Will you have a technical WP?
The second part of the current whitepaper is quite technical. If you are interested in technical details of our project, get a closer look at:
Cryptographic methods we use .................................. 09
Encrypted channels .................................................. 12
Invites ................................................................... 13
Blockchain and decentralization ................................. 15
Authenticity of the recipient ...................................... 16
Authenticity of the sender ......................................... 18
Business card and new asymmetric RSA keys............... 20
Password change ..................................................... 21
Three stages of message authenticity ......................... 22
Grouping letters ...................................................... 23
Aliases.................................................................... 24
Automatic sorting of incoming messages .................... 25
Two-level search ..................................................... 25
Sending to external addresses in encrypted format....... 26
File storage module.................................................. 27