Individual
VESVault
Encryption at rest made practical
VESvault image 2
V
IRAL
E
NCRYPTED
S
ECURITY
(VES)
Making encryption usable
Learn more
Are you afraid of using end-to-end encryption for fear of losing the key? With our patent pending VES™ technology, that’s no longer a problem. Your pre-selected Friends can assist you in recovering your data by simply entering their own key and choosing to assist you. And, VES does this while maintaining the privacy of end-to-end encryption and without giving any Friend access to your private content.
The beauty behind VES is that it’s viral. If your Friends have lost their keys, their Friends can assist them and then they can assist you. There’s no limit to the length of the viral network, and after just a small network, the odds of you losing your data are lower than winning the lottery! Check out our interactive tool to show just how reliable VES recovery really is.
VES makes end-to-end encryption safe, easy and practical for mainstream use.
Lost Key Recovery as easy as...
Learn more
If you lose your VESkey, the process of VESrecovery is as simple as you typing in a new VESkey, which alerts your Friends. Some Friends voice verify that you are making the request and then enter their VESkeys to assist you. Then, you re-enter your new VESkey. With that, all your old content will be recovered and added to any new encrypted content you created since you lost the previous VESkey.
1. Create a new VESkey
2. Friends enter their VESkeys
3. Enter your new VESkey
VES APIs
For third parties to use VES
Alpha is available now
Learn more
Through our APIs, we’re making VES available to any third party that wishes to integrate VES into their services to extend the benefits of VES to their customers. Any service that stores customer data will be able to do so by giving their customers a safe and practical way of using end-to-end encryption without the risks of losing encrypted content by losing the sole key.
Visit our VESvault.io page to learn more about our coming Token Sale
VES coming soon to:
Distributed
Storage
Storj Filecoin
Sia MaidSAFE
Filecoin, Maidsafe, Storj and Sia have opened the door to a paradigm change in how the Internet will used to store and access content – distributed storage.
Unlike centralized services like Google Drive or Dropbox, distributed storage requires the use of encryption and along with that comes the problem of losing the key. By mitigating the key loss issue, VES enables distributed storage to become practical for mainstream use.
Distributed Storage will soon be integrated into the VESvault CloudDash app along with currently available Google Drive, Dropbox and OneDrive. Users will not only be able to select multiple storage options, they’ll be able to use them all concurrently, providing an even higher level of redundancy and options.
VES enabled distributed storage will change how everyone stores their personal content on the Internet.
Learn more
Digital Wallets
Hot & Cold
Bitcoin Etherium
The horror stories are mounting. People are losing all the wealth in their digital wallets by losing their keys. While some people are OK with this risk, for the rest of us, VES provides a robust means of recovering our wallets if we lose the keys, pins or passphrases that unlock them. VES works equally well with cold or hot wallets.
Imagine replacing the hand written backup of your cold wallet key with an encrypted, cold version that’s stored in multiple places so you’d never lose it (e.g., multiple USB drives placed throughout your house, car and even a safe deposit box). Since the wallet keys on these cold devices are encrypted, they are safe no matter where they are stored – they are as secure as your cold wallet itself – and you can be more liberal in the number of copies and locations you place them compared to the hand written note.
The device key that decrypts these spare wallet keys is stored in the cloud, encrypted by your VESkey. So, it’s safe too. Even if someone could brute force decrypt the device key in the cloud, it would be useless without the cold physical devices.
If you lose your cold wallet key, you can always enter your VESkey to retrieve the device key, which in turn will decrypt the spare wallet key on the multitude of local, cold devices you’ve strategically stored. And, VES Recovery ensures you that you need not worry about losing your VESkey.
You have the best of both worlds – the continued security of a cold wallet with the practicality of VES Recovery.
Of course, there are many other innovative ways to employ VES with cold and hot digital wallets.
Learn more
Existing
IMAP Email
Email
Yes, this means your
current
Gmail account
It’s way too inconvenient to have a separate email account specifically for encrypted emails.
It would be far better if we could simply use our existing IMAP email accounts and selectively use encryption when appropriate and opt to not use it when it’s too inconvenient.
Then, there’s also the issue of losing your encryption key and forever losing all your email history. These two problems have made end-to-end encryption impractical for widespread use with email.
VESmail solves these two problems. VES Recovery provides a robust means of recovering your end-to-end encrypted email history after key loss. And, VESmail allows you to selectively send encrypted emails to others who uses VESmail, or to send an open text message to those who do not. All of this from the same, existing IMAP email address, such as Gmail or Hotmail.
With VESmail you no longer need to compromise. You can the security of end-to-end encryption, the safety of VES Recovery and the convenience of using your existing IMAP email address.
Learn more
Clouddash
VES enabled cloud storage
Learn more
CloudDash does more than integrate VES with third party storage services, such as Google Drive, Dropbox and Onedrive. It’s also a superior way to organize and manage all the drives and users. CloudDash allows your to organize by Entities, so that you can organize your storage drives and the people who have access to them by company, team, investments, family, departments, clients, or any other type that suits your needs.
The innovative CloudDash table coupled with the first ever People view allows a team leader to easily see everyone who has access to any drive and all files in one place, and more quickly drill down to change all access rights for a particular person.
Of course, the CloudDash table can also be toggled to the more traditional File view for a superior way to see and manage drives and files for the relevant entities.
With the practicality of VES integration, the creation of Entities to better mirror your storage world to your real world, the superior CloudDash table as a better way of managing user access and file organization, the innovative People view, and finally the coming integration with the new blockchain based distributed storage services such as Filecoin, Maidsafe and Storj, CloudDash is targeted to be the more useful, safer, and more practical way to manage your cloud storage needs.