Private by Design
Zero-knowledge: The Network's protocol employs multilayered encryption, protecting the privacy of users data both during storage and during transit. Nodes cannot determine the content, nor origin of data they hold or transmit, even if it is their own,
No tracking: Thanks to its various encryption schemes, tracking and surveillance of browsing and data usage patterns—commonplace business practice on the incumbent web—is no longer possible. Privacy is by default.
Self-Sovereign: Users of the Network have sovereignty over their personal data, and can maintain and control access to it, while still making use of rich and accessible services and software.
No Password Hacks: Passwords and credentials never leave your computer when accessing and decrypting data. You only need a single set of credentials while interacting with an unlimited number of services, businesses, identities, or contexts of use.
Last updated