Many people may be familiar with the Tesla case, where Elon Musk mentioned using a technique called "binary signature" along with additional spaces between sentences in emails. This method provides added protection and enables quick source identification in the event of leaks. By employing this approach, it becomes easier to determine who compromised the email.
However, what if we take this concept further and make it more scalable and automated? What if it could be applied not only to email messages but also to various text-containing materials such as documents, presentations, contracts, and more?
Such a solution is now possible with the development of an algorithm that enables real-time modification of documents, generating unique copies associated with specific users for each request. And we have already created this innovative solution! LeaksID! You can find a comprehensive article about it at https://hackernoon.com/exploring-substitutes-for-confidential-watermarks-on-documents-the-rise-of-steganography. If you're interested, feel free to book a demo with me. I would be delighted to provide more information about our approach.