iPhone Screenshots


*** Technology And Process Patent In Process With India Patent Office

At the root of Our System there are a handful of mechanisms that allow nodes on the network to retrieve information from other peers, even when not directly connected to the original provider.
>>Encrypted & P2P
Related to the decentralized nature , It will use encryption for all data storage and transfer. Encryption and permissions systems mean that application is build on secure sharing features .
>>Censorship Resistant
Components like those above Will make our network resilient to censorship attempts. Examples include the Uncensorable Wikipedia in Turkey and the vote organizing in Catalonia.

>>Personal Data Sovereignty
Data is becoming an extension of our physical existence. Voting, dating, shopping , health are just a few examples of where humans and the important (and often private) information they create is being captured in digital data. We need to build technologies that let individuals own that data forever.

What’s New

Version 1.1.1

Download Images Option recovered

App Privacy

The developer, Kashiraja Energies Private Limited, indicated that the app’s privacy practices may include handling of data as described below. For more information, see the developer’s privacy policy.

Data Not Collected

The developer does not collect any data from this app.

Privacy practices may vary, for example, based on the features you use or your age. Learn More


  • Family Sharing

    With Family Sharing set up, up to six family members can use this app.

You May Also Like