
Why Cypherdog?
Cypherdog Offers

E-MAIL ENCRYPTION
Send e-mail securely
Secure your messages and attachments by encrypting and decrypting any part of your text and file that can be sent via e-mail (or any media). Be assured that only the authorized recipient has access to your content.
One click. Complete protection.

FILE TRANSFER
Transfer files securely
If you encrypt a file with Cypherdog E-mail Encryption, you can send it via any communication channel. Include the contact details (like e-mail addresses) of those who should receive the file once encrypted.
You can be sure that only the intended recipient is able to decrypt the file that you can send or share via any medium: Slack, WeTransfer, Google Drive, WhatsApp, Dropbox, etc.

FILE ENCRYPTION
Encrypt files locally on your device
Cypherdog E-mail Encryption allows you to encrypt any file, regardless of format or size. You can encrypt only for yourself if you store files on your hard drive or for anyone else that you intend to share files with.
We use asymmetric encryption, which means the application recognizes who it is encrypting for. Therefore, you should select the recipient's ID (e-mail address) before sending anything out.

TEXT ENCRYPTION
Encrypt and share text securely
Cypherdog E-mail Encryption enables you to encrypt any text using any medium, including messengers or other platforms, and share it securely with anyone you want to.
We use the RSA algorithm, which means our tool should know who to encrypt it for, thus you should pick out the ID (e-mail address) of the recipient you plan to share the text with.

MESSENGER
Use chat with encrypted communication
Cypherdog knows how to meet the requirements of today’s users.
Cypherdog guarantees: encrypted communication, total anonymity of contacts and conversations, end-to-end encryption, no data records on our servers' hard drives, zero collection of any metadata, and complete deletion of all encrypted content after 24 hours. Try it and see for yourself.
Cypherdog products
E-MAIL ENCRYPTION
Single
• Encryption and decryption of e-mail messages and attachments
• Encryption and decryption of any text and file which can be sent by any media
• Backup of private key to file
• One license for single user
• Support for Gmail & Google Suite: plugin to browsers Microsoft Edge, Mozilla Firefox, Google Chrome
• Support for Microsoft Outlook (addIn for web and native client)
• Support for operating systems (Windows, Linux, Mac OS)
• Basic online support and training
Business
• Admin panel for domains, user & private keys management
• Backup of private keys on Vault installed on company servers
• Automatic installation on endpoints
• One license for multiple users
• Advanced support and training
Cypherdog provides
What are the advantages of Cypherdog?
Real end-to-end encryption
The data you send or receive is encrypted from the moment it is sent until the recipient gets it. Nobody can decrypt files without a private key only found in the receiver's Cypherdog application.
No "trusted third party"
Cypherdog, any third-party global organizations and other providers, e.g., electronic signatures or certification centers, do not take part in the encryption and decryption process and have no access to any data.
No provider access
Cypherdog does not have access to the stored data and address book as a provider of services. While transferring files between parties, the provider does not have access to files in any form.
Zero-knowledge security model
The service provider cannot recover your encrypted data or gain access to your account in case you lose your private key, its backup, or password to decrypt it. Zero-knowledge security guarantees real data confidentiality and privacy.
Absolute protection of the private key
As a user (company or individual), you are the only person with access to the private key you create when logging in to the application for the first time. It is impossible to recover the private key, which means that no one but you can access it.
F2F ID confirmation
Using File Exchange & Messenger, during a face-to-face meeting, you can confirm the identity of your contact using a QR code, thanks to which you can be 100% sure of the participant's identity in the exchange of files and conversations.
Anonymization
In File Exchange & Storage & Messenger, we do not know anything about users and their communication: who with whom is contacting, how long, which files are sent, who is in address books, the content of any file in the cloud storage, on local disk or transferred.
No collecting of metadata
We do not collect additional data about our users – IP number, geographic location, logs, mobile phone numbers, connections between users, time of connection.
Public keys in blockchain
Public keys used to encrypt transmitted files and communication content are stored in distributed registers using blockchain technology. This guarantees protection against data loss and leakage.