FEATURES THAT GUARANTEE SECURITY
Asymmetric keys are used only for encryption of symmetric message keys and authentication process keys, which excludes the accumulation of statistics for hacking.
Each message is certified by authentication information - an electronic digital signature (EDS) of the author to the text of the message, which excludes the possibility of forgery
Open Source information
To ensure transparency and increase trust in the application, we are working to make Dober an open-source product. Over time, relevant links will appear in this section.
Currently, we have confirmation from independent experts in field of information security regarding secure data transfer and information storage at Dober certificate.