FAQ

 
 

Cypherdog E-mail Encryption

1Does the recipient of an e-mail encrypted by Cypherdog E-mail Encryption have to have the Cypherdog application?
Without creating an account for the recipient of encrypted e-mails, it is impossible to encrypt messages, because there is no created pair of keys assigned to the recipient (public for encryption and private for decryption). So encrypting and decrypting the content and attachments of e-mails requires an application on the sender and recipient side.
2Do I need a paid license to use Cypherdog E-mail Encryption?
The Single User E-mail Encryption application works in the Trial version for 14 days with full functionality. After this period, if the user decides not to use the paid version, he can use it to decrypt the content and attachments of e-mails sent to him.
3What are the advantages of switching to E-mail Encryption Business?
The client application looks the same in the Single User and Business versions. The main difference in the Business version is that one company needs one license for many users and you have Admin Panel for managing users under one license (Administrator in the company can add, suspend or delete users), decide on allowed user domains, store private keys in Vault on company’s server and use Proxy Server for communication between client apps and Vault.
4How can I manage or cancel my subscription?
You can change the details of your subscription or cancel it at any time. You can also increase/decrease the number of users, and change the payment method or the billing address.
5Are all users in my organization covered with one license?
With E-mail Encryption Business you get access with one license to 25 and up users. There is no upper limitation. You should decide how many users you want to cover. If you want to cover a smaller team choose Single User licenses (every user should have a separate license).
6Does my organization need to buy a license for all employees/users?
No. You only need licenses for the number of users who will actively use E-mail Encryption. The implementation of the solution should be preceded by an analysis of the processes, data sent in them, and people involved in their processing. You can always increase or decrease the number of users when your needs evolve.
7I am using email in a browser or standalone application, which is not supported by Cypherdog Email Encryption. How can I encrypt or decrypt email messages?
You can use the “magic window” available from the menu of the application in the taskbar (Encrypt/Text), where you can type or paste any text, after entering the recipient's e-mail address click Encrypt. After that encrypted message is copied into the clipboard. You can paste it to an email window or any other communication medium. To decrypt the received encrypted message in case it is not a supported browser or e-mail application you should select a block with encrypted text and use the “magic window” available from the application menu in the taskbar (Decrypt/Text).
8How is it possible to send the same encrypted message or attachments to many recipients using asymmetric encryption?
For every encryption process, a random symmetric key is generated. This key is used for the encryption of messages and attachments. This key is encrypted using an asymmetric public key for every recipient and sender. All results of this process generate blocks of data in the header of the file of attachment (or message) The decryption process started by trying to decrypt header blocks using the asymmetric encryption and private key connected with the user which has the rights to decrypt a message or attachment. After that, the symmetric key is extracted and used for decrypting the main block of data (attachment or message).
9Why should I have a backup of my private key?
A private key is unique for every user and (in the Single User version) only the owner has access to it (in the Business version administrators of Admin Console). You can decrypt messages and attachments using this key.
• If you lose it (because of disk drive damage, stealing your notebook, deleting some files, ransomware attack, or any other reason) you cannot decrypt any data. That's why you should have a backup of your private key
• If you want to use CEE or another computer you should back up the key on the first computer and restore it on the new one.
10 I would like to move CEE from one computer to another. Do I need a new account for Cypherdog?
No, you can use your Cypherdog account on multiple devices First, you should back up your private key e.g on a pen drive. After that, you can install Cypherdog E-mail Encryption on the other computer. During the login process to the app you enter your e-mail address and password to the app and when Cypherdog cannot find your profile will ask about the path to your backup of the private key. After choosing a file with a private key your account will work on a new device.

Cypherdog File Exchange & Storage

1Does the recipient of a file transferred by Cypherdog File Exchange & Storage have to have the Cypherdog application?
Without creating an account for the recipient of a file transferred, it is impossible to send files, because there is no created pair of keys assigned to the recipient (public for encryption and private for decryption). So encrypting and decrypting files requires an application on the sender and recipient side.
2Do I need a paid license to use Cypherdog File Exchange & Server?
The Single User File Exchange & Server application works in the Trial version for 14 days with full functionality. After this period, if the user decides not to use the paid version, he can use it to decrypt the received files sent to him.
3How big can I transfer using CFE&S?
In the standard version you have a limit of transfer files up to 20GB for 14 days. If you want to have a bigger limit (up to 1TB file) please contact our sales department.
4How long are transferred files available?
Every file you transfer by CFE&S is available for 14 days for downloading after being sent.
5How long are chat messages available?
Every chat disappeared after 24 hours and there is no digital fingerprint. Text messages are stored only on the RAM of servers.
6What are the advantages of switching to the Business version?
The client application looks the same in the Single User and Business versions. The main difference in the Business version is that one company needs one license for many users and you have Admin Panel for managing users under one license (Administrator in the company can add, suspend or delete users), decide on allowed user domains, store private keys in Vault on company’s server and use Proxy Server for communication between client apps and Vault.
7How can I manage or cancel my subscription?
You can change the details of your subscription or cancel it at any time. You can also increase/decrease the number of users, and change the payment method or the billing address.
8Are all users in my organization covered with one license?
With File Exchange & Storage Business you get access with one license to 25 and up users. There is no upper limitation. You should decide how many users you want to cover. If you want to cover smaller team choose Single User licenses (every user should have separate license).
9Does my organization need to buy a license for all employees/users?
No. You only need licenses for the number of users who actively use File Exchange & Storage. The implementation of the solution should be preceded by an analysis of the processes, data sent in them, and people involved in their processing. You can always increase or decrease the number of users when your needs evolve.

Cypherdog Messenger

1How long are chat messages available?
Every chat disappears after 24 hours and there is no digital fingerprint. Text messages are stored only on the RAM of servers.
2Does the recipient of a text message from Cypherdog Messenger have to have the Cypherdog application?
Without creating an account for the recipient of a text message, it is impossible to send text, because there is no created pair of keys assigned to the recipient (public for encryption and private for decryption). So encrypting and decrypting files requires an application on the sender and recipient side. In the case of Cypherdog Messenger, it could be Cypherdog File Exchange & Storage, too.
 

Download app and get
14 days for free
!

If you need to learn more about our solution or need help
in implementing in, write to us! info@cypher.dog