OneID uses cryptography to encrypt and lock your data locally at your computer. Your encrypted data is then sent up to the OneID cloud storage repository and remains safely encrypted until you ask for it from an authorized device.
Your encrypted data is then sent back to your authorized device where it is decrypted and released to a website, login, form, etc., with your consent. All of that happens in a split second.
If for some reason, the OneID repository is hacked, that data is completely useless without the ‘key’ that is stored on your device that unlocks your data. Each OneID user has his/her own key – so any breach will result in zero information being revealed.