FEATURES THAT GUARANTEE SECURITY

security image

Asymmetric keys are used only for encryption of symmetric message keys and authentication process keys, which excludes the accumulation of statistics for hacking.

security image

Each message is certified by authentication information - an electronic digital signature (EDS) of the author to the text of the message, which excludes the possibility of forgery

security image

The system is built as a Zero-knowledge Service.

security image

Each new message is encrypted using a new 512-bit symmetric key obtained from the source of a cryptographically strong sequence of random numbers

security image

Всі симетричні ключі мають розмір 512 біт.

security image

Algorithms used in the encryption:

1. secp521r1

2. threefish512

3. ChaCha20-Poly1305 - SHA3-512

security image

Techniques have been applied to ensure the maximum slowdown of a brute-force attack to protect against cracking the password of the main key pair.

Open Source information

To ensure transparency and increase trust in the application, we are working to make Dober an open-source product. Over time, relevant links will appear in this section.

Currently, we have confirmation from independent experts in field of information security regarding secure data transfer and information storage at Dober certificate.

security image

Certificate of compliance and attestation Dober

control image
control image
control image
control image

Social or Stay in touch