The verification process involves proving that the encrypted volume is the same as when it was safeguarded. This is achieved by comparing the digital signatures of the encrypted volume: the current one against that stored on the Blockchain. Once they match, the user can be confident that the encrypted volume has not been altered and can proceed to decrypt the volume. These processes are explained below.
First, a hash value of the encrypted volume is generated. This value is then compared with that stored on the Blockchain under the users account. The masked dataset is encrypted in the browser memory at three levels. If both hash values match, it can be assured that the encrypted volume is the same as when it was safeguarded.
The Decryption process uses a passphrase to transform the encrypted data into a usable form. Mapsafe uses the encryption-decryption facility provided by the Web.Cryto toolkit whiich is in-built within the browser. This is similar but opposite to the encryption process. The masked dataset is decrypted in the browser memory at three levels. These passphrases are required to decrypt to each of the three levels.
A detailed description of the encryption and decryption proceses are provided in this
document
Watch this GIF to learn how to verify your data, from start to finish!