About this site
- This site brings to its users the ability to encrypt data in a confident, private and secure way.
- We implement the most advanced non-asymmetrical encryption methods and we guarantee that the encrypted data are invulnerable to brute-force hacking techniques.
- We supply our own software to use with our system, but others (developers are welcome) can also develop their own, connected to our services.
- Data size does not matter, because data are never sent to our system.
- Software reverse-engineering techniques are fully useless against our system.
- Our system is so secure that our users do not even need to use a secret key for the encryption process. Actually, using a key is allowed merely for users' redundant data security and their administrative needs.
- We also guarantee that the encrypted data would only be decrypted a number of times, until an expiration date, on a scheduled timetable and by the recipients that they were configured to, if so they were.
- Therefore, someone not allowed or no more allowed, will never be able to decrypt data encrypted by our system.
- Finally, no matter how many encrypted data copies exist, when the expiration date or the maximum allowed decryption times have been reached, the encrypted data are definitively and totally undecryptable forever.
How to get an invitation code
We have already distributed our invitation codes to potential users. So, ask around you: our users are free to share their invitation codes.
The estimated delay to free access is
Free access to the site was initially scheduled to start on November 1, 2016.
This has been postponed to April 1, 2017.
Intellectual Property and patent coverage update are being finalized.
Actual opening date may vary.
Sooner free access will be evaluated accordingly.
We intend to allow you to discover and enjoy our services as soon as possible. Please, check our site regularly.
For inquiries contact us at: email@example.com