Learn How We Keep Your Data

End to end encryption

John Charlie

Last Update 10 месяцев назад

We employ a robust encryption system to secure your valuable data both during storage and transmission. Our encryption process utilizes a hashing algorithm that renders the data unreadable to humans. Rest assured that your data is protected, posing significant challenges for any unauthorized individuals attempting to access it. This security mechanism involves the utilization of three (3) primary keys provided by Fruitask, along with unique user keys for each workplace.

Encryption Process 

Whenever you save data to Fruitask, such as "I love Fruitask," it undergoes an encryption process before being stored on our servers. This process transforms the raw text into a modified representation, for example:

That's correct. The encrypted text of "I love Fruitask" is designed to be unreadable, ensuring the confidentiality of your data. Similarly, as the service provider, we are unable to access or decipher the specific content you are saving, whether it includes sensitive information like passwords, credit card details, or bank information. To decrypt the data and revert it to its original form, three (3) secret keys are required. One key is associated with Fruitask, while the other key is generated based on the user's session login, establishing unique keys linked to their workplace. This multi-layered encryption and key management process ensures the security and privacy of your data.

I hope this brings more information to you. 

Still need help? Message Us