Atakama protects files using advanced threshold cryptography and by inextricably linking files stored in one location to more than one physical device.
After a quick set-up process to link your trusted devices together, all it takes to protect new files is to move them to the Atakama folder. Drag-and-drop them inside or save files directly to it for instant encryption.
When a file is added to Atakama, it's instantly encrypted using AES-256, the largest key size for the AES standard. Atakama then splits up the unique key generated for the file, encrypts those smaller pieces, and distributes them to your devices.
Opening an encrypted file without its unique key is mathematically impossible. Because files protected by Atakama have their keys split into smaller pieces that are each stored on a different device, Atakama begins the process of opening your file by requesting the correct key fragments from your devices.
Atakama confirms that the necessary pieces of the key have been correctly rebuilt before decrypting and opening the file. This entire decryption and file opening process takes place instantly.