hidden data transmission and content protection and �loss of keys and passwords
What it does
Our solution is based on steg-container data encryption using images, sounds and other methods.
How I built it
Our solution can be seen on our website
Challenges I ran into
Accomplishments that I'm proud of
What I learned
What's next for a key that cannot be lost
Our team implements and implements its project for use in companies and for private clients.