C-Auth - the next step for privacy and digital security in the Internet

Every single year there are news about hacked platforms, which are followed by the publication of private user data. Unfortunately, it still happens very often that among the hacked platforms are some that store passwords unencrypted. For the 21st century, the digital age, this is a mistake for which there are no excuses.

Every time a user provides his or her personal data on a platform, he or she must trust that the platform will process and store the data responsibly. Unfortunately, it becomes apparent every year that such responsible handling of sensitive data is not the norm. Even tech giants like facebook have apparently stored passwords unencrypted for years, according to krebsonsecurity, 2019 .

At C-Auth, we believe that security must always be priority. That is why we firmly believe that such cases of published passwords should no longer exist. Furthermore, it is not the platforms that should have control over personal data, but the users. For this purpose, we are developing C-Auth. We have set ourselves goals that we want to achieve when using C-Auth:

security

Security

The data users provide should always be secure. No unauthorized instance should ever be able to obtain any of their data.
usability

Usability

Any tool related to C-Auth should be easy to use for anyone, also for people without technical knowledge.
full control

Full Control

Users should have control over their data at any time . Not only which data they provide, but also who can access it.
transparency

Transparency

Who accessed which data, and when? Users should be able to see that aswell