# Security Protocols and Encryption

Voise prioritizes security at every level of the system, from initial voiceprint creation to real-time authentication. Several key technologies ensure that user data remains private and secure:

**Cryptographic Security:**

1. **Voiceprint Encryption**:
   * The user’s voiceprint is converted into a cryptographic hash using **SHA-256 encryption**, a widely trusted cryptographic algorithm. This ensures that the voiceprint is not only secure but also irreversible—no one, not even Voise, can reverse-engineer the voiceprint to reconstruct the user’s original voice.
2. **Blockchain-Based Storage**:
   * The voiceprint hash is stored on the **Ethereum blockchain**, leveraging its decentralized and immutable nature to ensure data integrity. This makes it impossible for a single entity to alter or tamper with the stored data, providing additional layers of trust and security.
3. **Zero-Knowledge Proofs**:
   * Voise implements **zero-knowledge proof (ZKP)** protocols during authentication. This allows the system to verify the user’s identity without actually revealing the underlying voiceprint. The system confirms a match between the real-time voice input and the stored voiceprint hash without exposing sensitive information.

**Privacy Protection:**

* **No Raw Voice Storage**: Voise does not store or share raw voice recordings. Only the encrypted voiceprint hash is kept, significantly reducing the risk of biometric data being stolen or misused.
* **Anonymization**: The system uses anonymization techniques during voiceprint creation to ensure that even if the encrypted hash were to be compromised, it would be meaningless without the corresponding cryptographic key.
