Notifications

There are no notifications at all. BuckitUp is aiming at proactive asynchronous communications, protecting the conscious and meaningful workflow. When you are looking for something just open the intended chat or room when you really want it, and all the available content will be there. No irritating notifications.

Besides, by default BuckitUp operates in the offline mode, so expect to be entirely disconnected from the internet when using BuckitUp, notifications from all other apps will not disturb you either.

High standard encryption

The BuckitUp security model implies strong cryptographic protection of all the content. Only a portion of well obfuscated metadata is visible in the plain text on the local storage, while all the valuable data is always encrypted with keys stored separately on the client side. No users data is available to the company. Nothing is by default synchronized or sent anywhere remote from the initial location of the device. This allows to ensure locality and insulation of the data while preserving the advantages of the storage redundancy and distribution (if multiple nodes are set up in sync by the user on the user’s side).

Multiuser collaboration, and proofs of authorship are also implemented cryptographically which puts the control over the access rights entirely in the hands of the data owners.

Permissionless data security

In contrast to most of the cloud services, in BuckitUp the key management is not by any means available to a third party. It means that every user needs no permission from anyone else to deal with there own access rights. Once granted the access to content the user remains cryptographically capable to access it at anytime. It means that everybody who is using the system is equally allowed to:

  1. Access any content that is available to them (after granted the access rights - the keys)
  2. loose there own keys along with the access to any (all) data on the platform.
  3. Share access available to them with anybody else, which includes current and future content of the chats and rooms where they participate.
  4. Add content to channels accessible to them, without any constrains.
  5. Device admins, while they may very well delete rooms on the platform and any (or all) of its content, they are not provided with add hock means to moderate, ban, or block users on the cryptographic layer of the platform.