Opening an encrypted file without its unique key is mathematically impossible. Since files protected by Atakama have their keys split into smaller pieces which are each stored on a different device, Atakama begins the process of opening your file by requesting the correct key fragments from each of your trusted devices.
After users confirm with a tap on their mobile device, the piece of the file's unique key stored on that device is securely transmitted back to the requesting computer for Atakama to reconstruct.
Don't worry about what happens if you lose a device -- we've got that situation covered.
Atakama confirms that the necessary pieces of the key have been correctly rebuilt before decrypting and opening the file on the requesting computer. This entire decryption and file opening process takes place instantly.