Our Data Encryption
Technologies

Wimi Armoured has unique technologies to encrypt information around your sensitive projects.

Wimi Armoured - Data Encryption Technologies -

Trustchain and unlocking system

Wimi Armoured - Data Encryption Technologies -

Encryption / Decryption

Wimi Armoured - Data Encryption Technologies -

How Wimi Armoured works

Wimi Armoured - Data Encryption Technologies -

Data security

Wimi Armoured - Data Encryption Technologies -

Technical Details

Trustchain and System Unlock

Wimi Armoured - Data Encryption Technologies -

Trustchain & unalterable logs

Wimi Armoured uses a Trustchain for the automatic exchange of keys and each action of your employees is recorded in an unalterable journal.

Wimi Armoured - Data Encryption Technologies -

Encryption / Decryption

The Encryption / Decryption system is invisible to your users and ultra-fast.

Wimi Armoured - Data Encryption Technologies -

Illegible data

Wimi Armoured allows you to securely share all types of previously encrypted data: messages, files, tasks, calendars, video, etc.

Wimi Armoured - Data Encryption Technologies -

Unique identification key

All users use their own keys which are linked to their encrypted identities (device). There is no master key.

Wimi Armoured - Data Encryption Technologies -

Lockout service

The unlock service allows users to seamlessly access their encrypted data on all of their devices.

Wimi Armoured - Data Encryption Technologies -

Open-source crypto library

Wimi Armoured is based on an open-source encryption library and Elliptic Curve Cryptography.

Data encryption and decryption

Wimi Armoured is built on the principles of data processing separation.

Wimi Armoured - Data Encryption Technologies -

The information is unreadable by third parties

The data is decrypted locally on the user’s device and is inaccessible to any other user and unreadable on Wimi Armoured servers.

Data sharing between your users is secure

The sharing of data between users triggers the exchange of their secret keys, thanks to the Trustchain: a tamper-proof cryptographic data log and a distribution system for keys linked to identities.

Device protection

Local cryptographic information is encrypted with the Wimi Armoured user token. The latter is distributed on the Wimi Armored site using a two-factor authentication system.

How Wimi Armoured works

Wimi Armoured uses proven technologies

Wimi Armoured - Data Encryption Technologies -

How does Wimi Armoured work?

Wimi Armoured uses end-to-end encryption to secure data directly on the user’s device. Data encrypted with Wimi Armoured is accessible on each device of that user and can be shared with other users, autonomously and invisibly.

Wimi Armoured - Data Encryption Technologies -

Is the data hosted on Wimi Armoured?

Wimi Armoured stores your previously encrypted data on your device. Managing your encrypted data does not require any specific action on your part, Wimi Armoured takes care of everything! The public keys necessary to access your data are automatically transferred via the Wimi Armoured servers, in an encrypted form. Wimi Armoured cannot access the keys or the data at any time.

Wimi Armoured - Data Encryption Technologies -

A unique electronic certificate

An electronic certificate (public key) can be thought of as a digital identity card. It is mainly used to identify and authenticate a natural or legal person, but also to encrypt exchanges. It is signed by a trusted third party who certifies the link between the physical identity and the digital (virtual) entity.

Wimi Armoured - Data Encryption Technologies -

Data Security

Wimi Armoured secures your data exchanges

Wimi Armoured - Data Encryption Technologies -

Is there a central decryption system?

No. The data is encrypted and decrypted on the client side. The keys are only accessible to users.

Wimi Armoured - Data Encryption Technologies -

Does Wimi Armoured have access to my data?

Wimi Armoured never has access to your decrypted data or keys. Wimi Armoured will never be able to read, modify or transfer your data, only your authorized users (holders of private keys) can have access to the data.

Wimi Armoured - Data Encryption Technologies -

What happens if Wimi Armoured is hacked?

If our servers were hacked, hackers would only have access to encrypted public keys and encrypted data. The keys or the data are therefore unusable. This separation of responsibilities between two parties (Wimi Armoured stores data and public keys encrypted, your users keep private keys) makes data leakage impossible.

Technical details

Wimi Armoured is based on many secure technologies

Trustchain

The Trustchain and the unlocking system are coded in Go, supported by a PostgreSQL database and deployed through Kubernetes.

Encryption technology

Wimi Armoured protocols are based on libsodium’s Cryptobox and Secretbox:
Cryptobox is used for asymmetric encryption of data keys
Secretbox is used for data encryption
Using Elliptical Curve Cryptography (ECC), Wimi Armoured leverages smaller keys to improve data transit speed, without any impact on security.

The cryptographic primitives used are:

Ed25519 for signatures
X25519 for asymmetric encryption
XChaCha20-Poly1305 for symmetric encryption