Product features and technical specifications

Engineered with
Zero Trust at the core

Velamnis has been engineered to always operate as in hostile environments.
The only party it trusts, and you trust, is you!

  • 256 bit AES-GCM as default
  • 4096 bit RSA as default
  • 1024 bit Threefish available
  • Only end to end encryption
  • Triple integrity layer
  • No use of cookies
  • No unencrypted key storage
  • Multi-factor authentication
  • All network communication is cryptographically signed

Engineered and built with the worst in mind

Our paradigm is that the system must be prepared for when the worst happens, not if the worst happens. Always assume the system is breached. Zero-trust!

Always-on security

Never operate under the assumption that the network or the system are safe.

Trust is flawed

Trust is flawed. Trust begins and ends on your own device. The rest of the network is zero-trust.

Engaged with experts

We contract expert cybersecurity companies to periodically test our software for weaknesses.

Open-source clients

We publish all our client code for everyone to see and analyze. You can only trust what you see.

Image

Rich feature set without compromising privacy and security

Sending and receiving files, as well as one to one and group chats are one of the core features of Velamnis. Whether it is with your family, your close circle, your coworkers or you are operating in a hostile environment or under duress, you have the peace of mind that your data will only reach its intended recipient.

Velamnis is not a distribution system. We do not support and will never support the public distribution of files and data outside of organizations. Velamnis operates under the premise that the sender has specific recipients in mind for the data being transmitted.

Safeguarding your valuable data is becoming harder in today's hostile environment. With the rise of ransomware attacks, it is essential to have a safe copy accessible to you and only by you.

With Velamnis, you have the confidence that your data is not only safe from hackers and ransomware, but also safe from other unintended prying eyes, such as datacenter operators and employees and even ourselves. The best way to secure your data is to take away the possibility of anyone, including us, of decrypting your data. Only you are able to do that.

Velamnis easily allows you to access your data, as well as collaborate from multiple devices, even at the same time. Logging into additional devices is a matter of seconds and no hassle!

Velamnis is available regardless of your operating system. You can take Velamnis with you on your mobile and tablet. As long as you have an internet connection and a browser, you are covered.

Power-up your Velamnis experience with our local agents! Our easy to use agents are available for Windows, MacOS X and Linux and offer boosted performance, higher transmission limits, continuous sync, additional encryption options, TPM integration and more!

Velamnis agents are stand-alone, require no installation or configuration and integrate seamlessly with the Web client. The agents, just like our Web client, are open-source, hackable and available to everyone to review, audit and modify.

We take a very firm stance towards privacy and security. We strongly believe that these are fundamental rights, rather than privileges controlled by a higher authority. We make absolutely no compromise and offer you 100% of the control to your data.

With great power comes great responsibility. You are solely responsible for your Velamnis key bundle. If you lose access to it, you lose access to everything you have on Velamnis. We give you 100% control and we mean it.

Image