Dekko’s key benefit is that data passing through the network cannot be decrypted using information on the servers. The encryption and decryption process can only occur on the user’s device, and Dekko never requests the users to pass their passwords over the network, either in open or in encrypted forms. That makes listening to the traffic totally useless as no data allowing decryption is passed through the networks at any time. Dekko uses recognised, efficient and proven encryption techniques, including AES and ECC. Dekko uses ECC for encrypting keys and signing all data. Dekko does not use Dual_EC_DRBG, thus eliminating a weak point in the standard ECC design.
Dekko account registration is straightforward and fast; new users only need to provide a name, email address and password. An email address ownership verification is done by sending a 4-digit code to the address provided, and once this is confirmed, account setup is complete. The password phrase required to decrypt user data is never sent to Dekko servers – only you can ever know your password, and your password is the key to all of your data. Even Dekko’s creators and administrators of data centres and servers have no way of reading user data.
Sending an email, chat or file is handled using the same encryption process. Anything sent on Dekko is encrypted using a different method to the last, which means that even if a decryption solution is somehow found for a single item, it cannot be applied to any other. All of this is done in the background users can always be confident that their communications are safe without ever having to think about anything other than logging in and sending a simple email.
Alongside ultimate security, Circles are Dekko’s major feature. Circles are much more than simple group addressing; they reflect how businesses work. Trusted parties are nominated and certain information can only be seen by certain people. Circles are the perfect solution to managing internal and internal-external communication and are easy to set up and manage without IT involvement. Within a circle different member types are used to grant varying levels of visibility, and using these three can cater to almost any business interaction.
Circles also protect users from misaddressing and accidental leaks. When operating in a circle a is only ever able to type recipient address that they have been granted access to, so information and content cannot sent to the wrong destination – unless done purposefully – which is where the audit trail can be used to track malicious behaviour.
External circle members can only be seen by members who are Visible to External. They cannot see other external members. An example use case would be adding a customer to a circle where you do not want them to see other customers or employees.
Visible to External circle members can be seen by all other circle members regardless of type. An example use case would be using this type for an employee in circle that is visible to both customers and managers.
Invisible to External circle members can only be seen by non-external members. An example use case would be for a manager that can view discussion in a circle and be seen by employees, but not customers.
Legal cases present a communication challenge where sensitive documents of varying sizes and formats need to be passed between parties. It is essential that dialogue is managed securely to ensure that the right information is sent to and received by the right people. Dekko Circles are a perfect application for managing information & visibility for different parties in a legal case. When you create or join a Circle, you know that you have complete control over the visibility of your messages and that the Circle can’t be penetrated by untrusted parties.
Dekko’s security design uses the best balance of secrecy and traceability. The audit trail provides a who originated a message, who it was sent to, and who it was read by, without revealing the contents of the message itself. Message trails are uniquely identified and filtering means that finding the needle in a haystack is easy.
Only Dekko users can send a message to other Dekko users, and the Dekko application itself has no functions that would enable spam and phishing attempts to be sent out, especially en masse. If a spam system is aware of an email address that is being used as a username by a Dekko user, the spam message will go to the user’s regular inbox (e.g. Gmail inbox), not their Dekko inbox.
Dekko always signs all outgoing messages using the sender’s digital signatures. This uniquely identifies the sender and confirms that the content of the message has not been altered in any way. This prevents any fake messages entering the system; Changing the digital signature is impossible as it requires both the sender’s and receiver’s keys, and they are never passed through the network in open form.
There are many products in the market that are solely used for signing and verifying messages – and they’re expensive. Most of these services exceed the monthly cost of Dekko and only provide a feature that is one component of Dekko. Signing, among many other security processes, is all done in the background without the user having to think about it.
Not all businesses are ready to replace their standard mail client for day-to-day operations. To address this, the Dekko Mail Gateway brings all of Dekko’s security and to applications such as Outlook, Apple Mail and Thunderbird. The Mail Gateway is extremely easy to set up and can even send and receive emails and attachments in specific Circles.
The mail gateway converts a dekko.io IMAP server to the Dekko protocol, and messages sent using a mail client will go to any Dekko inbox, or a Dekko inbox using the Mail Gateway if the receiver has it setup. The Mail Gateway setup in Outlook is very straightforward and can be rolled out by an IT team using policies, or setup by an end user in less than two minutes.
Regulatory change will be a primary motivator for businesses adopting privacy-focused communications and data management solutions. These changes include most the Notifiable Data Breaches (NDB) scheme in Australia and the General Data Protection Regulation (GDPR) in Europe, which will be enforced in February 2018 and May 2018 respectively. These directives are being put in place to protect citizens and ensure that companies holding and managing people’s data are taking the necessary steps to protect their customers.
Commencing February 22 2018, the Notifiable Data Breaches (NDB) scheme is an amendment to the Privacy Act (1988) that legally compels medium and large sized organisations handling Australian citizens’ data to notify the Privacy Commissioner and customers if they have experienced a data breach.
Who is covered by the NDB scheme? – Federal Government agencies, private sector and not-for-profit organisations that have an annual turnover in excess of $3 million. Small businesses under $3 million that handle personal information.
Notification triggers – when there is unauthorised access to, disclosure or loss of customer information held by an entity, which generates a real risk of serious harm to individuals involved. This covers when devices containing customers’ personal information is lost or stolen, a database containing personal information is hacked, or personal information is mistakenly provided to the wrong person.
Data types – examples of the information types that may increase the risk of serious harm if there is a data breach include: ‘sensitive information’, such as information about an individual’s health, documents commonly used for identity fraud (including Medicare card, driver’s licence, and passport details), financial information, a combination of personal information (rather than a single piece of personal information).
Significant fines for noncompliance – up to $360,000 for individuals and $1.8 million for organisations.
The EU General Data Protection Regulation (GDPR) is a new directive that has been designed to protect EU citizens from privacy and data breaches, greatly improving on the current regulations established in 1995. The GDPR will be enforced from May 2018.
Privacy by design – it is a legal requirement that systems are designed with the inclusion of data protection and privacy from the outset. This means that companies holding citizen data are legally responsible for the protection of such data and appropriate technical measures must be made to do so.
Right to access – citizens have the right to know if data that belongs to them is being processed, what this data contains as well as where and for what purpose.
Right to be forgotten – companies holding citizen data must erase all data associated with that citizen should they request it.
Breach notification – it is mandatory that a company holding citizen data must notify their customers without undue delay after becoming aware of a data breach.
Increased territorial scope – the GDPR applies to all companies holding citizen data residing in the European Union, regardless of location.
More information: https://www.eugdpr.org/
Legal cases present a communication challenge where sensitive documents of varying sizes and formats need to be passed between parties. It is essential that dialogue is managed securely to ensure that the right information is sent to and received by the right people. Dekko Circles is a perfect application for managing information & visibility for different parties in a legal case. When you create or join a Circle, you know that you have complete control over the visibility of your messages and that the Circle can’t be penetrated by untrusted parties.
Circles are much more than simple group addressing; trusted parties are nominated and certain information can only be seen by certain people. That means no spam and no phishing.
A company’s board and the way it communicates is a perfect environment for Dekko to shine. A board is often comprised of internal people and external talent. When sharing highly confidential board papers, this information often needs to leave the organisation via email. When you use regular email systems, this information is now unsecured and vulnerable. The Dekko web and mobile app means that documents and communications can be securely accessed anywhere.
Dekko ensures absolute security and confidence when sharing sensitive information with external parties.
Doctor patient confidentiality makes communication using traditional email methods a dangerous business for health professionals. It is critical that individual health records are able to be shared between Doctors, hospitals, Specialists and biological imaging centres efficiently and in true privacy. Dekko’s real time read receipt function also means a doctor can see if a Specialist has opened and read a message.
Dekko’s ability to handle large and unconventional format files means scans, images and documents can easily and securely be sent between parties.