1What is Cypherdog for?
It avoids cyber threats (invoice hacking, i.e. changing account numbers in invoices, substituting them and finally paying criminals, not the right suppliers), counteracting business espionage (taking over sales offers sent by e-mail, contracts, financial statements of companies, negotiations and arrangements, technical documentation - research and development, patents, strategies, plans) - which will be taken over by the competition and made use of them, compliance with the GDPR (local encryption, cloud backup, encryption of transmitted data), constitutional security and confidentiality of communication
2Who is it for?
Cypherdog is applicable to large and small businesses and even individual consumers, but is particularly important in the following sectors: law, finance, medical, industry and R&D.
How to buy?
1How often will I be charged?
You can choose to be billed on a monthly or an annual basis. If you choose an annual plan, you can benefit from a lower monthly price. Please contact us to learn more about the discounts.
2Can I get a free trial?
You can explore Cypherdog and try all features for 7 days.
3The price is including VAT? Can I get invoice?
Yes, all prices are VAT included. If you need invoice, please contact us.
4How can I pay for my plan?
We accept most forms of payment such as PayPal, MasterCard, Maestro, Visa, American Express, Diners Club International and Discover Network. If you would like to pay with a different payment method, please contact us.
How Cypherdog works?
1How it works?
Two remote users only on the basis of their email address (username) have the ability to exchange files and confirm their identity in a secure manner. The file encryption process will take place on the sender’s computer side, then the file will be sent to the client/customer via e-mail, cloud or other channel independent of the system. The client/customer will be able to decrypt the file only on his personal computer. The system will consist of, among others from a cloud part that stores public keys of users, a mobile application and desktop application
2Will I have two identities (mobile and desktop)?
No. You can merge both identities. Simply generate QR code on your desktop application and scan it with your mobile
3How to merge two identities (mobile and desktop)?
You can merge your identities. Simply generate QR code on application on your desktop and scan it with your mobile.
4Can I have the data backup?
The system user have a cloud storage with a capacity of 5GB to store encrypted files. The desktop application will allow you to synchronize files to and from the cloud. There is possibility to increase capacity of cloud storage
5Can another person decrypt a file without payment?
Yes. File decryption is possible by anybody who’s using free version of Cypherdog.
6Can I set my own names on the device list?
Yes. You can set and change the name of each device listed on your device list.
7Will I have the same contact list on each device?
Yes. The contact list is synchronized between your devices.
8Is there a limit to a file size that I can send?
There’s not file size limit.
1Is my contact list secure?
Your contact list is encrypted so nobody (even Cypherdog) can read it.
2How do you confirm your identity without a third party?
After adding a contact to be 100% sure you should meet a person from the contact list and confirm your identity through the mobile application. Confirmation information will go to blockchain creating a credibility ranking.
3What is different between Premium and Enterprise account?
Premium accounts have NO access from internal data administrators and nobody else. It means if you are sole proprietor or independent partner in your business (e.g. small Law Firm) ONLY you have access to your account. In the Enterprise version internal data administrators have got access to your account just in case (e.g.: sudden death).
4If I lost unique password, can you restore it?
No, unique password must be stored by you alone. At Cypherdog we do not store any unique passwords from our customers. So, if you forget you will lose access to that file and we cannot help you. That’s why we are so safe and unique.
5Is the chat history stored on my mobile?
The chat history is deleted and you choose when: after a certain time, after closing, the session, after the screen has been turned off.
6Is the chat encrypted?
Yes, it is. Users using the mobile applications and FX Applications will be able to exchange messages (chat) in a safe way.
7Why should I trust Cypherdog with my data?
Cypherdog is a highly advanced intelligent solution for privacy: – The third party (us) does not have access to data, memory and keys. – The software does not use hard drives for message storage. – End-to-end encryption with physical identity confirmation.
8Where is my private key stored?
Your private key is stored on your computer/mobile. Only there.
9I deleted one of my devices and now the device list has got just one item?
For security reason if you delete on of your registered devices all the others (except the oldest one) will be automatically deleted.
10Does the Cypherdog have the access to my encrypted files?
No. Cypherdog doesn’t have access to your encrypted files.
11I can’t see my chat history?
The chat history is deleted and you choose when: after a certain time, after closing the session or after the screen has been turned off.