What is Cypherdog?
A desktop application being the most secure alternative to email and file-sharing platforms.
Cypherdog is a tool for:
- securely sending encrypted files,
- encrypted cloud storage,
- local encryption of resources on the disk,
- text messenger (available in desktop and mobile versions).
What does it counteract?
- industrial espionage (stealing offers, contracts, lawsuit content),
- data leaks (personal, medical, access),
- invoice hacking, business email compromise (#BEC) - paying cybercriminals based on forged invoices, bills or other documents,
- next-generation ransomware (cybercriminals steal data before encryption and blackmail with leaks),
- non-compliance with GDPR (exhausts Art. 32).
Cypherdog Encryption specifications | Free mobile | Free desktop (after trial) | Single User & Trial | Business |
---|---|---|---|---|
Text/e-mail messages encryption | ✓ | - | ✓ | ✓ |
Encryption of files/attachments in e-mail messages | ✓ | - | ✓ | ✓ |
Decryption of e-mail messages/ texts and attachments/ files | ✓ | ✓ | ✓ | ✓ |
Administration panel for users & private keys management | - | - | - | ✓ |
Backup private key to file (on device) | ✓ | ✓ | ✓ | - |
Backup of private key to company server in Vault | - | - | - | ✓ |
One license key for a single user | - | - | ✓ | - |
One license key for multiple users | - | - | - | ✓ |
Basic support and online training | ✓ | ✓ | ✓ | - |
Advanced support and training | - | - | - | ✓ |
Command line text/file encryption/decryption | - | - | ✓ | ✓ (scalable) |
Cooperation with security systems on gateway | - | - | - | ✓ |
E-mail aliases | ✓ | ✓ | ✓ | - |
Cryptography | Encryption: asymmetric RSA3072 and symmetric AES-256, SHA512 hash function | |||
Microsoft Outlook | supported | Add-ins to Outlook 2016+ for Microsoft 365/ Exchange Server, webclient & native | ||
Gmail | supported | Plugins: Google Chrome, Microsoft Edge, Mozilla Firefox | ||
Mozilla Thunderbird | supported | Add-ons for Thunderbird for all e-mail providers and servers | ||
Other e-mail clients | all supported | Manual encryption / decryption / right-click or “magic window” | ||
Other communication channels | all supported | WeTransfer, Slack, Google Drive, Dropbox, WhatsApp, Messenger etc. | ||
Operating systems | iOS/Android | Windows, macOS, Linux + free mobile app (iOS, Android) |
Examples of Cypherdog application:
- sending offers, invoices, and contracts to clients
- secure sending of CVs, payroll, and HR documents
- transmitting essential financial data (reports, tax declarations of employees and the company) to external entities (lawyers, insurance companies, banks)
- communication between the Management Board and the Supervisory Board, as well as other key employees
- sending essential data related to the preparation of a valuable offer (with subcontractors, employees, suppliers)
- protection of sensitive medical data: medical diagnostics, medical opinions, test results
- transmitting any personal data - full compliance with GDPR requirements
- ensuring information security and communication confidentiality in every area.
Key Features of the Solution:
No "trusted third party"
Cypherdog does not use email messages and SMS for user identity verification, and it does not rely on any third-party entities such as global organizations like Google, Facebook, Apple, or Microsoft, as well as other providers like electronic signatures or certification authorities.
Absolute protection of the private key
As a user, you are the only person with access to the private key. You generate this key locally during the first login to the application. We do not offer the function of storing the private key in the system, which means that no one but you has access to it.
End-to-end encryption
The data you send or receive is encrypted locally from the moment it is sent until it is received by the other party. We have no way of decrypting your files or communication without your private key, which is solely on your device in the Cypherdog application.
Encrypted cloud
By using the application, you have access to a private, encrypted cloud where you can store your files while maintaining full confidentiality. It is your private space for storing important documents, offers, files, contracts, or technical documentation.
No access to data
As a data administrator, Cypherdog does not have access to the user's address book, conversation history, or the content of any communication. Additionally, during the file transfer process between parties, the administrator has no access to decrypted files in any form. Full and unquestionable anonymity and confidentiality are our priority.
Zero-knowledge security method
The service provider will not assist in recovering encrypted data or regaining access to the account in case of login data loss because it is not possible. Zero-knowledge security ensures data confidentiality and privacy.
Public keys in blockchain
The public keys used to encrypt transmitted files and communication content are stored in distributed registers, using blockchain technology. This guarantees protection against their loss or leakage.
Local encryption
By using Cypherdog, you have the option to encrypt files you manage on your local device using the application. You can also save them on the device in encrypted form.
Blockchain credibility ranking *)
It is obvious that the most reliable method of confirming the identity of communication participants is meeting both parties. However, what if this is not possible? The solution is the credibility ranking of users in the blockchain - if you want to send a file to someone and need to check if they are who they claim to be, you can simply check their credibility ranking, i.e., the number of identity confirmations of that person by other users.
Adrian Ścibor "Cypherdog is a brilliant solution. I've tested hundreds of IT journalist and security expert solutions throughout my career, but few have impressed me as much as this one. The data security and user privacy in this product are top-notch."
Artur Markiewicz "Cypherdog is one of the most secure solutions for communication, encrypted file transfer, and cloud storage that I've come across. In my opinion, the most important features are the absolute protection of the private key, the zero-knowledge security method, and the absence of a "trusted third party". In my view, it's the perfect solution for those who want to maintain the highest level of communication confidentiality and possess a manageable tool for secure communication."
Radosław Sroczyński "Cypherdog is a solution that ensures the security of conversations and transmitted data. It's the perfect balance between technological advancement and ease of administration and user-friendliness. Consequently, it's an excellent tool for companies seeking secure communication channels without wanting to incur significant implementation or maintenance costs from the IT side."
*) Functionalities during testing of the new software version