It uses general principles of work with USB interfaces and perfectly
fits any USB device.
Was tested with various USB devices, besides the enumerated also with USB card readers, MFU etc.
The software has own developed secure interaction protocol, which cannot be intercepted and recognized by known hack tools;
Hardware is emulated on kernel level, which is unreachable for known spyware and malware so no risks of affecting normal functioning of the software;
The system has strong error recovery;
Simple intuitive configuration; Ergonomic interface;
Clear navigation system.
back to top