The principle lies in a concept as old as hyperlinks.
A fragment of the key is added at the end of the URL, in the page anchor. This anchor is not transmitted to the server (w3c recommendation, web architecture, volume 1, section 3.2.1). Which means that: neither the host nor the Atom Transfer teams will have access to it and therefore cannot decrypt the data.
Cf. Architecture of the World Wide Web, Volume One (https://www.w3.org/TR/webarch/#media-type-fragid): "Interpretation of the fragment identifier is performed solely by the agent that dereferences a URI; the fragment identifier is not passed to other systems during the process of retrieval."
We have designed a protocol that allows a proof to be created or the transfer history to be completed as soon as a user has verified the integrity of the received file and is able to decrypt it.
In this way, it is by design not possible to generate false evidence or Our development has already given rise to 2 original patents.ccess a file without the sender being notified.
This development has already given rise to 2 original patents.
When the sender of a transfer decides that the recipient must identify themselves, identity verification is based on the email address associated with their account.
In compliance with market security standards, Atom Transfer sends when the account is created, a unique link allowing the user to prove that they control the corresponding email box.
Yes, our exchange protocol provides assurance that the file received corresponds to the file sent. When the sender creates a transfer, a hash of the files is sent to the Atom Transfer server.
The recipient's browser verifies this fingerprint with the server to be authorized to decrypt the file.
This decryption authorization after validation of a hash is one of the many unique characteristics of our solutions developed by our research and development teams.
At Atom transfer we attach great importance to data confidentiality: only you have the power to give access to your files. The computer protocols used in our solutions preserve the confidentiality of exchanges and the content of the exchange. Only your designated contacts will be able to read your files.
Atom Transfer uses end-to-end encryption: files are encrypted and decrypted on the user's browser. The encryption key is split into two fragments that must be put together in order to decrypt the file. Although a fragment is stored by Atom Transfer to authorize or not a recipient to access the data, the second fragment is transmitted with the link, without the solution host having access to it.
In this way, neither the host nor the Atom Transfer teams can reconstruct the encryption key and access the data.
You no longer wish to use our solutions or simply delete your account ? No problem ! To have all your personal information permanently deleted, write to us: firstname.lastname@example.org
We guarantee the total and irreversible deletion of your Atom Transfer account as well as all the information it contains.
Your links that are still valid will be deactivated, and your transfer history and encrypted files stored in the storage space will be deleted.