
Why Cypherdog?

E-MAIL ENCRYPTION
Send e-mail securely
Secure your messages and attachments by encrypting and decrypting any part of your text and file that can be sent via e-mail (or any media). Be assured that only the authorized recipient has access to your content.
One click. Complete protection.

FILE TRANSFER
Transfer files securely
If you encrypt a file with Cypherdog E-mail Encryption, you can send it via any communication channel. Include the contact details (like e-mail addresses) of those who should receive the file once encrypted.
You can be sure that only the intended recipient is able to decrypt the file that you can send or share via any medium: Slack, WeTransfer, Google Drive, WhatsApp, Dropbox, etc.

FILE ENCRYPTION
Encrypt files locally on your device
Cypherdog E-mail Encryption allows you to encrypt any file, regardless of format or size. You can encrypt only for yourself if you store files on your hard drive or for anyone else that you intend to share files with.
We use asymmetric encryption, which means the application recognizes who it is encrypting for. Therefore, you should select the recipient's ID (e-mail address) before sending anything out.

TEXT ENCRYPTION
Encrypt and share text securely
Cypherdog E-mail Encryption enables you to encrypt any text using any medium, including messengers or other platforms, and share it securely with anyone you want to.
We use the RSA algorithm, which means our tool should know who to encrypt it for, thus you should pick out the ID (e-mail address) of the recipient you plan to share the text with.
E-MAIL ENCRYPTION
Single
• Encryption and decryption of e-mail messages and attachments
• Encryption and decryption of any text and file that can be sent by any platform
• Backup of private key to file
• One license for single user
• Support for Gmail & Google Suite: plugin to browsers Microsoft Edge, Mozilla Firefox, Google Chrome, Thunderbird
• Support for Microsoft Outlook (add-in for web and native client)
• Support for operating systems (Windows, Linux, MacOS)
• Basic online support and training
Cypherdog provides
Features
End-to-end encryption
Cypherdog Encryption is based on a combination of asymmetric and symmetric encryption. No one can decrypt files without the unique private key stored in the recipient's Cypherdog application.
No trusted third party
Cypherdog, third party organizations and providers, e.g. e-mail services, file sharing providers or Certification Authorities, are excluded from the encryption and decryption processes and have no ability to access any data.
Independency on transport layer
Cypherdog Encryption allows you to encrypt any text or file and send it using various communication channels, such as e-mail, file-sharing platforms like Google Drive, Dropbox, or Microsoft OneDrive, as well as instant messenger platforms like Telegram, Signal, WhatsApp, and other methods like WeTransfer.
Independency on e-mail provider
Cypherdog Encryption is compatible with all e-mail providers and clients. We support the use of plugins, such as Gmail, Outlook and Thunderbird. However, if you prefer to use another e-mail application, you can always use a “magic window” to encrypt and decrypt messages.
Protection of internal and external communication
Cypherdog Encryption enables organizations to protect their communication processes, including outgoing e-mails, chats, and file transfers through any other sharing platform.
No provider access
Cypherdog, as a service provider, does not have any access rights to data. When using any communication channel to share content, neither Cypherdog nor the provider have access to decrypted files and texts in any form.
Zero-knowledge security model
The service provider cannot recover your encrypted data or access your account in case you lose your private key, its backup, or the password needed to decrypt it. The use of zero-knowledge security guarantees complete data confidentiality and privacy.
Absolute protection of the private key
When you log in to the application for the first time, a private key is generated that only you, as the user (either a company or an individual), have access to. If the private key becomes lost or inaccessible, it cannot be recovered, ensuring that it remains solely in your possession and is not accessible to anyone else.
Anonymization and metadata collection
We do not collect additional data about our users, such as IP number, geographical location, logs, mobile phone numbers, and connections between users. We only know one thing - the user's e-mail, which is his ID.