top of page

TWC Technology

TWC [i2i] Encryption

Our encryption is unlike anything else in the marketplace. We call this [i2i] (Eye-to-Eye)™  encryption. We say your communication is encrypted from your eyes to the recipients'.  Our encryption only decrypts the the communications when the owner of the device is in-front of it and is (persistently) authenticated.   The only real-time authenticated decryption on the market.  This is all possible using The Whisper Company's patent-pending PUA™ (Persistent User Authentication).

 

 Traditional e2e (End-to-End) encryption secures the message in-transit and decrypts the message when it gets to the recipient's device.  With [i2i] encryption, we take the encryption to the user (owner) level. You, as the owner of your device,  are the only one to see the decrypted content. You must be present (and continuously authenticated).  It is never stored decrypted, so it is encrypted at-rest.

TWC Ownership

We are focused on augmenting Ownership to the traditional CIA (Confidentiality + Integrity + Availability) of information.  We believe it is a vital addition when securing ownership of the information in a users device.  We use patent-pending technology PUA™ (Persistent User Authenticator) to ensure that the owner(s) can access, view, edit, and use their information.  We call the new acronym CIAO™ (Confidentiality + Integrity + Availability + Ownership).

​

True Ownership gives users peace-of-mind that only they can view their contents.  The owner can grant or restrict operations such as downloading or exporting their information if they choose to. Ownership empowers user with the ability to decide who views what, for how long, and if they can take any actions on the content. This is true ownership.

bottom of page