The demo illustrates the following areas of functionality.
- The secure E2EE exchange of files and data between users and devices with zero attack surface in the cloud.
- The creation of Circles, a private cryptographic network of devices defined by possessing a unique AES 256 key, uses our direct out-of-band P2P authentication process.
We recommend that you read the demo tips before trying the demo.