Unpredictability creates security

The movements of a lava lamp are completely unpredictable. With unpredictable content, it is impossible to replicate the snapshots.

The snapshots are used to individually encrypt users’ data in the database, so all personal information is securely stored in dikitale.

how can lava lamps be used for encryption?

The encryption is done using algorithms where the output is generated based on mathematical calculations. But when the algorithms are built on known methods, it is possible for outsiders to put them together in the correct order, and thus break the code.

We have chosen an encryption method that takes us to the next level: Lava lamps. Because lava lamps are organic, their contents are impossible to replicate.

We are constantly filming our lava lamps, taking a snapshot on demand that gives a random pattern that cannot be replicated. The pattern is transformed into a unique code string.

From this, a piece of the code string is automatically found, which is used to encrypt the data. The code must be used to decrypt the data again.

Unpredictability creates security

dikitale® encryption & NODA©

tightened access to data

The technology of the lava lamps is our own and is called dikitale® encryption.

The technology is used to generate the unique personal code. The code is used as a security key when the user’s personal data is encrypted in the database. It is a process we call NODA ©.

NODA © stands for no data access and is based on Microsoft’s philosophy that all data is always encrypted for everyone.

In dikitale, no one has access to the unencrypted information stored in the databases, not even the most trusted employees can access the data. This means that users’ data can only be accessed when the users themselves decrypt the data with their personal unique security key that was created with dikitale® encryption.

PDEX©-technology

technical method underpinning gdpr

PDEX stands for ‘private data exchange’. The PDEX © technology was invented in 2017.

PDEX is a proprietary format managed by MIQ that allows individuals to store private identity data in a cloud solution managed by the individual.

After a digital handshake with a counterparty, users can exchange data about themselves with the counterparty without having to enter all the data.

PDEX © technology allows websites to display relevant data to the private counterparties based on their basic details such as age, gender and postcode.

The technology also allows the display of relevant data based on users’ shared personal interest in the specific website. The technology has not yet been released for use by anyone other than dikitale.

PDEX technology logo

security is a top priority for dikitale

the structure of dikitale api - english
enterprise, API and database architecture

Thought-out architecture

Our architecture is built around APIs. They act as the umbilical cord between our environment, which contains user data, and our customers’ software systems.

We have built the architecture complex to increase security. We do this because security is a top has priority for dikitale.

user-driven identity

secure data sharing

dikitale users themselves share information with selected parties. For example, you can require the customer to share at least their passport with you.

Users can withdraw their information so that the other party no longer has access to it. However, we will always be subject to the law and can therefore only delete the data once the law has been complied with.

For example, a customer may withdraw their data today. However, due to current legislation, you are required to keep the customer data for an additional 5 years after customer closure.