It is difficult to choose the appropriate ways to protect our information, each application may have stronger features than another. If you want to keep an intruder as far as possible away from your files, then there are options available in the market that can help you. This level of protection is known as zero knowledge technology, but, what is it? How does it work?
It is important to begin recognizing the protection type we want for our files. We have the ability to choose who does or does not access them, but our security sense depends on the trust we have in others. For example, how could we ensure that a hotel does not use the master key of your room to enter and rummage through your belongings and even steal them? There should be a method to ensure that the hotel will not use this key.
The same happens in the digital world, when entering a service, you need to enter a password. Traditionally the server already has a coded version of the password, if it matches, you can access the system. The problem is that the server also knows your password. This is where zero knowledge technology could help you …
How does it work?
Zero knowledge, or ZKP (Zero Knowledge Proof), is a protocol used in encryption systems. It is a method established for one of the parties to prove to another that a statement (usually mathematical) is true, without revealing anything other than the truth of the statement.
To put it in simpler words, zero-knowledge technology uses encryption schemes that show if someone knows something without revealing what it is. For example, this is similar to when someone knows the answer to a riddle but does not reveal the solution. How can you prove that they really know the solution?
There are two fundamental parts involved in this process, the “tester” who knows the information and the other, in this case the “verifier” who is convinced that the tester knows the information in question. To verify this, the ZKP protocol follows three basic properties:
Totality: the tester can provide the correct information and the verifier will be convinced of the truth of what he receives. Taking it to the digital world, a tester could be a user who places his password in an application, the application (verifier in this case) will receive the password of the tester (the user), without needing to know it.
Solidity: The only way to convince the verifier, is entering the correct information (or the correct password).
Zero Knowledge: The verifier knows that it is the correct information, but can not know the password.
A unique feature of this system is that it not only shows that it knows something to its interlocutor without revealing it, but if someone simply observes, they cannot verify or know anything about this procedure.
The interesting thing about ZKP is that it is a form of authentication where passwords are not exchanged, which means that service providers do not know anything about the data they store on their servers. It is also included in our HushApp!
HushApp and Zero Knowledge Technology
One of the most interesting HushApp features is that we use this technology to give greater protection to your confidential information. With this, you are certain that we do not have access to your information, passwords, or the files you store or send.
With this you get a more secure communication because only the user knows what he is communicating or what files they are sharing. When not storing your password, it is very important that you memorize it or keep it in a safe place, since if you lose or forget it, you will not have a way to recover it.
We invite you to protect your files easily and safely.
Try HushApp …