Inside our Tech

LockDown is built on a foundation of robust identity, privacy and security technology.

We seek to provide the benefits and workflow of a SCIF (Sensitive Compartmented Information Facility) – delivered to your phone or computer.

Our mission is to provide the most secure, containerized communication platform that’s also very easy to use.

Distributed Identity

Distributed, password-less identity system eliminates the risks of phishing attacks and unauthorized sharing.

Your private digital identity (encryption keys), which is used to encrypted/decrypt data and authenticate your identity to other devices, is stored on your smartphone.

Privacy by Design

Zero-knowledge architecture ensures only those you choose can access information. We can’t see your messages and files, and no one else can either without your permission.

Privacy is woven into the fabric of LockDown. Every message, every document, every picture, every account… everything is private.

Zero-Trust Security

Zero-trust model means you no longer need to place trust in devices, networks, companies, or other people with your information.

What previously was handled through policies and legal agreements can now be controlled, managed and enforced with technology.

Atomization Encryption

LockDown’s patented Atomization™️ encryption first uses FIPS 140-2 compliant AES 256 as a pre-step, meeting today’s industry standards and regulatory compliance, then overlays a proprietary non-deterministic cryptographic bit splitting algorithm. Atomization™️ encryption keys are 8,192-bits.

Additional Details

State-of-the-art end-to-end encryption secures each Vault and Direct Message.

In addition to end-to-end encryption, each message, photo and document is separately encrypted.

Data is never stored locally on any device.

All data is encrypted in-transit and at-rest. The cloud cannot read the data.

Screenshots are disallowed on Android and screenshot notifications are recorded on iPhone.

When access to a document, conversation, Vault or an entire account is revoked, there is no residual data accessible or left behind on the device.

Your business has ownership of all content on their system.

Built-in oversight and control ensures compliance to company policies and government regulations.

Want to dig deeper? 

If you’re a security professional who is interested in learning more of the finer details of LockDown’s identity, privacy and security technology, we’d be happy to speak with you. Contact us here and we will reach out to you shortly thereafter.

Ready to make your business more secure?