Dive Into the New Age of Data Encryption and Protection

Data decentralization
Our APIs directly encrypt any kind of data using our own Y-GEN protocol. Any data sent through our APIs are secured from the get-go. Y-GEN "cuts" the data sent to little data packages and decentralizes it, and "glues" it back together on receiving end, achieving the security never seen before.
Unmatched speed
After two pilot projects, we managed to decrease the time of encryption and transfer to 45% the speed of server-based transactions while simultaneously encrypting and decrypting the data packages. The blockchain that will be built around the Phantera system will get faster and safer with each user using it, which means that we are projecting phone call APIs to be available by late 2023 while video calls could be available in late 2024.
All data types supported
Our system works on any kind of data type, from txt. files to unrecognizable ones, we have you covered. We do not have the possibility to look or decrypt your files, which means that once the data is in our system, the process is completely automated, securing you and your data.
Development ready
Our APIs work on plug and play system, so developers can use our APIs just like they are using server-based data transfer APIs now. We will soon open the APIs market where developers will be able to rent the APIs on a monthly basis. We already are offering contracts for already existing systems to be upgraded with our system, and you can always contact us for a quote.
How it Works:
Based on Phantera implementation in "presentation based F-Mail".
STEP - 01
User A wants to Send file to User Bvia F-Mail

STEP - 02
User A uploads the file to F-Mail as usual. F-Mail accepts the file to their system.

STEP - 03
F-Mail communicates with Phantera. Phantera gets the PDF in it's System

STEP - 04
Phantera cuts the PDF files to pieces; The F-Mail owner decides how the cutting is done (vertically, horizontally, combined, etc)

STEP - 05
Every cut piece is encrypted. Depending on the requirements at F-Mail owner, the pieces are encrypted differently depending on the region.

STEP - 06
The encrypted piece is snet to the blockcahin. Depending on the F-Mail structure; The file is sent to main net on side chain

STEP - 07
User B requests the files from the blockchain. This process is automatic

STEP - 08
Each piece is decrypted

STEP - 09
All pieces are glued back together

STEP - 10
Transaction is completed and notice is sent to User A.

Transaction times are stored on the blockchain

Projected transaction time is +10% current server-based transaction time