Advanced
Last updated
Last updated
Custom connection implementation
Make your own connection interface (available for integrators recognized by legal authorities)
End-to-end encryption
Ensure sensitive data confidentiality is guaranteed all the way
Response signature
Prove data integrity to a third party