS

"But I Use Some Other Security Tool like Incognito"

Think Again

ICLOAK lives only in the part of the memory that gets erased every time you tun off your computer. Turn your computer off, start it normally and nothing that you did has been saved, unless you want it saved. Because we don’t access your hard drive ever, ICLOAK can never be infected by the nasty programs hackers use to violate your privacy, steal your passwords or compromise your identity.

There are plenty of schemes that purport to make you anonymous or "untraceable" on the internet. The most misunderstood is "incognito" mode on a browser.

Sorry, but if the hard drive is active, you are easy prey to hackers and criminals who would do you harm.

All of these methods solve only part of the problem. ICLOAK solves them all.

Incognito VPN Anti-Virus
Comparison Pricing Free Most $83/yr** $39.95/yr** $99
Truly Anonymous Browsing

Web browsers consider lots of factors when running on your computer, including the system fonts installed, extensions installed, etc. These configurations can be used to make a unique identifier that can be tracked between websites to follow your online activity. ICLOAK does a great job at making you look like every other icloak user, so its harder to pinpoint who is who.

Access to Tor

Web browsers consider lots of factors when running on your computer, including the system fonts installed, extensions installed, etc. These configurations can be used to make a unique identifier that can be tracked between websites to follow your online activity. ICLOAK does a great job at making you look like every other icloak user, so its harder to pinpoint who is who.

Secure Operating System

Web browsers consider lots of factors when running on your computer, including the system fonts installed, extensions installed, etc. These configurations can be used to make a unique identifier that can be tracked between websites to follow your online activity. ICLOAK does a great job at making you look like every other icloak user, so its harder to pinpoint who is who.

Leaves No Trace Online

Web browsers consider lots of factors when running on your computer, including the system fonts installed, extensions installed, etc. These configurations can be used to make a unique identifier that can be tracked between websites to follow your online activity. ICLOAK does a great job at making you look like every other icloak user, so its harder to pinpoint who is who.

Prevents Browser Fingerprinting

Web browsers consider lots of factors when running on your computer, including the system fonts installed, extensions installed, etc. These configurations can be used to make a unique identifier that can be tracked between websites to follow your online activity. ICLOAK does a great job at making you look like every other icloak user, so its harder to pinpoint who is who.

Virus, Malware and Trojan Protection

Web browsers consider lots of factors when running on your computer, including the system fonts installed, extensions installed, etc. These configurations can be used to make a unique identifier that can be tracked between websites to follow your online activity. ICLOAK does a great job at making you look like every other icloak user, so its harder to pinpoint who is who.

Key Logging/Screen Capture Protection

Web browsers consider lots of factors when running on your computer, including the system fonts installed, extensions installed, etc. These configurations can be used to make a unique identifier that can be tracked between websites to follow your online activity. ICLOAK does a great job at making you look like every other icloak user, so its harder to pinpoint who is who.

Defeats Geo Content Blocking

Web browsers consider lots of factors when running on your computer, including the system fonts installed, extensions installed, etc. These configurations can be used to make a unique identifier that can be tracked between websites to follow your online activity. ICLOAK does a great job at making you look like every other icloak user, so its harder to pinpoint who is who.

Secure Updates

Web browsers consider lots of factors when running on your computer, including the system fonts installed, extensions installed, etc. These configurations can be used to make a unique identifier that can be tracked between websites to follow your online activity. ICLOAK does a great job at making you look like every other icloak user, so its harder to pinpoint who is who.

Deleted Session Cookies

Web browsers consider lots of factors when running on your computer, including the system fonts installed, extensions installed, etc. These configurations can be used to make a unique identifier that can be tracked between websites to follow your online activity. ICLOAK does a great job at making you look like every other icloak user, so its harder to pinpoint who is who.

Erases Session History

Web browsers consider lots of factors when running on your computer, including the system fonts installed, extensions installed, etc. These configurations can be used to make a unique identifier that can be tracked between websites to follow your online activity. ICLOAK does a great job at making you look like every other icloak user, so its harder to pinpoint who is who.

* No security system will ever be perfect, not even ICLOAK®. Excercise caution when you use any security system

** PC Magazine's Editor's Choice 2015

VERY SIMPLE TO USE

how to plug a USB drive into your computer

Welcome to the world of knowing that you are using some of the best, most sophisticated tools that, until now have only been the provence of hackers, security professionals, governments and criminals. That little stick in your hand packs a heavy punch.

If you're a Mac user, turn off your machine , insert the Stik, then turn the machine back on holding down the option button to boot from ICLOAK

If you're a Windows user, keep the computer on and insert the Stik. Open the program named ICLOAK helper and there is a list of USB boot keys depending on your machine. Find the one that lists your machine. It's an exhaustive list, but if your machine is not listed then search for <your computer type> USB Boot Key.

Once you know which button to press while your computer is turning on, turn off your computer, insert the Stik while holding the USB Boot key. The ICLOAK interface will come up with all the pre-loaded programs you need to be anonymous and secure.

REMEMBER TO TURN OFF THE MACHINE AND REMOVE THE STIK WHEN YOU ARE DONE WITH YOUR ICLOAK SESSION. YOU WONT BE ANONYMOUS IF YOU DON'T.

ABOUT US

  • @jsa
    The Boss
  • @jsa
    Wrangler
  • @jsa
    Artisan
  • @jsa
    Hax0r
  • @jsa
    Code Monkey
  • @jsa
    Pasta
  • @jsa
    Marketing
  • @jsa
    Operator
  • @jsa
    Writer
  • @jsa
    Gronk
We are a small team of network security specialist who believe that everyone should be safe from hackers out to steal your money and identity, and other curious eterprises that want to snoop on you.

MAKING IT SIMPLE



Watch the Inventor talk about security in plain and easy English. Our mission is to make really technical technology easy to use. Perhaps the most technical thing online right now that all of us need is really tight security.