All the security technologies used in Wimi Armoured are based on proven and verified cryptography rules (eg Elliptic Curve Cryptography, private, public, ephemeral keys, TrustchainTM, …)
Privacy by Design and Security by Design.
Wimi Armoured is one of the first solutions to apply the principles of Privacy and Security by Design.
Principles of end-to-end encryption
All data (messages, files, tasks, metadata, …) present on Wimi Armoured are encrypted and decrypted locally by an authorized user and device. They are confusedly routed and stored on our servers, rendering them useless for intruders.
A TrustChain, an unalterable log
Each Wimi Armoured account has its own TrustchainTM, an immutable log of all actions on your data.