A New Standard
User
Operator
User
Empowering Digital Sovereignity
Empowering Digital Sovereignity
End-to-end encryption
The data structure is obfuscated by splitting it into chunks of uniform size. The chunks are end-to-end encrypted. But protection doesn´t stop at the data.
Anonymous credentials
Anonymous credentials
Zero knowledge proofs make user identities indistinguishable and activities unlinkable providing a higher level of security and privacy.
Decentralized access control
Decentralized access control
Permissions set by the data owner are not revealed to anyone.
With revocation and access tracing, the owner remains in full control.
Operator
Protecting Business Reputation
Audit compliance
If legitimate cases such as court decision, internal fraud investigation
or other arise, auditors can look up activities on a user-level granularity.
Business continuity
In the case of changes to user access management such as employees
leaving, access to data can be recovered.
Account administration
In case the operator deactivates an account, the user loses his access
rights immediately.