Security

Decentralised Architecture of Blockchain

Our platform is decentralised through blockchain technology. Attacks on your sensitive data are impossible because crucial encryption keys are distributed among set of nodes. There is no single server or central point of failure or hack.

Encrypted local storage

All kind of data is stored on the user device in a standalone encrypted local storage, independent from the base OS such as Android or iOS. Access to the data on а Qubits user’s storage is protected by QubitsID.

QubitsID is a unique symmetric encryption key, generated locally on the user side through using various sources of entropy, including cryptographic hashes of user’s finger-motions, account private key and passphrase. QubitsID provides the highest degree of uniqueness and avoids mathematical collisions. Thereby, even in case of physical leakage of protected database or the loss of control over the device, all sensitive data will be kept safe and untouchable.

In Qubits cryptographic and security models we have implemented disruptive and innovative encryption and authentication technologies to prevent and recognise all kinds of “Man in the Middle” (MiTM attacks), and provide professional data protection on all levels, including local, (on user devices).

DPKI Management

Qubits implements a new fresh approach by introducing AE (“Automated Encryption”) on Blockchain. The security model is built on true use of asymmetric cryptography (“End-to-End Encryption”) with decentralised authentication and public-key distribution. Users hold private keys on local devices when public key management is implemented via decentralised network of Blockchain Nodes.

Public-keys management, system and access administration is handled by an immutable decentralised environment (“DPKI”) governed by the DLT (“Decentralised Ledger”) consensus, therefore the public-keys cannot be altered, manipulated, or swapped for anyone else’s via Man-in-the-Middle attacks. Each connected end-point device holds a lightweight Blockchain Node that is always in sync with the Enterprise Network by implementing Merkel-Tree algorithms.

The endpoints are assured that the remote parties are truly authenticated which does away with an eavesdropper in the middle

QubitsID Technology

Access to the data on а Qubits user’s storage is protected by QubitsID. QubitsID is a unique symmetric encryption key, generated locally on the user side through using various sources of entropy, including cryptographic hashes of user’s finger-motions, account private key and passphrase.

QubitsID provides the highest degree of uniqueness and avoids mathematical collisions. Thereby, even in case of physical leakage of protected database or the loss of control over the device, all sensitive data will be kept safe and untouchable

Smart intrusion detection

Qubits platform employs an intelligent intrusion detection system that detects and prevents the most dangerous interception attempts. Qubits uses smart intrusion detection system to detect suspicious activity on I/O ports and MiTM attacks.

Advanced Cryptography

Qubits implements the latest approach to cryptology,
True end-to-end encrypted.
Usage of independent external key entropy sources.
The implementation of post-quantum cryptology protects your data as never before.

True Forward secrecy

Every conversation generates unique session key which terminated after delivery for deeper protection of your chats.