Demo download

What is Cypherdog?

A desktop application being the most secure alternative to email and file-sharing platforms.

Cypherdog is a tool for:

  • securely sending encrypted files,
  • encrypted cloud storage,
  • local encryption of resources on the disk,
  • text messenger (available in desktop and mobile versions).

 cypherdog 01

What does it counteract?

  • industrial espionage (stealing offers, contracts, lawsuit content),
  • data leaks (personal, medical, access),
  • invoice hacking, business email compromise (#BEC) - paying cybercriminals based on forged invoices, bills or other documents,
  • next-generation ransomware (cybercriminals steal data before encryption and blackmail with leaks),
  • non-compliance with GDPR (exhausts Art. 32).

 

cypherdog 02

 

Cypherdog Encryption specificationsFree mobileFree desktop
(after trial)
Single User & TrialBusiness
Text/e-mail messages encryption -
Encryption of files/attachments in e-mail messages -
Decryption of e-mail messages/ texts and attachments/ files
Administration panel for users & private keys management - - -
Backup private key to file (on device) -
Backup of private key to company server in Vault - - -
One license key for a single user - - -
One license key for multiple users - - -
Basic support and online training -
Advanced support and training - - -
Command line text/file encryption/decryption - - (scalable)
Cooperation with security systems on gateway - - -
E-mail aliases -
Cryptography Encryption: asymmetric RSA3072 and symmetric AES-256, SHA512 hash function
Microsoft Outlook supported Add-ins to Outlook 2016+ for Microsoft 365/ Exchange Server, webclient & native
Gmail supported Plugins: Google Chrome, Microsoft Edge, Mozilla Firefox
Mozilla Thunderbird supported Add-ons for Thunderbird for all e-mail providers and servers
Other e-mail clients all supported Manual encryption / decryption / right-click or “magic window”
Other communication channels all supported WeTransfer, Slack, Google Drive, Dropbox, WhatsApp, Messenger etc.
Operating systems iOS/Android Windows, macOS, Linux + free mobile app (iOS, Android)

 

Examples of Cypherdog application:

  • sending offers, invoices, and contracts to clients
  • secure sending of CVs, payroll, and HR documents
  • transmitting essential financial data (reports, tax declarations of employees and the company) to external entities (lawyers, insurance companies, banks)
  • communication between the Management Board and the Supervisory Board, as well as other key employees
  • sending essential data related to the preparation of a valuable offer (with subcontractors, employees, suppliers)
  • protection of sensitive medical data: medical diagnostics, medical opinions, test results
  • transmitting any personal data - full compliance with GDPR requirements
  • ensuring information security and communication confidentiality in every area.

 

cypherdog 03 

 

 

cypherdog 05 

 

Key Features of the Solution:

 

No "trusted third party"

Cypherdog does not use email messages and SMS for user identity verification, and it does not rely on any third-party entities such as global organizations like Google, Facebook, Apple, or Microsoft, as well as other providers like electronic signatures or certification authorities.

 

Absolute protection of the private key

As a user, you are the only person with access to the private key. You generate this key locally during the first login to the application. We do not offer the function of storing the private key in the system, which means that no one but you has access to it.

 

End-to-end encryption

The data you send or receive is encrypted locally from the moment it is sent until it is received by the other party. We have no way of decrypting your files or communication without your private key, which is solely on your device in the Cypherdog application.

 

Encrypted cloud

By using the application, you have access to a private, encrypted cloud where you can store your files while maintaining full confidentiality. It is your private space for storing important documents, offers, files, contracts, or technical documentation.

 

No access to data

As a data administrator, Cypherdog does not have access to the user's address book, conversation history, or the content of any communication. Additionally, during the file transfer process between parties, the administrator has no access to decrypted files in any form. Full and unquestionable anonymity and confidentiality are our priority.

 

Zero-knowledge security method

The service provider will not assist in recovering encrypted data or regaining access to the account in case of login data loss because it is not possible. Zero-knowledge security ensures data confidentiality and privacy.

 

Public keys in blockchain

The public keys used to encrypt transmitted files and communication content are stored in distributed registers, using blockchain technology. This guarantees protection against their loss or leakage.

 

Local encryption

By using Cypherdog, you have the option to encrypt files you manage on your local device using the application. You can also save them on the device in encrypted form.

 

Blockchain credibility ranking *)

It is obvious that the most reliable method of confirming the identity of communication participants is meeting both parties. However, what if this is not possible? The solution is the credibility ranking of users in the blockchain - if you want to send a file to someone and need to check if they are who they claim to be, you can simply check their credibility ranking, i.e., the number of identity confirmations of that person by other users.

 

 


 

Adrian Ścibor "Cypherdog is a brilliant solution. I've tested hundreds of IT journalist and security expert solutions throughout my career, but few have impressed me as much as this one. The data security and user privacy in this product are top-notch."

 

 

Artur Markiewicz "Cypherdog is one of the most secure solutions for communication, encrypted file transfer, and cloud storage that I've come across. In my opinion, the most important features are the absolute protection of the private key, the zero-knowledge security method, and the absence of a "trusted third party". In my view, it's the perfect solution for those who want to maintain the highest level of communication confidentiality and possess a manageable tool for secure communication."

 

Radosław Sroczyński "Cypherdog is a solution that ensures the security of conversations and transmitted data. It's the perfect balance between technological advancement and ease of administration and user-friendliness. Consequently, it's an excellent tool for companies seeking secure communication channels without wanting to incur significant implementation or maintenance costs from the IT side."

 

*) Functionalities during testing of the new software version

 

News

o nas

About Us

Our company has over a decade of experience in managing IT projects in international corporations. For 25 years, our specialists and engineers have been supporting comprehensive implementations, migrations, and optimizations of IT environments. Through collaboration with our partners, we are able to deliver solutions in various business areas - at different levels - ranging from infrastructure through applications to security. Our GDPR engineer, your data will be stored in accordance with applicable regulations.

We have successfully created and managed IT departments with budgets in the millions of euros.

 

More about us

Our Partners

All rights reserved

|

Design: StudioAlfa.pl - Joomla Websites Development