DOCUSHIELD

YOUR LIFE - SECURED

Never lose sight of what matters most.
Full proof document vaults for the important and irreplaceable.

Powered by Kadena

HOW IT WORKS

BEHIND ALL OF THE ADVANCED TECH LINGO THE WAY THINGS OPERATE ARE ACTUALLY PRETTY SIMPLE...

04

DATA RETRIVAL

Click on the text in the block to select it and enter the text you want to show.

03

DATA DISTRIBUTION

Click on the text in the block to select it and enter the text you want to show.

02

DOCUMENT UPLOAD

Click on the text in the block to select it and enter the text you want to show.

01

ACCOUNT CREATION

Click on the text in the block to select it and enter the text you want to show.

security comes first

AES 256

Military grade encryption by definition. 256-bit AES encryption is technically the most secure because of its key length size. Based on some estimations it would take trillions of years to crack using a brute-force attack. That sounds perfect to us

TLS ENCRYPTION

TLS uses both asymmetric and symmetric encryption to protect the confidentiality and integrity of data-in-transit. Asymmetric encryption is used to establish a secure session between a client and a server, and symmetric encryption is used to exchange data within the secured session.

ACCESS CONTROL

Access control is a method of guaranteeing that users are who they say they are and that they have the appropriate access to company data.
At a high level, access control is a selective restriction of access to data. It consists of two main components: authentication and authorization

MODERN FEATURES

a suite of
solutions and security

WE HAVE A LOT IN THE WORKS! WE PLAN ON BECOMING A FULL SERVICE PROVIDER FOR THE DECENTRALIZED COMMUNITY. DOCUSHIELD APP AND PRIVATE EMAIL INBOXES WILL BE OUR FIRST PRODUCTS TO LAUNCH. 
BE SURE TO FOLLOW US FOR UPDATES!

integrate   

PULL DOCUMENTS FROM DROPBOX, GOOGLE DRIVE, DOCUSIGN AND MORE

no monthly feeS

ONLY PAY FOR THE SERVICES USED. NO MONTHLY FEES.
NEVER LOSE ACCESS!

PRIVATE EMAIL

EMAIL WITHOUT INTRUSION. OUR PRIVATE MAIL BOX SOLUTION IS NOW IN BETA

android 

COMPATIBLE WITH ALL ANDROID SMARTPHONES VIA GOOGLE PLAY

ios

COMPATIBLE WITH ALL IOS PHONES FROM THE THE APP STORE

DESKTOP

ACCESS FROM ALL OF YOUR DEVICES INCLUDING YOUR DESKTOP

KADENA.IO

Kadena's public blockchain, Chainweb, is the only sharded and scalable layer-1 PoW network in production today. It utilizes a PoW (Proof of Work) consensus mechanism that improves throughput and scalability while maintaining the security and integrity found in Bitcoin. To achieve this breakthrough in scalability, Kadena braids together multiple Bitcoin-like chains.

FLUX 

Flux provides the critical, high availability infrastructure for the New Internet. Projects and development teams are not forced to rely on the Flux blockchain to utilize FluxOS, so they have access to necessary infrastructure while maintaining all the unique properties of their own chains. Flux makes up one important piece of a well-balanced distributed computing portfolio focused on the next generation of the Internet.

IPFS

The InterPlanetary File System is a protocol and peer-to-peer network for storing and sharing data in a distributed file system. IPFS uses content-addressing to uniquely identify each file in a global namespace connecting all computing devices.

KURO

Kuro is Kadena's high-performance permissioned blockchain, based upon the ScalableBFT consensus algorithm by Will Martino. Kuro also features counterparty confidentiality leveraging the Noise protocol, and runs the Pact smart contract language.

2o22 docushield