With Circle, NOBODY other than the Data Owner has access to their data - or metadata - EVER
How to Add your Email to Circle Access Desktop
Circle Access Desktop uses credential-less authentication to login to websites utilizing circle Access. To be able to use these features you must first set-up your application with information required by your provider. To add you email address, open the settings in Circle Desktop Click add next to Email addresses, and enter the email address which […]
Biometrics allows you to use your face, or your fingerprints as your security to prevent unauthorized users from accessing your app. To enable biometrics first launch the Circle Access Mobile app and tap on Device Security. Tap Enable Device Security You will be prompted to either use your fingerprint for authentication or facial scan. After […]
Before you Start You will need to download the Circle Access on your mobile device before you can use it's features. If you haven't done so already you can download it here: For many applications you may be required to have your phone number registered to your Circle Access account. To do so launch the […]
Before you Start You will need to download the Circle Access on your mobile device before you can use it's features. If you haven't done so already you can download it here: Adding your Email or many applications you may be required to have your email address registered to your Circle Access account. To do […]
Issue: Error logs are required for further troubleshooting Causes: An issue is occurring that requires obtaining any error logs for troubleshooting Solution: First verify if there are any crash reports. You can do this by opening Windows Event Viewer. Expand the Windows Logs folder on the left and click applications. Navigate through the list and […]
Issue: A clean uninstall is required to troubleshoot an issue Causes: An issue is occurring that requires a clean uninstall Solution: To perform a clean uninstall for Circle Access Desktop first you will need to uninstall the app. Navigate to Control Panel and click Uninstall a Program Locate Circle within the list, and click Uninstall […]
Does Circle Access protect my company from MFA Bombing?
Yes. "MFA Bombing" is a new type of exploit that defeats traditional MFA that many organizations believe to be quite strong. This recent article in Ars Technica provides a good summary. Lapsus$ and SolarWinds hackers both use the same old trick to bypass MFA Not all MFA is created equal, as script kiddies and elite […]
How Is Circle Access CCFA Different than Using an X.509 Certificate for Email?
The architecture and approach of Circle Access differs from a certificates in several significant ways. There are two common use cases for X.509 certificates: securing emails and; securing authentication for access to Web server. We will focus here on securing email. Securing Email 1. X.509 certificates tie identity to an email address whereas Circle ties […]
What is the difference between Circle DLT versus Blockchain?
"Blockchain" and "Distributed Ledger Technology" (or "DLT") are too very big buzzwords today that are often misunderstood, or misused. Here is where Circle fits. A Simple Definition to Blockchain Technology Blockchain is a decentralized, distributed and often public database type where data is saved in blocks, such that the hashcode present in any block is […]
What's the relationship between Circle Access Desktop and Circle Access Mobile?
Circle Access 360 integrates: Circle Access Mobile - your smartphone is your log-in Circle Access Desktop - your device is your log-in The technical details of this are beyond the scope of this article, but we will try to summarize briefly here. Circle Access Mobile (CAM) With CAM, your smartphone is you. It accomplishes this […]