Frequently Asked Questions

FAQ Category: Circle-of-Trust

Cryptographic Credential-Free Authentication
The Circle Data APIs power Zero Trust Data Protection, Privacy & Control
Safeguard your data on endpoint devices and in Cloud
Put Your Enterprise in Charge of its Data While Respecting Your Employees' Privacy
With Circle, NOBODY other than the Data Owner has access to their data - or metadata - EVER
FAQ Categories (Buttons)
  • All
  • Circle Access Desktop (15)
  • Credential Free MFA (15)
  • Circle Access Mobile (9)
  • Circle Access (5)
  • Circle Access Lite (4)
  • Circle-of-Trust (3)
  • End-to-End Data Protection (3)
  • Enterprise Data Visibility & Control (3)
  • Data Privacy & Compliance (2)
  • Digital Trust (2)
Does Circle Access protect my company from MFA Bombing?
Yes. "MFA Bombing" is a new type of exploit that defeats traditional MFA that many organizations believe to be quite strong. This recent article in Ars Technica provides a good summary. Lapsus$ and SolarWinds hackers both use the same old trick to bypass MFA Not all MFA is created equal, as script kiddies and elite […]
Read more
What is the difference between Circle DLT versus Blockchain?
"Blockchain" and "Distributed Ledger Technology" (or "DLT") are too very big buzzwords today that are often misunderstood, or misused. Here is where Circle fits. A Simple Definition to Blockchain Technology Blockchain is a decentralized, distributed and often public database type where data is saved in blocks, such that the hashcode present in any block is […]
Read more
How does a Secure Capsule compare to an X.509 certificate
A cert, like X.509, binds an identity to a device; whereas a circle tie is linked to a mobile device via the application. The same cert (and, unless exceptional steps are taken, it must be used on every device generating or reading email for that email address) may be used on many devices. As a […]
Read more
How to Use Circle-of-Trust
To use circle-of-trust, you first need to configure your access policies to trigger zero-trust identity verification. This can be done by adding a policy that requires users to perform multi-factor authentication, or by using another mechanism that supports this feature. Once this is done, users will be prompted to verify their identity, when they attempt […]
Read more
What is the difference between Circle DLT versus Blockchain?
"Blockchain" and "Distributed Ledger Technology" (or "DLT") are too very big buzzwords today that are often misunderstood, or misused. Here is where Circle fits. A Simple Definition to Blockchain Technology Blockchain is a decentralized, distributed and often public database type where data is saved in blocks, such that the hashcode present in any block is […]
Read more
What does it mean when I get the error "Object reference not set to an instance of an object"
This error is due to an issue with the Authentication likely on the server side. This issue can commonly be attributed to an improperly defined API key. To fix this, navigate to your config.php file in your site project files. And keep note of your API Keys. Next, Login to your Circle Console at https://console.gocircle.ai/dashboard/web/login […]
Read more
How Does Circle-of-Trust Benefit Users?
There are many benefits to using circle-of-trust, including: Ability to spoof-proof your actions, events, and data requiring the highest level of security Enable direct identity verification of a user, via other trusted and known users who are cryptographically added to the Circle-of-Trust. Developers can easily integrate the API calls to Circle-of-Trust into their workflows in […]
Read more
How Does Circle-of-Trust Work?
Circle-of-trust is a zero trust identity verification system that uses contextual information to verify the identity of a user. This system is unspoofable, meaning that it cannot be fooled by fake or stolen credentials. It also does not require any external certificate authority, making it more secure than other systems. All operations are performed within […]
Read more