Atakama is a data privacy and security solution that leverages advanced encryption technologies as well as the processing power of your computer and your mobile devices together to safely and securely protect your data better than any single device could by itself.
Files protected by Atakama are encrypted using the AES-256 standard. A unique private key (a file based on a random number that acts like a strong password) is generated for each file which Atakama splits into smaller pieces, each of which are also encrypted before being distributed across more than one physical device that you trust, such as your smartphone or tablet. A trusted device can also belong to colleagues, close friends, or family members.
As a result of Atakama managing keys in this fashion, hackers and malware are unable to access files protected by Atakama without having both physical and digital access to your devices.
Instead of requiring a password when opening a file encrypted by Atakama, an approval request is pushed to your trusted devices. A simple tap of the "Approve" button in the Atakama mobile app securely transmits the piece of the requested file's key stored on that device back to your computer. Atakama then recombines the key from its pieces, decrypts, and opens the file. This entire process takes place instantly.
No. 2-Factor Authentication is simply a method of strengthening a log-in process by requiring a second type of password. It has no impact on the way data is protected within a system that uses it.
Like many modern platforms and services, Atakama relies on using mobile devices in conjunction with a computer but that's where the similarities end.
The Atakama system architecture ensures that you, and only you, are able to view and access the data you protect with Atakama. There are no back doors for remote access or administration of any kind, even for us.
Atakama is built with common-sense precautions that do not impact security in the event a device ever becomes lost, inoperable, or compromised.
When you set Atakama up for the first time, you’ll receive a set of unique offline recovery words that you can use to regain access to your protected data in the event you're unable to use your primary device.
As part of your own Atakama configuration, you can also choose to link mobile devices that belong to remote, trusted contacts. If you ever lost one of your own mobile device(s), your "trustees" with their devices can help restore access to your protected files (without you giving them direct access to those files themselves).
Yes. In fact, we recommend using Atakama with a cloud storage service for increased protection and ultimate data privacy. Atakama currently integrates with Box, Dropbox, and Google Drive.
We recommend that users have physical access to one main computer (“workstation”) and at least one trusted mobile device. Atakama can, however, be used with a mobile device that’s not in your possession.
We built Atakama to work with as many platforms as possible. Atakama for desktop and laptop computers is compatible with Windows, macOS, and Linux and the Atakama Mobile app is available for both Android and iOS. You can mix and match any combination of devices and operating systems.
If a device you use with Atakama ever goes missing or falls into the wrong hands, you’ll be able to remotely remove and replace it through the Atakama app on your computer. We also provide you with an offline recovery method in the event you replace your primary mobile device or if it becomes compromised or inoperable.
Yes! In fact, the more devices you link together with Atakama, the better protected your data becomes.