WE BUILD DATA PRIVACY SOLUTIONS
FOR EVOLVING BUSINESS NEEDS
We are an innovative solution provider, helping our clients to solve their privacy and compliance challenges efficiently.
At MyPrivacy we share passion for data security, cryptoraphy and innovation. We know how delicate the handling of sensitive data is, but also how inadequate and deficient existing solutions on the market are.
For this reason, it was and is our goal to provide a reliable solution for data security. We have made it our business to protect both the personal sensitive data and the machine data of our customers without compromise.
The so-called SafeSpace was specifically designed for this purpose.
What differentiates MyPrivacy from other security solutions on the market is the unique combination of advanced security mechanisms merged in one groundbreaking technology solution. Additionally we serve our customers with smart services to mentor them on every step of the way. Our flexible pricing model ensures, you only pay for what you need.
- patented metadata obfuscation
- blockchain notarization
- h2h / h2m / m2h / m2m
- countless use cases, various industries
- multi-cloud approach (bring your own cloud)
- data sovereignity
- automation & integration
- forensic audit trail
- digital multi-party escrow
- decentralised permissioning
- unforgeable timestamps
- we are solution architects, business analysts, project managers and system integrators
- digital transformation
- cross industry experience
- best practice approach
- legal & compliance know how
- international reach
- user based (continuous...)
- transaction based (continuous...)
- project based (first time implementation)
- feature based (adding more features affects the price)
COMPREHENSIVE FEATURES TO ENHANCE YOUR PRIVACY
Authentication of users is based on a combination of: who they are, what they have, and what they know – such as their username, password and the TAN sent to the user's mobile number.
Every user action is logged and the log files are chained together, sealed using the user's signature and locked with an administrator key. Additional notarization in a public blockchain protects even against collusion of users and system administrators.
Data persisted in the storage is deleted by an automated job as soon as their individually configured retention period is over. Before final deletion, data can be downloaded or moved to another storage.
Signing, watermarking, steganography
Tracking of documents exported from the system based on information added to or concealed within them. The tracking information can be made visible or even undetectable. It is used for identifying each individual copy of the document exported by the users.
Multi-layer access control
Three levels of access control are combined to ensure that only authorized users have access to the storage, can locate data within the storage and retrieve or overwrite it depending on their permissions.
Beside creating native identities for registered users, standard protocols for integrating enterprise directories and social identity providers are also available to authenticate users based on their existing credentials.
An unforgeable timestamp of the upload or the last modification of specific content in the storage is represented by an immutable record in a public blockchain, which proves that the content has not been altered afterwards.
Messages exchanged between users regarding e.g. sharing content can not be distinguished from other data persisted in the storage. Thus, only the data owner knows with whom the data was shared.
Secure ad-hoc sharing
Unregistered users can access shared files by using a temporary link with optional password protection generated by the file's owner and provided to the unregistered users.
Multiparty key escrow
Based on defined rules, access keys can be split into shares and distributed among a group of people, who can collaboratively reconstruct them in case of emergency.
Files and folders can be uploaded, shared and accessed in the storage directly from the browser on any computer or smartphone.
Zero knowledge proofs
Permissions to access shared content are verified based on non-interactive zero knowledge proofs, which do not disclose any information about the identity of the user requesting access.
Multi cloud support
Based on data sovereignty requirements applying to their use case, customers can choose their preferred cloud provider and region.
On-premise storage support
Beside public and private clouds, customers can also protect their data persisted in on-premise storage solutions.
Processing directives and automation
Processing directives enable the automation of human tasks like downloading and deleting transferred documents and the enforcement of security policies such as applying upload fiters or steganography on the users' client.
Non-hierarchical data (coming in V2)
Beside files and folder hierarchies, the obfuscation and anonymization techniques will be adopted to other data structures and exchange protocols like MQTT.
Upload filters (coming in V2)
Data is filtered for malicious code and illegal content before it gets encrypted and uploaded to the storage.
Desktop integration (coming in V2)
Uploading, sharing and accessing files and folders in the storage will be integrated into the file explorer of common operating systems.
Embedded system integration (coming in V2)
The core cryptography library is written in C/C++ to enable integration into embedded system environments.
Trusted computing (coming in V2)
Remote attestations ensure that only genuine clients can connect to a gateway and prevent fake clients which could circumvent processing directives from accessing data persisted in the storage.