Anonymity is the integral aspect the UUP technology is built on. A group of servers, which do not have access to the whereabouts of the person that connects, form a network at the lower level. Each client is provided with a public key as well as a private key, both of which are not sent to the server. This way, the identity of the user is protected. The hash algorithms derived from the clients device are irreversible making it impossible to trace the public key corresponding to the communication channels open on the server.
There are two libraries at the device level. One deals with the transmission protocol with the server while the other deals with a high performing protocol that works at the byte level in the binary to extract the maximum potential of the hardware without weighing down the machine. From simple texts to large video broadcasting, the expandable "point to multipoint" protocol can be used for the massive transmission of encrypted data. The intrinsic speed of the server makes large file transmissions possible.
Unlike competing applications, the under-development protocol of UUP guarantees a high level of security and confidentiality through a trustless system and open-source data encryption. Instead of using the notification centers of Google, Apple, or Microsoft, the system acts as a notification center so that nobody, including the system, can make a network of correlation between individuals who use the infrastructure.