Data sent to the cloud can be made safe by getting protection from structures in a DART encryption key
OUR SYSTEM INCLUDES
Everything that goes into the cloud is encrypted, so all a cloud hacker or interceptor gets is the encrypted data.
The user is in full control of the encryption process. This happens locally on the user's device.
The user creates and stores the key locally. No one in the cloud has the key or the original data.
Personal keys given to others can be made decrypt-only, preventing others from pretending to be you.
Designed for the cloud
Getting protection in part from structure gives new properties suited to protecting data in the cloud.
An email client that transmits and receives encrypted email text.
An app to encrypt and decrypt files.
Prototype cloud storage app uses end-to-end encryption as an additional layer of data protection.