Custom Internet Software & Administration with a focus on using cryptographic algorithms to build trust and enable secure information handling.
End-to-End Encryption with Public Key Infrastructure (PKI)
Tamper-proof using Digital Signatures with PKI
Selective Disclosure by providing hash of redacted data
Cryptographic Hash and optional Encryption of data stored
offsite