The demo illustrates the following areas of functionality.
1.
The secure E2EE exchange of files and data between users and devices with zero attack surface in the cloud.
2.
The creation of Circles, an cryptographically private network of devices defined by the possession of a unique AES 256 key, using our direct out-of-band P2P authentication process.
Distributed Multi-factor Cryptographic Authentication
Just send an invitation ID + authorization code to anyone you want to communicate and share files with securely, and Circle does the rest in seconds! Our out-of-band peer-to-peer invitation creates symmetric AES 256 keys on each device via asymmetric public key cryptography. There is no central certificate authority or user and credentials database which can be attacked.
Private Cryptographic Network (Circle)
Circle enables the creation of private groups consisting of users or devices which are uniquely authenticated using Circle’s patented out-of-band P2P invitation process. These groups possess the AES 256 key to decrypt the communications and data exchanged among them. Even user data – and metadata – is encrypted. This means NOBODY – not even Circle, the company – has access or visibility into the data exchanged among these groups.
Secure Digital Capsules
Circle creates and stores data inside of an AES 256 encrypted secure digital capsule on the end user’s device. The capsule is backed up as an inert data blob on the cloud, assuring recovery and protection against all manner of device mishaps and malicious attacks (e.g. ransomware).
One fantastic use case for this is to give users privacy and control of their data. But Web Application Developers can also think of and use this as secure client side storage for anything – files, structured and unstructured data, objects, etc. The data you are storing for your user – always totally private and secure – will persist across all browsers and can also be synched to all devices of the end user.