Event Exchange

Personal Console gives owners the ability to control their Private Cyberspaces through a single user interface.

personal_console

Cross Platform

Just ONE CLICK is needed to turn a computing device into a Console Device.

To enable maximum coverage across different devices, Private Cyberspace's main user interface (the Personal Console) is web browser based.

console_device

1. Device Support

Currently the following user devices are supported in the operation of Private Cyberspaces:

  1. Apple iOS
    iOS User Guide

  2. Google Android
    Android User Guide

  3. Microsoft Windows

  4. Apple macOS

  5. Linux

2. Dual Browsers

It is recommended to use at least 2 web browsers on your device to separate your Private Cyberspace web traffic with your other web traffic.

For those with stronger security requirements, the 2 web browsers should be ran inside separate virtual machines (e.g. Virtual Box) and not directly on the device itself.

2.1. Private Web Browser

Currently the following web browsers are recommended to be used with Private Cyberspace:

  • Safari for iOS and macOS
  • Chrome for Android, Windows and Linux

2.2. Public Web Browser

Currently Firefox is the recommended web browser to be used OUTSIDE of Private Cyberspaces.

Suggest Plugins for Firefox:

Disposable Node

Just ONE COMMAND is needed to turn a computing device into a Node Device.

node_device

Dual Web Browsers

For maximum cross platform compatibility without needing to go through app stores, your AI Console runs inside web browsers.

Privacy Cyberspace traffic are mostly encrypted, transmitted on private IP addresses with anonymous identities.

You should run at least TWO separate browsers on your device.

1. Primary Browser

Dedicate one web browser (e.g. Chrome or Safari) on your device to your Private Cyberspace accesses. Unless absolutely necessary, do NOT install any addons, extensions, plugins etc. on this browser.

You may also access some highly trusted external web sites (e.g. banking, government) with this browser, although ideally they should be accessed separately using a third browser.

2. Secondary Browser

Use a different web browser (e.g. Firefox and Edge) available on your device to access other web sites, privacy is very important with this browser as you will be using it across many sites. Pick browsers that have features like containers, no script etc.

3. Virtual Machine Isolation

If you have a fast laptop with at least 8Gbyte RAM, you can run your secondary browser inside a virtual machine like Virtual Box for extra security.

To make things easy, we have created ONE COMMAND deployment for such a Secondary Browser Virtual Machine on Windows and macOS.