Administrators can create safe zones by specifying latitude, longitude, and radius. Files are only accessible within these designated areas.
All files are encrypted using AES-256-GCM encryption before storage. Files are automatically decrypted when accessed from safe zones.
Simple role system with admin and user roles. Admins manage zones and files, while users can only access files when in safe zones.