This platform was designed to deliver personal privacy, data security and scalability, enabling users to better protect their data by providing user authentication, key management, file-based encryption, data isolation, file access permission and contact management with secure messaging and file-sharing technology. The distributed security infrastructure allows no single entity sufficient information to determine the decryption keys as well, so there is no single point of failure from which an attacker can access all of the secure data.
Find out more at