Abstract: Systems and methods for creating and sharing protected content between individuals is disclosed. In one embodiment, a method for creating and sharing protected content between individuals may include (1) receiving foundation content; (2) receiving a selection of cover content; (3) receiving a selection of one or more unlock actions; (4) receiving a selection of one or more recipients for the protected content; (5) at least one computer processor creating a layered data file comprising the foundation content fully obscured by the cover content; (6) providing the one or more recipients access to the layered data file; (7) receiving an unlock action by the one or more recipients; (8) verifying, by the at least one computer processor, the unlock action; and (9) displaying to the one or more recipients the foundation content from the layered data file.
Abstract: Systems and methods for creating and sharing protected content between individuals is disclosed. In one embodiment, a method for creating and sharing protected content between individuals may include (1) receiving foundation content; (2) receiving a selection of cover content; (3) receiving a selection of one or more unlock actions; (4) receiving a selection of one or more recipients for the protected content; (5) at least one computer processor creating a layered data file comprising the foundation content fully obscured by the cover content; (6) providing the one or more recipients access to the layered data file; (7) receiving an unlock action by the one or more recipients; (8) verifying, by the at least one computer processor, the unlock action; and (9) displaying to the one or more recipients the foundation content from the layered data file.
Abstract: Systems and methods for creating and sharing protected content between individuals is disclosed. In one embodiment, a method for creating and sharing protected content between individuals may include (1) receiving foundation content; (2) receiving a selection of cover content; (3) receiving a selection of one or more unlock actions; (4) receiving a selection of one or more recipients for the protected content; (5) at least one computer processor creating a layered data file comprising the foundation content fully obscured by the cover content; (6) providing the one or more recipients access to the layered data file; (7) receiving an unlock action by the one or more recipients; (8) verifying, by the at least one computer processor, the unlock action; and (9) displaying to the one or more recipients the foundation content from the layered data file.