 I have been working on few of the mobile interception devices and I get to know that like most of the people think that voice calls are the other ones which are being monitored. It is the important thing. Most of the SMS, in fact 100% of the SMS are being monitored because for intersecting a voice calling particular channels have to be selected. Why for intersecting any SMS? No channel has to be selected. All the SMS of each and every user in that area of 25 kms are being monitored. So with this as the aim, we thought of developing this mobile app and it also has a facility for storing all the files in a headed way. A password log is provided for that. It has some additional features also which I will be telling you. SMS transmission like it is the easiest way of intersecting this I have been telling you. Then there are certain encryption algorithms that we have been using in this and we have also provided few of the techniques for the user itself to select the algorithm. The protection is provided for the basis of password or mutually agreed upon password between the users. All of the users who are having this particular application may have some policies for password protection and they may have designed certain techniques of their own. So there is no need of a common password. Each and every user can have multiple passwords or multiple type of SMS based on the requirement, based on the location. Just six encryption algorithms which have been provided and the user can select what type of algorithm he or she wants to use. Then there are certain other techniques of encryption using the compression and decompression so as to minimize the size of the text message being sent. There are additional features that have been provided for hiding the files and folders in your mobile using a password. If you want to use integration with the image, you can find out your own location. Then you will transfer your own location using the encrypted message and integration of your own location plus the location of all the users who have been sending you their own locations through SMS. That can be seen on the Google Maps. Next I will be going about this. This is the FIDO Sentencing Library and Security between Congress and this is the special features for Google Sentencing. Now here you can see this is a password and the password is a Xbox. To enter, this is an authenticated access. To enter into this application you need to enter the password. You just enter and you have a checkbox for send location. That is it will take into account all your present location using the image GPS. Now this way it has taken your location plus the message whatever you type. So both gets authenticated and you can select using the contact list. This is again a seamless integrated feature of the Android itself that will be integrated into this. And once you keep on sending SMS, there is a pop-up answer. If you enter read SMS without entering the password, you will see nothing. All child connection is here. Now to read this SMS, you again have to enter the password and then after you go on to read SMS. This is your location which is displayed on Google Maps. I am again working on it. As I told you that all the SMS that you receive, their location is fed to your CSV file on X5 and those locations are fed to you from there and you have complete awareness of the entire subject. As to where each and every person is located. Then right-right, the entire list of files and folders is displayed here. Everything has again a password. You enter a password and select a file. Enter a password, select a file and there is a lock button. This is actually a complete package. This requires that both parties have their application. What if you want to send it to somebody, just to you or anything. Do you trigger the receiving to also install an application. Do you send an encrypted message first time? What the user said has been a special application? What the user said is that having this application will be a real deal. And the users who are requesting for this application. We have to measure this, we have to work on it. you know what I was thinking is that we can have a highly specific installation of this app. So, it should be like this. And we have only implemented it. Right now, it was only on those devices which we have already fast-renewed, hard to remember. Hard to remember. I know. If you, excuse me, I've got a question for you. So, there was a password error on this concept. If, by any case, I forget my password, there's one for you guys. It's just like you have to wait for me to open it up. Sorry? It's just like you forget to open it up. But anyway, you can have another key also. Similarly, I have a password usually shared between me and you. Then, we can again get on to some other password. So, I should share the password with the other client? No. Like, if we want to have a connection between us in an encrypted way, and we have this connection stored, then we both have a mutually shared password. So, the same mechanism, if you talk about password, then you can set up other authentication, like email, system or something, where we can send a... Certain policies can be designed based on date, time, place, whatever. In your presentation, you mentioned you have given an action to the user itself. Here, I have a lot to mention. But we are trying to... We have already included six of the algorithms. So, what is that like I need to give to you? 8 and 5. So, what is that like? What is it? See, certain groups may require that... This is a general application, and everyone is using the same encryption right now. So, my group of net people, we don't want to use this application. It can be used for sharing your credit card details, your bank passwords, or you want to give your details to someone, some coefficient data. It can be used for taking your dates, for taking the event parties, for building parties, for the security forces. So many things are there. So, each and every group may like to have their own algorithm. And in fact, they can device their own algorithm. The same text can be put into their own algorithm. You just pick and drop it into that particular algorithm. Another information which is already under... When you store it on the shore, the ocean can have signed bank details or send emails. It's already under... So, it's encrypted in our system. It has already been put from the seabed side and it's encrypted from the network. Thank you. Yeah, I mean, they all look great. But the question is, people speak over here. They understand encryption. They understand whatever. And they have UI. I see that there are six buttons saying, when I want to send a message, I need to select an encryption algorithm. How many of these lemons understand encryption, understand algorithm, and why do I worry about it? It should have done this in the back. It should have been done behind the scenes. It shouldn't be exposed to the user. So, the user experience is not really good on itself. What do you think about this? Well, you see, I want... I told you about getting six options, but I am not sure. That administrator of the group will select the algorithm he wants to choose for his own hundred people. Here, I have not shown you those six algorithm methods to choose. I have just shown you the actual applications that will be delivered to the user. That's the question. This application... In our security forces, banks, all critical confidential data... They have their own algorithm as well. So, if they want to apply here, we have extension... To support another... Thank you. Next, we have John. After we have...