AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
The Trusted Device Model
It's end to end encryption. Decryption still happens on device. The thing that I really like is that we've done this in a very much a one password way. It's zero knowledge architecture. Even if any identity provider credentials are compromised, attackers actually still won't be able to access your your one password data which is huge.