[{"data":1,"prerenderedAt":304},["ShallowReactive",2],{"CMS_en_security_technology":3,"mdc-jrxds3-key":116,"mdc-j863v6-key":128,"$fpvYB5ZQ0zDdQca4M84IPE9embVf8j_1bW42rUc9F_ik":136,"mdc-lik18b-key":144,"mdc-9wurgd-key":152,"mdc-t9tqxi-key":160,"mdc-lyhfi9-key":168,"mdc-8tieb5-key":176,"mdc-f0y99k-key":184,"mdc--ofe0lm-key":192,"mdc--qaj68v-key":200,"mdc-pmfuqa-key":208,"mdc-83rvqb-key":216,"mdc-46pxep-key":224,"mdc--oeu20s-key":232,"mdc-4o1e55-key":240,"mdc-3hb6cj-key":248,"mdc-veica6-key":256,"mdc-g27gnz-key":264,"mdc--sjoeoz-key":272,"mdc-z01aww-key":280,"mdc--mx7imw-key":288,"mdc--pmk81v-key":296},{"id":4,"title":5,"body":6,"description":7,"extension":8,"faq":6,"features":9,"hero":48,"meta":55,"navigation":54,"path":56,"sections":57,"seo":113,"stem":114,"table_cards":6,"__hash__":115},"cms\u002Fen\u002Fsecurity\u002Ftechnology.yml","Security Architecture – Retyc Technology",null,"Advanced security architecture combining end-to-end encryption, zero-knowledge, and sovereignty. Discover our technical approach to confidentiality.","yml",{"title":10,"items":11},"Our technological pillars",[12,18,24,30,36,42],{"title":13,"description":14,"icon":15,"image":16},"Post-quantum end-to-end encryption","Local encryption with hybrid keys integrating mechanisms resistant to known quantum threats. Only you and your authorized recipients have decryption keys. Reinforced protection for the lifetime of your sensitive data.","i-lucide-shield",{"src":17},"\u002Fimg\u002Fshame\u002Fhacker-box.png",{"title":19,"description":20,"icon":21,"image":22},"Sovereign infrastructure","Exclusive hosting in the European Union by reference operators certified HDS and ISO 27001 (Scaleway, Clever Cloud). Reduced exposure to American extraterritorial laws (Cloud Act, FISA).","i-lucide-server",{"src":23},"\u002Fimg\u002Fsovereign.png",{"title":25,"description":26,"icon":27,"image":28},"Guaranteed zero-knowledge architecture","Encryption key management under your exclusive control. Technical impossibility for Retyc to access your content, metadata, or encryption keys. Cryptographic confidentiality by design.","i-lucide-key",{"src":29},"\u002Fimg\u002Fe2ee_user_key_box_alt.png",{"title":31,"description":32,"icon":33,"image":34},"Confidentiality by default","No advertising cookies, no third-party analytics scripts. Access to your transfers is logged for your benefit, without behavioral analysis for commercial purposes.","i-lucide-eye-off",{"src":35},"\u002Fimg\u002Fno_tracking_cookies.png",{"title":37,"description":38,"icon":39,"image":40},"Multilayer cryptographic security","Protection beyond simple access control: even if permissions are compromised, your files remain unreadable without post-quantum decryption keys.","i-lucide-layers",{"src":41},"\u002Fimg\u002Fe2ee_user_key_box.png",{"title":43,"description":44,"icon":45,"image":46},"Auditable open-source cryptography","Public and auditable cryptographic implementations by the security community. Complete transparency on our encryption protocols and algorithms.","i-lucide-code",{"src":47},"\u002Fimg\u002Fsecure_document.png",{"links":49},[50],{"label":51,"icon":52,"size":53,"isRegister":54},"Try for free","i-lucide-shield-check","xl",true,{},"\u002Fen\u002Fsecurity\u002Ftechnology",[58,67,86,106],{"id":59,"headline":60,"title":61,"description":62,"orientation":63,"image":64},"our_infrastructure","Our technical infrastructure","Our technical foundations for maximum security","Retyc is built on a European cloud infrastructure, designed to guarantee the confidentiality of your data. Discover the key elements of our technical architecture that ensure maximum protection for your sensitive content.","vertical",{"src":65,"width":66},"\u002Fimg\u002Ftech\u002Fretyc_infrastructure_simple.png",900,{"id":68,"headline":69,"title":70,"description":71,"orientation":72,"reverse":73,"features":74,"image":84},"e2ee-architecture","Architecture","Zero-knowledge architecture: confidentiality guaranteed by design","Unlike traditional transfer solutions, Retyc technically cannot access your encrypted content. Our zero-knowledge architecture guarantees that only you and your authorized recipients have the decryption keys.","horizontal",false,[75,79,81],{"title":76,"description":77,"icon":78},"Encryption before sending","Your files are encrypted locally on your device before any transfer to our servers. We never see your data in plain text.","i-lucide-lock",{"title":19,"description":80,"icon":21},"100% European technology stack and hosting by reference operators certified HDS and ISO 27001 (Scaleway, Clever Cloud). Reduced exposure to American extraterritorial laws.",{"title":82,"description":83,"icon":15},"Multilayer cryptographic protection","Post-quantum end-to-end encryption protects your data even if our servers are compromised or the network is intercepted.",{"src":85},"\u002Fimg\u002Fshame\u002Femployee_see_file.png",{"id":87,"headline":88,"title":89,"description":90,"orientation":72,"reverse":54,"features":91,"image":103},"data-security","Encryption","Beyond transit and rest encryption","End-to-end encryption (E2EE) offers superior protection to traditional transit encryption (TLS) and rest encryption. Understanding this difference is essential to evaluate real transfer security.",[92,96,100],{"title":93,"description":94,"icon":95},"Transit encryption (TLS)","Standard protection during network transfer. Necessary but insufficient: your data arrives decrypted on the provider's servers.","i-lucide-arrow-right-left",{"title":97,"description":98,"icon":99},"Rest encryption (server-side)","Files are encrypted on servers, but the provider keeps the keys. They can technically access your content for maintenance, analysis, or legal request.","i-lucide-database",{"title":101,"description":102,"icon":52},"End-to-end encryption (E2EE)","Retyc's approach: your files are encrypted before sending and can only be decrypted by your recipients. The provider can never access content.",{"src":104,"width":105},"\u002Fimg\u002Fe2ee_en.png",550,{"id":107,"title":108,"description":109,"links":110},"cta","Ready to secure your transfers?","Join organizations and professionals who use Retyc to protect the confidentiality of their sensitive content.",[111],{"label":51,"icon":52,"size":112,"isRegister":54},"lg",{"title":5,"description":7},"en\u002Fsecurity\u002Ftechnology","wjQ0YqmCfdKq4ejf3ARZaSaJF8D9GlDe7FnTAebTwt0",{"data":117,"body":118},{},{"type":119,"children":120},"root",[121],{"type":122,"tag":123,"props":124,"children":125},"element","p",{},[126],{"type":127,"value":108},"text",{"data":129,"body":130},{},{"type":119,"children":131},[132],{"type":122,"tag":123,"props":133,"children":134},{},[135],{"type":127,"value":109},{"baseUrl":137,"clientId":137,"redirectUri":137,"scope":138},"",[139,140,141,142,143],"openid","profile","email","roles","organization",{"data":145,"body":146},{},{"type":119,"children":147},[148],{"type":122,"tag":123,"props":149,"children":150},{},[151],{"type":127,"value":5},{"data":153,"body":154},{},{"type":119,"children":155},[156],{"type":122,"tag":123,"props":157,"children":158},{},[159],{"type":127,"value":7},{"data":161,"body":162},{},{"type":119,"children":163},[164],{"type":122,"tag":123,"props":165,"children":166},{},[167],{"type":127,"value":13},{"data":169,"body":170},{},{"type":119,"children":171},[172],{"type":122,"tag":123,"props":173,"children":174},{},[175],{"type":127,"value":14},{"data":177,"body":178},{},{"type":119,"children":179},[180],{"type":122,"tag":123,"props":181,"children":182},{},[183],{"type":127,"value":19},{"data":185,"body":186},{},{"type":119,"children":187},[188],{"type":122,"tag":123,"props":189,"children":190},{},[191],{"type":127,"value":20},{"data":193,"body":194},{},{"type":119,"children":195},[196],{"type":122,"tag":123,"props":197,"children":198},{},[199],{"type":127,"value":25},{"data":201,"body":202},{},{"type":119,"children":203},[204],{"type":122,"tag":123,"props":205,"children":206},{},[207],{"type":127,"value":26},{"data":209,"body":210},{},{"type":119,"children":211},[212],{"type":122,"tag":123,"props":213,"children":214},{},[215],{"type":127,"value":31},{"data":217,"body":218},{},{"type":119,"children":219},[220],{"type":122,"tag":123,"props":221,"children":222},{},[223],{"type":127,"value":32},{"data":225,"body":226},{},{"type":119,"children":227},[228],{"type":122,"tag":123,"props":229,"children":230},{},[231],{"type":127,"value":37},{"data":233,"body":234},{},{"type":119,"children":235},[236],{"type":122,"tag":123,"props":237,"children":238},{},[239],{"type":127,"value":38},{"data":241,"body":242},{},{"type":119,"children":243},[244],{"type":122,"tag":123,"props":245,"children":246},{},[247],{"type":127,"value":43},{"data":249,"body":250},{},{"type":119,"children":251},[252],{"type":122,"tag":123,"props":253,"children":254},{},[255],{"type":127,"value":44},{"data":257,"body":258},{},{"type":119,"children":259},[260],{"type":122,"tag":123,"props":261,"children":262},{},[263],{"type":127,"value":61},{"data":265,"body":266},{},{"type":119,"children":267},[268],{"type":122,"tag":123,"props":269,"children":270},{},[271],{"type":127,"value":62},{"data":273,"body":274},{},{"type":119,"children":275},[276],{"type":122,"tag":123,"props":277,"children":278},{},[279],{"type":127,"value":70},{"data":281,"body":282},{},{"type":119,"children":283},[284],{"type":122,"tag":123,"props":285,"children":286},{},[287],{"type":127,"value":71},{"data":289,"body":290},{},{"type":119,"children":291},[292],{"type":122,"tag":123,"props":293,"children":294},{},[295],{"type":127,"value":89},{"data":297,"body":298},{},{"type":119,"children":299},[300],{"type":122,"tag":123,"props":301,"children":302},{},[303],{"type":127,"value":90},1775562802571]