We use proven state of the art algorithms and methods in combination with our own inventions, patents and developments.
The protection mechanism of MyPrivacy incorporates multiple paradigms:
6 - Eyes - Principle
MyPrivacy consists of 3 separate entities: the user, dispatch and storage. Only if all three of them supply their partial data, it is possible to retrieve the requested piece of information. Even if one of the parties is compromised, the security of the whole system still can be guaranteed.
Any file stored in MyPrivacy is first hashed, then encrypted and finally hashed again - this ensures the integrity of the data, which can be checked by the user at any time.
Separation of Concerns
The dispatch is responsible for the user authentication, but has no insight into any data being transferred. The storage, on the other hand, receives all the data, but does not handle any authentication. This separates the data from the owner, thus providing complete anonymity.
Random Address Mapping
Within the communication protocol all adresses are encrypted with a session-based key.
As a result any data-access - including shared file structures - has to be sanctioned by the dispatch, without involving it in the data-transfer itself.
Multi Hierarchy Data Protection
The entire data-structure of the user is modelled with Multi-Hierarchy-Data-Protection-Technology (MHDPT).
This allows MyPrivacy to store the data on the storage without any connection between the user, the folders and/or their data points - called unlinkability.
As soon as the user saves a file it is encrypted on his device and transferred to the storage. This guarantees that only the data-owner or authorised share-partner have access to the data, maintaining its secrecy. Neither the dispatch nor the storage have any knowledge of the data.
We provide unique features to our customers.
Get a quick overview.
Download the full feature specification catalogue.