To protect a file, simply move the file into a Vortex folder.
Using an AI algorithm, the file is immediately encrypted, transformed and rendered invisible to the operating system.
The secured file and its stealth data effectively no longer exist, ... hidden from hackers and prying eyes.
The encrypted stealth file is shredded and the fragments are saved locally in a set of containers ... a virtual object repository.
The fragments from a file are distributed across multiple containers. Any given container contains fragments from multiple files.
The container contents are automatically replicated in the Vortex cloud resulting in multiple backup copies of the secured file.
Although the stealth files are not visible to the WIndows File Explorer, the local Vortex File Explorer allows an authenicated user to view, manage, share and restore secured files.
Copyright © 2018 CyVor Technology - All Rights Reserved