diff --git a/src/app/page.tsx b/src/app/page.tsx
index 78de683..054cbfe 100644
--- a/src/app/page.tsx
+++ b/src/app/page.tsx
@@ -39,7 +39,8 @@ export default function HomePage() {
{ name: "Docs", id: "https://docs.unibix.io" },
]}
button={{
- text: "Start Secure Communication", href: "https://app.unibix.io/signup"}}
+ text: "Start Secure Communication", href: "https://app.unibix.io/signup"
+ }}
animateOnLoad={true}
/>
@@ -47,23 +48,28 @@ export default function HomePage() {
{/* Hero Section */}
@@ -77,9 +83,11 @@ export default function HomePage() {
useInvertedBackground={false}
buttons={[
{
- text: "Learn Our Architecture", href: "/security"},
+ text: "Learn Our Architecture", href: "/security"
+ },
{
- text: "Compliance Overview", href: "/security"},
+ text: "Compliance Overview", href: "/security"
+ },
]}
buttonAnimation="slide-up"
/>
@@ -94,26 +102,32 @@ export default function HomePage() {
features={[
{
id: "e2ee", label: "E2EE", title: "End-to-End Encryption with Signal Protocol", items: [
- "Messages encrypted client-side before transmission", "Double Ratchet Algorithm for forward secrecy", "Perfect forward secrecy on every message", "No plaintext on UNIBIX servers, ever"],
+ "Messages encrypted client-side before transmission", "Double Ratchet Algorithm for forward secrecy", "Perfect forward secrecy on every message", "No plaintext on UNIBIX servers, ever"
+ ],
buttons: [
{
- text: "Technical Details", href: "/security"},
+ text: "Technical Details", href: "/security"
+ },
],
},
{
id: "p2p", label: "P2P", title: "Direct Peer-to-Peer Media Tunnels", items: [
- "WebRTC direct encrypted media streams", "TURN relay only when direct connection unavailable", "Sub-100ms latency on optimal paths", "Media never decrypted on relay infrastructure"],
+ "WebRTC direct encrypted media streams", "TURN relay only when direct connection unavailable", "Sub-100ms latency on optimal paths", "Media never decrypted on relay infrastructure"
+ ],
buttons: [
{
- text: "Performance SLA", href: "/security"},
+ text: "Performance SLA", href: "/security"
+ },
],
},
{
id: "zk", label: "ZK", title: "Zero-Knowledge User Authentication", items: [
- "Device enrollment without key escrow", "Multi-device synchronization with derivation, not sharing", "Privacy-respecting audit trails", "User data residency control and compliance"],
+ "Device enrollment without key escrow", "Multi-device synchronization with derivation, not sharing", "Privacy-respecting audit trails", "User data residency control and compliance"
+ ],
buttons: [
{
- text: "Compliance Matrix", href: "/security"},
+ text: "Compliance Matrix", href: "/security"
+ },
],
},
]}
@@ -131,13 +145,17 @@ export default function HomePage() {
description="Scalable, redundant, and cryptographically transparent at every layer."
products={[
{
- id: "signaling", name: "Signaling Layer", price: "Node.js + Socket.io", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajc99XopPtgabNrKGrIGXyALgh/clean-technical-diagram-showing-signalin-1773183019065-47c9674b.png", imageAlt: "Signaling layer peer discovery and key exchange visualization"},
+ id: "signaling", name: "Signaling Layer", price: "Node.js + Socket.io", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajc99XopPtgabNrKGrIGXyALgh/clean-technical-diagram-showing-signalin-1773183019065-47c9674b.png", imageAlt: "Signaling layer peer discovery and key exchange visualization"
+ },
{
- id: "p2p-media", name: "P2P Media Layer", price: "WebRTC + TURN", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajc99XopPtgabNrKGrIGXyALgh/technical-diagram-illustrating-webrtc-pe-1773183019329-d9d200a6.png", imageAlt: "Peer-to-peer media tunneling and encrypted relay"},
+ id: "p2p-media", name: "P2P Media Layer", price: "WebRTC + TURN", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajc99XopPtgabNrKGrIGXyALgh/technical-diagram-illustrating-webrtc-pe-1773183019329-d9d200a6.png", imageAlt: "Peer-to-peer media tunneling and encrypted relay"
+ },
{
- id: "backend", name: "Backend Infrastructure", price: "Encrypted Metadata DB", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajc99XopPtgabNrKGrIGXyALgh/backend-infrastructure-diagram-showing-u-1773183019245-64ced862.png", imageAlt: "User registration device enrollment and metadata storage"},
+ id: "backend", name: "Backend Infrastructure", price: "Encrypted Metadata DB", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajc99XopPtgabNrKGrIGXyALgh/backend-infrastructure-diagram-showing-u-1773183019245-64ced862.png", imageAlt: "User registration device enrollment and metadata storage"
+ },
{
- id: "scaling", name: "Horizontal Scaling", price: "Stateless + Load-Balanced", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajc99XopPtgabNrKGrIGXyALgh/horizontal-scaling-architecture-diagram--1773183019542-0a1aae6c.png", imageAlt: "Load-balanced stateless signaling servers and commodity TURN"},
+ id: "scaling", name: "Horizontal Scaling", price: "Stateless + Load-Balanced", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajc99XopPtgabNrKGrIGXyALgh/horizontal-scaling-architecture-diagram--1773183019542-0a1aae6c.png", imageAlt: "Load-balanced stateless signaling servers and commodity TURN"
+ },
]}
gridVariant="four-items-2x2-equal-grid"
animationType="slide-up"
@@ -156,33 +174,42 @@ export default function HomePage() {
{
id: "startup", price: "$299/mo", name: "Startup", buttons: [
{
- text: "Start Free Trial", href: "https://app.unibix.io/signup"},
+ text: "Start Free Trial", href: "https://app.unibix.io/signup"
+ },
{
- text: "Learn More", href: "#pricing"},
+ text: "Learn More", href: "#pricing"
+ },
],
features: [
- "Up to 50 team members", "Unlimited encrypted messages", "P2P calling & video", "Device enrollment (3 devices/user)", "Standard audit logs", "Community support"],
+ "Up to 50 team members", "Unlimited encrypted messages", "P2P calling & video", "Device enrollment (3 devices/user)", "Standard audit logs", "Community support"
+ ],
},
{
id: "business", badge: "Most Popular", badgeIcon: Sparkles,
price: "$999/mo", name: "Business", buttons: [
{
- text: "Start Free Trial", href: "https://app.unibix.io/signup"},
+ text: "Start Free Trial", href: "https://app.unibix.io/signup"
+ },
{
- text: "Chat to Sales", href: "#contact"},
+ text: "Chat to Sales", href: "#contact"
+ },
],
features: [
- "Up to 500 team members", "Unlimited encrypted messages", "P2P calling & video with screen share", "Device enrollment (unlimited)", "Advanced audit logs & compliance reports", "Priority support 24/7", "HIPAA compliance certification", "Data residency in your region"],
+ "Up to 500 team members", "Unlimited encrypted messages", "P2P calling & video with screen share", "Device enrollment (unlimited)", "Advanced audit logs & compliance reports", "Priority support 24/7", "HIPAA compliance certification", "Data residency in your region"
+ ],
},
{
id: "enterprise", price: "Custom", name: "Enterprise", buttons: [
{
- text: "Request Demo", href: "#contact"},
+ text: "Request Demo", href: "#contact"
+ },
{
- text: "Security Review", href: "/security"},
+ text: "Security Review", href: "/security"
+ },
],
features: [
- "Unlimited team members", "Dedicated infrastructure option", "Custom encryption policies", "On-premises or private cloud deployment", "SOC 2 Type II certification included", "Dedicated security engineer", "Custom SLA negotiation", "Breach notification & incident response"],
+ "Unlimited team members", "Dedicated infrastructure option", "Custom encryption policies", "On-premises or private cloud deployment", "SOC 2 Type II certification included", "Dedicated security engineer", "Custom SLA negotiation", "Breach notification & incident response"
+ ],
},
]}
animationType="slide-up"
@@ -199,9 +226,11 @@ export default function HomePage() {
title="Trusted by the World's Most Security-Conscious Organizations"
description="From fintech to healthcare to government, UNIBIX secures sensitive communications."
names={[
- "Acme Bank", "MediCare Health", "Quantum Labs", "Sovereign State", "Shield Ventures", "CryptoTech Corp", "Enterprise Secure"]}
+ "Acme Bank", "MediCare Health", "Quantum Labs", "Sovereign State", "Shield Ventures", "CryptoTech Corp", "Enterprise Secure"
+ ]}
logos={[
- "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajc99XopPtgabNrKGrIGXyALgh/professional-bank-or-fintech-company-log-1773183018832-072f60bf.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajc99XopPtgabNrKGrIGXyALgh/healthcare-or-medical-services-company-l-1773183017909-78ff18b3.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajc99XopPtgabNrKGrIGXyALgh/tech-or-scientific-research-company-logo-1773183019549-5d7b2304.jpg", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajc99XopPtgabNrKGrIGXyALgh/government-or-state-institution-logo-fea-1773183017561-391a9712.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajc99XopPtgabNrKGrIGXyALgh/venture-capital-or-investment-company-lo-1773183018196-d095d057.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajc99XopPtgabNrKGrIGXyALgh/cryptocurrency-or-blockchain-technology--1773183019773-3cc1f34c.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajc99XopPtgabNrKGrIGXyALgh/enterprise-security-or-cybersecurity-com-1773183018357-4ff4f3a0.png"]}
+ "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajc99XopPtgabNrKGrIGXyALgh/professional-bank-or-fintech-company-log-1773183018832-072f60bf.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajc99XopPtgabNrKGrIGXyALgh/healthcare-or-medical-services-company-l-1773183017909-78ff18b3.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajc99XopPtgabNrKGrIGXyALgh/tech-or-scientific-research-company-logo-1773183019549-5d7b2304.jpg", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajc99XopPtgabNrKGrIGXyALgh/government-or-state-institution-logo-fea-1773183017561-391a9712.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajc99XopPtgabNrKGrIGXyALgh/venture-capital-or-investment-company-lo-1773183018196-d095d057.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajc99XopPtgabNrKGrIGXyALgh/cryptocurrency-or-blockchain-technology--1773183019773-3cc1f34c.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3Ajc99XopPtgabNrKGrIGXyALgh/enterprise-security-or-cybersecurity-com-1773183018357-4ff4f3a0.png"
+ ]}
textboxLayout="default"
useInvertedBackground={false}
speed={35}
@@ -216,17 +245,23 @@ export default function HomePage() {
sideDescription="Everything security teams need to know about UNIBIX."
faqs={[
{
- id: "1", title: "How does UNIBIX ensure zero-knowledge infrastructure?", content: "UNIBIX uses end-to-end encryption on the client side before any data reaches our servers. The Signal Protocol ensures that encryption keys never leave your devices. Our servers only handle encrypted metadata—never plaintext messages or media. We employ cryptographic audits and third-party verification to maintain this guarantee."},
+ id: "1", title: "How does UNIBIX ensure zero-knowledge infrastructure?", content: "UNIBIX uses end-to-end encryption on the client side before any data reaches our servers. The Signal Protocol ensures that encryption keys never leave your devices. Our servers only handle encrypted metadata—never plaintext messages or media. We employ cryptographic audits and third-party verification to maintain this guarantee."
+ },
{
- id: "2", title: "What is your compliance certification status?", content: "Business and Enterprise plans include HIPAA compliance certification. Enterprise plans come with SOC 2 Type II certification. We also support custom compliance requirements for government and regulated sectors. All deployments include encrypted audit trails for regulatory reporting."},
+ id: "2", title: "What is your compliance certification status?", content: "Business and Enterprise plans include HIPAA compliance certification. Enterprise plans come with SOC 2 Type II certification. We also support custom compliance requirements for government and regulated sectors. All deployments include encrypted audit trails for regulatory reporting."
+ },
{
- id: "3", title: "Can UNIBIX be deployed on-premises?", content: "Yes. Enterprise customers can deploy UNIBIX on their own infrastructure or private cloud environments. We provide containerized deployment packages, comprehensive documentation, and dedicated support for on-premises or hybrid deployments. Data residency remains entirely under your control."},
+ id: "3", title: "Can UNIBIX be deployed on-premises?", content: "Yes. Enterprise customers can deploy UNIBIX on their own infrastructure or private cloud environments. We provide containerized deployment packages, comprehensive documentation, and dedicated support for on-premises or hybrid deployments. Data residency remains entirely under your control."
+ },
{
- id: "4", title: "How does offline messaging work?", content: "UNIBIX supports offline message queueing with end-to-end encryption. Messages sent to offline users are encrypted and stored securely on our servers until the recipient reconnects. The recipient's device decrypts messages locally—we never decrypt them."},
+ id: "4", title: "How does offline messaging work?", content: "UNIBIX supports offline message queueing with end-to-end encryption. Messages sent to offline users are encrypted and stored securely on our servers until the recipient reconnects. The recipient's device decrypts messages locally—we never decrypt them."
+ },
{
- id: "5", title: "What happens if a device is compromised?", content: "UNIBIX uses the Double Ratchet Algorithm and perfect forward secrecy. Even if a device is compromised, future messages remain secure. Past messages are protected by the cryptographic chain. Device revocation is instant across all platforms—compromised devices can be remotely deauthorized."},
+ id: "5", title: "What happens if a device is compromised?", content: "UNIBIX uses the Double Ratchet Algorithm and perfect forward secrecy. Even if a device is compromised, future messages remain secure. Past messages are protected by the cryptographic chain. Device revocation is instant across all platforms—compromised devices can be remotely deauthorized."
+ },
{
- id: "6", title: "Do you provide API access for custom integrations?", content: "Yes. Business and Enterprise plans include API access for custom messaging workflows, device management, and compliance integrations. Our API documentation is comprehensive, and dedicated support is available for Enterprise customers."},
+ id: "6", title: "Do you provide API access for custom integrations?", content: "Yes. Business and Enterprise plans include API access for custom messaging workflows, device management, and compliance integrations. Our API documentation is comprehensive, and dedicated support is available for Enterprise customers."
+ },
]}
textPosition="left"
useInvertedBackground={true}