Data BreachPreventionProduct Suite SimpleSafeSecureConvenient Backed by patented VES technology for e2e encryption of data-at-rest VES Product Suite ![]() VES APIsExtend the benefits of VES to your internal team or external customers: e2e encryption of data-at-rest, VESrecovery, VESauth, public key infrastructure and more. View more secured by ![]() VESauthLeveraging the innovative VESlocker tech for authentication & authorization - hardware grade cryptographic user access with the convenience of only a PIN and your device. View more ![]() VESmailEmail e2e encryption that works seamlessly behind the scenes with: any IMAP account, any email client, all major platforms, enterprise & personal and has a set-and-forget convenient user experience. View more ![]() VESencryptA superior microservice for encryption of data-at-rest that mitigates the looming 3rd & 4th party data breach vulnerability of hosted data-at-rest encryption services. View more Patented Viral Encrypted Security Learn more Safety and Security VES establishes a new paradigm in the combination of safety from key loss, and the full security of undiluted end-to-end-encryption (e2ee). In the past, users would have to choose between uncompromised e2ee with no chance of recovering encrypted content if the key is lost, and giving a third party a copy of the encryption key for some safety but at the price of diminished privacy and a substantial risk to security. Benchmark safety Go to the Safety section below to learn more about how VES can reduce the risk of key loss to lower than 1 in 14 trillion! Those odds are much lower than any other key recovery method of which we know. Not only does VES provide safety without compromising security, it can provide a new benchmark in that level of safety too. Simple to setup & use Simple to create & setup The easiest and best way to create a VES account is by signing up with a 3rd party app through VESauth. VESauth is present whenever you see the Secured by VESvault logo as you sign up with the app. Post VES setup There may be additional setup steps specific to the 3rd party app. With a crypto wallet, this may include securing a wallet seed. With VESmail, this pertains to configuring the email app with the VESmail settings that are single-click copied from your VESmail Account Manager page and pasted into the exactly matching fields in your email app. Simple to add a device You essentially repeat the above process when you want to add another device for your VES enabled app, but with one step swaped out for another. Instead of receiving an email with a link, you will enter your PIN on the device that already has your VES account connected to it to enable the same VESkey on the new device. Very simple, very fast. Another way You can also add your VES account to another device without including the 3rd party app in the process, by using the drop down menu on the upper left on this page. But, it's faster, easier and better if you do it through the 3rd part app so that you can immediately use the app on the new device. Using VES - simply invisible Generally, VES works invisibly behind the scenes and your never need to think about it. For full cryptographic grade access security, some VES enabled apps, such as crypto wallets, may require you to enter your PIN every time you access this app. Other apps, such as VESmail, may not require this to use the app. Safe from key loss Level 1: the VES enabled 3rd party app You may have multiple VES enabled apps. Each app has its own dedicated app encryption key, which enables the app to function. You have a single VESkey, which is the master encryption. Your VESkey is always stored locally on your device - it may be in the app itself or it may be in the browser local storage. The app itself, or the browser with which it may be connected, is the primary location for your keys. Should the key(s) at this location become inaccessible, you will need to retrieve a copy from another key redundancy location. Level 2: VES browser extension When a 3rd party service uses a browser instead of an app, your VESkey is stored in the browser local storage. In this case the VES browser extension becomes the next level redundancy. The VES extension guards against the VESkey being inadvertantly erased by the user from the browser local storage. For privacy reasons, most browsers have an option to erase the local memory and this will also delete the VESkey. The VES extension prevents this from happening as there is no user option to clear the memory in the VES extension. Level 3: Add Another Browser/App An additional copy of the VESkey is stored in each Browser/App that is added. This can be done on the same device itself by adding the browser in addition to the 3rd party app, but even better it can be done accross multiple devices. The more devices added, the better as this protects against key loss resulting from losing the device itself. Having two or more devices with your VESkey very significantly protects against the risk of key loss. It also allows you to use your app on all your devices. Level 3+: PIN/VESkey Having a browser with the VES extension enabled on all your devices even with 3rd party apps provides another dimension of level 3 redundancy. In such a case, even if the app itsel becomes unusable for some reason, for instance in the unlikely event there is some sort of global hack to the app that destroys the 3rd party app on all your devices, you can still use the browser to retrieve a copy of your app key. Simply select the View My Keys option, enter your PIN and retrieve a copy of the app key. Level 4: VESrecovery 1 in 14 trillion...VESrecovery can become that safe, and even safer, from key loss. When your VESrecovery network is just being set up, it may not provide much protection from key loss. But, that will change very quickly as your network grows just a little and eventually, VESrecovery should become the safest, most robust key redundancy of all the options. Level 5: VESkey/app key paper copies When it comes to encryption, you should ALWAYS have paper copies of your VESkey and app keys stored safely in one or more separate locations. Write them down on paper and put them some place safe. Or, copy them to a USB thumb drive that does NOT bet backed up to the cloud. Level 6: 3rd party app redundancy The 3rd party app may have an additional redundancy that can be used outside of VESvault to retrieve your content. In the case of crypto wallets that are secured by VESvault, the 3rd party may provide a wallet seed that can regenerate the wallet encryption key. If that's the case, you will be able to use the seed to retrieve your crypto wallet contents. Secure e2ee and more Encryption algorithms VES uses open source, industry standard encryption alogorithms, which have never been known to have been hacked. No shared master key Your VESkey is the master key required to decrypt all of your encrypted content in your primary VESvault. The only place your VESkey resides is the local storage of the browsers on each of your devices that have been enabled with your VES account. There are no other copies of your VESkey, anywhere. It is not shared with anyone, including VESvault Corp. No collusion risk VESrecovery is a breakthrough innovation of a highly reliable way to recover encrypted content if the master key is lost or inaccessible, without creating the risk of collusion from friends who have tokens that can be combined to construct an encryption key. It eliminates the collusion backdoor that otherwise dilutes the security of end-to-end encryption. Shadow vault & shadow key The shadow vault is a mirror image of the content in the primary vault, but with the critical distinction that it is not encrypted by the VESkey but rather by the shadow key. The VESkey cannot decrypt the shadow vault and the shadow key cannot decrypt the primary vault. The shadow key is encrypted by the recovery key. Using a process similar to Shamir's, the recovery key is converted into a series of tokens, each of which is useless by themselves in reconstructing the recovery key. A pre-defined number of these tokens must be used collectively to reconstruct the recovery key. The improbability of collusion The best way to show that the collusion risk is neutralized is to walk through the path a collusion hack would have to take to be successful. VESlocker Even if a hacker were to get access to one of your devices, they could not gain access to your primary vault without your PIN. Assuming they don't know it, they only way to get it would be brute force multiple attempts. Security Time Delay Security Time Delay is a breakthrough innovation that acutally gives you the ability to stop any front door hack in progress, before the attack can be completed. You don't have to rely on technology to stop the hack. It puts you control! Apps connected to VES Connected apps
VESmail VESencrypt (Docker container) For SAAS providers If you're interested in connecting your SAAS to VES, go to ves.host The Math VESrecovery odds calculator Open Try changing numbers in the yellow boxes to see the estimated probability of VESrecovery. N= Number of unique Friends for each person p0=%Probability a user loses complete access to their VESkey since last usage x = Number of Friends needed to respond to enable VESrecovery
VESrecovery probability formula: L is defined as Level. Disclaimer: The probabilities generated in this calculator are estimates only. The calculator can not and does not represent or guarantee the true probability of key loss or VESrecovery. Factors affecting reliability include, but are not limited to: the number of friends in the network, the number of friends chosen by each user to achieve VESrecovery, the number of connected devices, and the probability that any individual user will not lose their VESkey. The actual level of reliability is completely determined by each individual user's VES network and VESvault Corp makes no representations or guarantees about the reliability of VES recovery for any individual's VES network. VESvault Corp cannot assist in setting up a VES network nor can it recover any lost content or VESkeys. Hide | ||||||||||||||||||||||||