ROOT OF TRUST
Hybrid Trusted Data Protection Platform
WHAT IT IS
Security is the first thought when we think of a data protection solution. Stronger encryption algorithms or longer keys are the must-have. But the truth is hacker do not attack encryption, they attack a key management process. Key management defines the security of the system and is our strongest point.
Trust is an important factor when we think of protecting data in the cloud. Software provider will always have full access to the raw data before encryption happens and even to the keys, no matter what. This requires full trust between the client and the service provider. Encedo solves that problem differently by closing the whole process inside a single execution unit - a silicon chip, with exclusive access for the client only.
Encedo platform is a cluster of thousands of fully independent nodes, trusted execution units. It does not matter if it is the service operated by Encedo or on-premise solution, each node can be connected with each other. Real, global and decentralized platform to make data protection simple and easy. Store data online, exchange and collaborate with full, none interrupted control.
The idea to build Encedo is an effect of a problems of living in a digital age. We as a society became more and more digital if we want it or not. The transformation from offline to online is a real thing. By being offline we have more control over our lives but online - who controls the cloud, control our lives! We need a solution to protect us (the ‘digital me’) and the ones we love, the way only we have access to. We build Encedo for us.
Encedo vision is to give a solution with no compromises, with no false claims, but with full respect to the fact that only we should be able to control our digital data. Our lives, our privacy belong to us only, so why with data should it be any different? Our mission is to design, build and give access to the technology that will make that true. Our motto is to 'make privacy private again'.
Encedo technology can be compared to a special vault without physical access to what is going on inside. Only owner can control the vault and do magic things inside - generate secrets and store them; ask the vault to protect something or share common data if want to with other vaults. The vault can protect emails, instant messages, blockchain wallets or any other kind of data we can think of. The goal is only we have full control over the vault, no one else. Full stop! Do not trust - verify!