MyFinder is a unique search engine with a simple privacy concept in mind. We log your searches but none of the data, it's that simple.
Biometric passportPrivate information retrievalHomomorphic encryptionSearchable symmetric encryptionHomomorphic secret sharingPost-quantum cryptographyHmacFacial recognition systemFilesystem-level encryptionIris recognitionFingerprintBlock cipher mode of operationPersonal identifierCurve25519Key derivation functionDisk encryptionSemantic securityCryptosystemPublic key fingerprintLocal differential privacyPrivacy-enhancing technologiesAuthenticated encryptionSecure multi-party computationNtruencryptCryptographic hash functionPassword crackingHybrid cryptosystemIntegrated encryption schemeSecure cryptoprocessorOne-time padQuantum key distributionHardware-based encryptionCryptographic protocolForward secrecyPgp word listDigital signature algorithmKey encapsulation mechanismIpsecDatabase encryptionSuperdense codingDeniable encryptionDual ec drbgTransmission securityPublic key certificatePrivacy-enhanced mailClient-side encryptionDevice fingerprintPseudorandom binary sequenceFormat-preserving encryptionDigital video fingerprintingCryptographic key typesHandwriting recognitionPerceptual hashingCiphertext stealingSymmetric-key algorithmTokenizationPrivate set intersectionTouch idHardware security moduleCipherDisk encryption softwareLength extension attackMessage authenticationData maskingDigital signature forgeryDerived unique key per transactionTls-pskElgamal encryptionEncryption softwareAuthentication protocolShannon codingIntelligent character recognitionCiphertextProxy re-encryptionTransposition cipherPbkdf2Information-theoretic securityInitialization vectorGoogle authenticatorChacha20-poly1305Smart lockNeural cryptographySignal protocolPadding oracle attackLossless compressionSecurity levelDatagram transport layer securityStrong cryptographyKeystreamSupersingular isogeny key exchangeBlind signatureData re-identificationCbc-macAutomated border control systemProprietary file formatPermutation boxIndistinguishability obfuscationPrivacy engineeringColumn level encryptionAdiantum