
Why Cypherdog?
Cypherdog Offers

E-MAIL ENCRYPTION
Send e-mail securely
Secure your messages and attachments by encrypting and decrypting any part of your text and file that can be sent via e-mail (or any media). Be assured that only the authorized recipient has access to your content.
One click. Complete protection.

FILE ENCRYPTION
Encrypt files locally on your device
Encrypt securely all files on your disk drive using the Cypherdog application. Have the guarantee of the highest confidentiality and security of your files.

MESSENGER
Use chat with encrypted communication
Cypherdog knows how to meet the requirements of today’s users.
Cypherdog guarantees: encrypted communication, total anonymity of contacts and conversations, end-to-end encryption, no data records on our servers' hard drives, zero collection of any metadata, and complete deletion of all encrypted content after 24 hours. Try it and see for yourself.

CLOUD STORAGE
Manage your files in an encrypted cloud
Are you looking for a safe place to store documents, contracts, and reports that no one has access to?
Manage files in the encrypted, entirely safe, Cypherdog cloud. We guarantee that only you have access to it.

FILE EXCHANGE
Send files securely
Keep your files completely secure by sending them in all formats and sizes, with end-to-end asymmetric encryption, unauthorized third-party access, and identity confirmation. Use any media to send or share encrypted files with Cypherdog E-mail Encryption or Cypherdog File Exchange & Storage.
Cypherdog products
FILE EXCHANGE & STORAGE
Single
• Unlimited file transfer
• Secured cloud storage 500GB
• File encryption on local disk
• Messenger on desktop app
• Messenger on mobile device
• Storage & backup of local private key
• One license for one user
• 14-day trial (free license allows you to decrypt received files)
• Basic online support and training
Business
• Secured cloud storage 500GB/user
• Admin console for managing users
• Storage & backup of company’s server private keys
• One license for many users
• Importing of address book
• Enhanced support & training
E-MAIL ENCRYPTION
Single
• Encryption and decryption of e-mail messages and attachments
• Encryption and decryption of any text and file which can be sent by any media
• Backup of private key to file (file on USB device/QR code)
• One license for single user
• Webclient plugin (available O365, Google Suite, and others)
• Browsers (Microsoft Edge, Mozilla Firefox, Google Chrome)
• Standalone client plugin (Microsoft Outlook, Mozilla Thunderbird)
• Operating systems (Windows, Linux, Mac OS)
• Basic online support and training
Business
• Admin panel for user management
• Backup of private keys on company servers
• One license for multiple users
• Advanced support and training
Cypherdog provides
What are the advantages of Cypherdog?
Real end-to-end encryption
The data you send or receive is encrypted from the moment it is sent until the recipient gets it. Nobody can decrypt files without a private key only found in the receiver's Cypherdog application.
No "trusted third party"
Cypherdog, any third-party global organizations and other providers, e.g., electronic signatures or certification centers, do not take part in the encryption and decryption process and have no access to any data.
No provider access
Cypherdog does not have access to the stored data and address book as a provider of services. While transferring files between parties, the provider does not have access to files in any form.
Zero-knowledge security model
The service provider cannot recover your encrypted data or gain access to your account in case you lose your private key, its backup, or password to decrypt it. Zero-knowledge security guarantees real data confidentiality and privacy.
Absolute protection of the private key
As a user (company or individual), you are the only person with access to the private key you create when logging in to the application for the first time. It is impossible to recover the private key, which means that no one but you can access it.
F2F ID confirmation
Using File Exchange & Messenger, during a face-to-face meeting, you can confirm the identity of your contact using a QR code, thanks to which you can be 100% sure of the participant's identity in the exchange of files and conversations.
Anonymization
In File Exchange & Storage & Messenger, we do not know anything about users and their communication: who with whom is contacting, how long, which files are sent, who is in address books, the content of any file in the cloud storage, on local disk or transferred.
No collecting of metadata
We do not collect additional data about our users – IP number, geographic location, logs, mobile phone numbers, connections between users, time of connection.
Public keys in blockchain
Public keys used to encrypt transmitted files and communication content are stored in distributed registers using blockchain technology. This guarantees protection against data loss and leakage.