Back
4-SOFT
Securing your Success
Problem ⠀⠀⠀⠀
Solution ⠀⠀⠀⠀⠀
How We Do It?
STEP - 01 :
User A wants to Send file to User B via F-Mail
STEP - 02 :
User A uploads the file to F-Mail as usual. F-Mail accepts the file to their system
STEP - 03 :
F-Mail communicates with Phantera. Phantera gets the PDF in it's System
STEP - 04 :
Phantera cuts the PDF files to pieces; The F-Mail owner decides how the cutting is done(vertically, horizontally, combined, etc)
STEP - 05 :
Every cut piece is encrypted. Depending on the requirements at F-Mail owner, the pieces are encrypted differently depending on the region.
STEP - 06 :
The encrypted piece is sent to the blockchain. Depending on the F-Mail structure; The file is sent to main net on side chain
STEP - 07 :
User B requests the files from the blockchain. This process is automatic.
STEP - 08 :
Each piece is decrypted
STEP - 09 :
All pieces are glued back together
STEP - 10 :
Transaction is completed and notice is sent to User A.

Transaction times are stored on the blockchain

Projected transaction time is +10% current server-based transaction time
Traction
2 Test Pilot Projects
90,000
Users
Final Documentation Done
1.300.000 € yearly revenue signed
120 companies signed
600.000 € in previous funding
Market
Server Hosting Size
Data Encryption Market
2013:
48 billion
850 million
2022:
180 billion
12 billion
2025:
430 billion
29,2 billion
Vision
2024 :
0.05%
market share
2025 :
0.15%
market share
2027
IPO
1.00%
market share
2030 :
8.00%
market share
2035 :
24.00%
market share
Competitors
Current Providers :
Potential Providers :
- File Coin
Use of Funds
Timing for Capital Allocation: 01/06/2022
Targeted fund raise: € 3,500,000
Capital Allocation: Tech. Development, Running costs, IP Protection & Reserve
Proceed to Documentation