TRACE EVERY ACTION IN THE ENTIRE SHARING NETWORK

Every modification in a Salvobit sharing network can be traced back to the user who has made it. This is possible because the digital security key of each user signs every action that he/she performs in the network. This signature cannot be forged even by administrators and network owners.

PROTECT YOURSELF AGAINST HACKS WITH STATE OT THE ART ENCRYPTION TECHNOLOGIES

Salvobit implements strong end-to-end encryption.All your files are encrypted by your unique digital security key.

This powerful method limits the risks of data loss and abuses, caused by external hacker attacks.

Identify your users without personal data within a Salvobit sharing network

In any given Salvobit sharing network every user is identified by a unique digital ID. 

In that way the users’ privacy is fully preserved, as no sensitive personal information is used for their identification and authorization.

Prevent abuse of your data in case of hardware theft

The theft of a device storing important and personal data can cause a lot of concerns and you may incur great losses. With Salvobit you can be sure that your precious information will not fall into the wrong hands, because it is always encrypted, even when at rest, and it can be accessed only with your unique digital security key.

Protect against internal vulnerabilities in your network

The identification of the users in every Salvobit sharing network with their unique digital IDs allows the prevention of potential internal vulnerabilities, such as granting access to rogue devices. Since you identify every user by his/her respective digital ID, you have control over the access to your sharing network.

Store your data on your own hardware

You can be sure that your data is under your full control, since it is on your own hardware. This is a guarantee that none can deny you access to your own data, since you are the rightful owner of your hardware. Also you can be sure about the privacy of your files, since they are not transferred through clouds or some third party servers that might get hacked.