Âé¶¹´«Ã½É«Ç鯬

Âé¶¹´«Ã½É«Ç鯬 is a true solution devoid of trusted tiers, and is not the next ‘Bad Guy’. You have access to everything, even in the future should the Âé¶¹´«Ã½É«Ç鯬 company default. And Âé¶¹´«Ã½É«Ç鯬 does not see a byte of your Data.

  • Your files stay on Your machine (you may easily monitor the exchanges with our servers)
  • You see your encrypted files (of course naturally if you choose your favorite cloud sync to share)
  • We can allocate a dedicated private server for a company – even though the perspective of exchanging outside the limits of the company renders this choice questionable.
  • Verifying a keeexed file (that uses SHA256) is possible using a public script (hence remains feasible should the Âé¶¹´«Ã½É«Ç鯬 company default)
  • The Âé¶¹´«Ã½É«Ç鯬 digital signature (uses the elliptic curve Sekp256k1) can be verified qithout Âé¶¹´«Ã½É«Ç鯬 (for instance on ) (hence remains feasible should the Âé¶¹´«Ã½É«Ç鯬 company default)
  • The format of encrypted files (that use AES CBC 256 IV and user accessible secrets) is made available by contract (hence remains feasible should the Âé¶¹´«Ã½É«Ç鯬 company default)
  • As a last resort, Âé¶¹´«Ã½É«Ç鯬 writes ASCII Metadata in files, hence is fully compatible with the Unix system commands  GREP, FIND, LS… (hence allows for any automation should the Âé¶¹´«Ã½É«Ç鯬 company default)
  • The information sent by the Âé¶¹´«Ã½É«Ç鯬 app to our servers to allow for notifications are not inversible (they are hashes).

Henceforth, the cryptographic features of Âé¶¹´«Ã½É«Ç鯬 are verifiable and accessible, even without Âé¶¹´«Ã½É«Ç鯬. To date:

  • Sha256 is known as immune to collision and pre-image attacks: it is thus impossible to create two documents having the same Âé¶¹´«Ã½É«Ç鯬 identifier, or a second document having the same idx as the first one,
  • Sekp256k1 is known as inviolate : it is the elliptic curve used by the Bitcoin protocol: any flaw would destroy Bitcoin entirely.
  • AES CBC 256 IV (with unguessable initialisation vector) is known as inviolate

We continuously improve the quality of our eexcution