Security Protocols
Robust security framework designed to safeguard user data across all interactions.
Last updated
Robust security framework designed to safeguard user data across all interactions.
Last updated
All communications, information, and transactions associated with your Stealth ID's in our app are encrypted with Private Public Key Encryption, recognized for its robustness against brute-force attacks. This ensures that from the moment data leaves a user's device to when it reaches its intended recipient, it remains unreadable to any unauthorized party.
The StealthAI Encryption Process π‘οΈ
Your Keys, Your Data. π
Account Creation:
β’ Generate Public Key
β’ Generate Private Key
Key Storage:
β’ Public Key: Stored in the Cloud
β’ Private Key: Stored on the Userβs Device
Data Communication (Cloud to Device):
β’ Encrypt Data with Public Key (before sending to the cloud) '
β’ Send Encrypted Data to the Cloud
Data Retrieval (Device from Cloud):
β’ Retrieve Encrypted Data from Cloud
β’ Decrypt Data with Private Key (on the device)
Encryption: Your data gets encrypted with your public key before it hits the cloud. Only your private key can reverse this process.
For Larger Files: We get even smarter, combining AES encryption for efficiency with the security of your public key for encryption, ensuring only your private key decrypts it.
This means your data is impenetrable; only you hold the key.