Lexitrace
Theme:

Lexitrace adds secret hidden characters to text so that you can identify the origin of the message when it is distributed by others.

Value

“In 2022, the average cost of a data breach has reached a record high of US$4.35 million, according to the 2022 cost of a data breach report by IBM and the Ponemon institute.” (Source)

For a small cost, we will integrate our solution with your system, so that you can identify and deter future breaches in your system.

Use Cases

News
  1. News – Imprint a unique key in each of your articles, so that you can identify user accounts that are released on other websites.
Mail
  1. Email – Email each recipient a different version of message and trace the person who leaked the message to other sources.
Book
  1. Books – Add symbols to ebooks that you sell and identify the user who pirated and distributed the ebooks.
Secret
  1. Classified Documents – Add hidden symbols to documents that are unique for each user and trace who released the document

Method

  1. Encode
    1. Enter a message.
    2. Define the recipients.
    3. The system will generate different versions of the message, each slightly different.
Lock
  1. Distribute
    1. Release the different variations of the message to a set of each of the recipients.
People
  1. Decode and Track
    1. Copy and paste the leaked text back into the tool.
    2. The system will decode the hidden key and identify the origin of the leaked content.
Lock Open
Diagram

Sources

  1. Canary trap (Source)
  2. “Elon Musk shared that they identified the accused by sending emails that looked identical to all its employees but each email was coded with different spaces.” (Source)
  3. Digital fingerprinting used for tracking movie piracy. (Source)
  4. Hidden unicode characters (Source)

Contact

If you are interested in integrating our application with yours by API, please contact us here, and we can provide pricing.