Also, the following will need to be conveyed:
- the concept of outside threats or attacks (i.e.: government surveilance) that exist with current technology and how those threats are subsequently neutralized by using kehotee
- the idea that you own your own identity. For example currently if you have a gmail account, google owns your identity, under keyhotee, the user does.
It's a tall order, but we need to communicate everything that keyhotee does in one visual so someone can "get it" in just a few minutes, simple yet comprehensive. Good luck. :0) B