Latest version: v1.0.4
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
Location based Cryptography uses location of the device in addition to the pass-phrase as key.
No known vulnerabilities found
Has known vulnerabilities