Calculated for each element of the interface (account, message, contact), the level of confidentiality is an indicator of trust and at the same time an invitation to better protect oneself.
The principal sorting parameter on the timeline, the level of importance and its calculation depends as much on the choice of the user as on objective data. Spam, for example, will be accorded a minimal level of importance.
The application automatically proposes meeting dates based on openings in the calendars of invited contacts. Invitations and confirmations are processed automatically.
Depending on the choice of the user and their habits, Caliopen automatically assigns labels ("work", "bank" or "family" for example) to elements on the timeline.
Any search result, defined filter or sorting function can be saved and transformed into "Views" which can be reused or assigned to a specific device.
Any search can include filter and sorting functionalities. It can be used throughout all of the user's non-encrypted data (including files).
The user manages the list of devices used to access their account. Based on each device's level of confidentiality, access to one's account can vary.
When the system detects a risk of interception (such as through an open wifi network or an unknown device), the account is only accessible in downgraded mode and will only display data of a minimal confidentiality level.
The interface is customizable, the minimal level of importance (below which an email becomes undesirable) is managed in a dynamic fashion. Contacts can be temporarily ignored or the sharing of documents can be automated.
Confidentiality affects the entirety of online correspondence. Caliopen unifies private application messages (Twitter and Facebook for example), email, instant messages (chat) and SMS messages within in a single interface.
Even before conceiving of the technical solutions, we've spent a great deal of time working on the ergonomics and design of the user interface and how it could integrate all private online messages. This is where the majority of our effort has been invested. In our opinion, if we are going to attract the largest number of users in the issues of online privacy, it's up to us to create an attractive tool, as opposed to waiting for it to happen elsewhere.