parallax background

How it works

The Cypherdog File Exchange & Storage software allows you to:

  • transfer securely encrypted files of any size (up to a maximum of 1 TB and in the standard version up to 20 GB for two weeks),
  • store any files in a cloud in an encrypted form with a capacity of 500 GB for each user,
  • encrypt files on a notebook or desktop drive in a dedicated folder (safe),
  • text communication between Cypherdog File Exchange & Storage users, and
  • confirm the identity of communication participants using Cypherdog Messenger.

If the files sent and stored by you require absolute confidentiality and the current solution does not meet your expectations - try Cypherdog. Our software is user-friendly and easy to use while maintaining the highest level of security.

Threats in cyberspace

File transfer and storage are primary functions of computer systems. Users send confidential documents, videos, sound files, scans, maps, projects. The biggest problem is with files larger than 10 or 20 MB because e-mail limits the size of attachments. Popular tools usually do not provide encryption, and the service provider, or even more individuals, have access to their content; hence, they are unsafe. Some services offering end-to-end encryption allow you to encrypt files using symmetric algorithms, which means that they own the encryption key and have access to your data.

Most digital services are vulnerable to cyberattacks. As a result, you end up with your data or personal information stolen. In addition, by using popular tools, you leave a digital footprint. These solutions collect metadata and often use it to profile users for marketing purposes.

Cypherdog is a comprehensive solution to the above threats. It ensures file encryption (protecting content from unauthorized users) and allows the recipient to confirm the sender's identity.

Cypherdog’s pledge

  • you can encrypt and send files of any size even those that exceed the limit for transfer by e-mail,
  • you can send files that will remain confidential (a third party cannot access them) and will be read only by the indicated recipient,
  • you can store any files in an encrypted form in an external, cloud-based data warehouse and only you have access to them. Cypherdog, as your service provider, will never know the stored content,
  • you can store your entire encrypted files on the computer disk drive in the dedicated folder (safe),
  • you can send your encrypted files stored in the cloud or safe to another Cypherdog File Exchange & Storage,
  • you can only access the information in your address book. You will not leave your metadata when communicating and transferring files (anonymized data).
  • you can recover your cryptographic keys - they never leave your computer - from a USB backup or paper printout (or the company's server - in the Business version), in the event of their loss,
  • you can benefit from sending text messages that are asymmetrically encrypted and transferred via the servers' RAM and their disappearance without any trace 24 hours after transmission.

User-friendly interface

Cypherdog File Exchange & Storage software focuses on simplicity and ease of use. During installation, the program will ask for the password for your private key (which you must remember) and will allow you to make a copy of it (to a USB drive or to print a copy of the key on a piece of paper).

After the installation, you need to create an address book of other Cypherdog users by inviting them from the application.

Once invited, you can transfer files to others with a few clicks or by using drag & drop. Cloud files and the safe are very similar to use. You can move the file using drag & drop or select the file or folder from the selection window. The encryption and decryption process occurs automatically in the messaging window and the cloud or safe view.

parallax background

Versions

SpecificationFree
(after trial period)
Single User
& Trial 14 days
Business
Users1125+
Secure file storage in the cloud-
Local file storage-
Text communication-
Sending encrypted files-
Unlimited file transfer-
One license for single user-
Decryption of received files
Admin panel for user allocation--
Backup of private key to file(QR file)-
Backup of private key on company servers--
One license for single user-
One license for many users--
Address book import--
Basic support and online training
Advanced support and training--
Access to the Messenger App (Android/iOS)
parallax background
 

Technical specification

Cypherdog works as a desktop application on all modern operating systems, such as Windows, macOS, and Linux.

In the case of the Business version, it is necessary to install the Administrator Console for managing users and keys. Then, you can use this Proxy Server for communication between the desktop application and the Vault, where the private keys of all users are stored. 

parallax background

Private key protection

The security of Cypherdog customers' data is based on the confidentiality of their private keys. Each user's private key is generated only by the Cypherdog application using the RSA algorithm and is encrypted with the customer's password. The principle of the absolute protection of the private key is essential and implemented by all system’s components. This key or any part of it never leaves the user's device. It is the only  way to ensure data confidentiality in the system.

Cypherdog uses cryptographic methods based on a combination of asymmetric and symmetric algorithms: RSA3072, SHA256 and AES-256.

Confidentiality and integrity

This solution has many advantages, among others, absolute confidentiality and integrity of stored and transmitted information. However, there is one limitation to keep in mind. If the user loses her private key, she will not be able to recover her data.

The master system does not offer any private key recovery function. To protect data against loss, the user should use Cypherdog application to make a copy of her private key to a portable disk or print its representation in a QR code and keep a copy of the key safe (in the Business version private keys are stored on the organization's server in Vault).

Options for making a copy of the key are available in the desktop application and can be made after registration in the system. All cryptographic data generated during the information lifecycle is derived from the private key owned by the user. Therefore, the strength of the private key is uncompromised to avoid computational attacks aimed at its reproduction.

parallax background

Private key protection

The security of Cypherdog customers' data is based on the confidentiality of their private keys. Each user's private key is generated only by the Cypherdog application using the RSA algorithm and is encrypted with the customer's password. The principle of the absolute protection of the private key is essential and implemented by all system’s components. This key or any part of it never leaves the user's device. It is the only  way to ensure data confidentiality in the system.

Cypherdog uses cryptographics methods based on a combination of asymmetric and symmetric algorithms: RSA3072, SHA256 and AES-256.

Confidentiality and integrity

This solution has many advantages, among others, absolute confidentiality and integrity of stored and transmitted information. However, there is one limitation to keep in mind. If the user loses her private key, she will not be able to recover her data.

The master system does not offer any private key recovery function. To protect data against loss, the user should use Cypherdog application to make a copy of her private key to a portable disk or print its representation in a QR code and keep a copy of the key safe (in the Business version private keys are stored on the organization's server in Vault).

Options for making a copy of the key are available in the desktop application and can be made after registration in the system. All cryptographic data generated during the information lifecycle is derived from the private key owned by the user. Therefore, the strength of the private key is uncompromised to avoid computational attacks aimed at its reproduction.

Pricing plans



Choose the best product for your business

parallax background
parallax background

Are you not sure which product is right for you?


Make an appointment with our Sales Team members


Book consultation

Are you not sure which product is right for you?


Make an appointment with our Sales Team members


Book consultation