About the project
Covert Comm makes covert communication technology accessible to everyone as an easy to use tool to assure their privacy. This goes way beyond encryption and is designed to make it easy to have a private life again.
Whether you’re an individual or an organization, Cybercriminals, foreign government agencies, and corporate spies are all real threats to your privacy. Intellectual property, private communications, and financial records are just the tip of the iceberg when it comes to what can be stolen by malicious actors.
Covert Comm’s data hiding and covert communications technologies are based on steganography – in simple terms the practice of hiding data inside other data. Doing so leaves no traces behind, no bread-crumb trail for cybercriminals to follow. They are the
world’s first patent-pending production level steganography platform, able to secure data both at rest and when in motion. Offered to both individuals and organizations, even if they suffer a breach, cybercriminals will not be able to view their hidden data or intercept their cover communications.
What we built….
We built two products – StegPro and StegNet – which both have fully capable API layers, allowing for integration into workflows, processes, and software.
Both are available for personal use or large scale deployment in an on-premise installation, system integration, and Software as a Service (SaaS).
StegNet……
A state of the art covert communication platform allowing users to send data covertly to anywhere in the world bypassing surveillance and bad actors spying on their communication. With recent threats like quantum computing, encryption is at risk and covert comm technology will conceal data even when encryption fails by performing steganography in network protocols.
StegPro……
Leveraging state of the art methods, StePro will hide valuable data inside innocuous looking files. You can hide your most valuable files or messages inside other files like images, pdfs and many more. Covert comm’s technologies will assure the secrecy and privacy of your data.
For more technical details on this project, please refer to our blog posts.