Item logo image for Cypherdog Encryption

Cypherdog Encryption

Featured
5.0(

5 ratings

)
ExtensionSocial Networking145 users
Item media 4 screenshot
Item media 5 screenshot
Item video thumbnail
Item media 2 screenshot
Item media 3 screenshot
Item media 4 screenshot
Item media 5 screenshot
Item video thumbnail
Item media 2 screenshot
Item video thumbnail
Item media 2 screenshot
Item media 3 screenshot
Item media 4 screenshot
Item media 5 screenshot

Overview

Encrypt any file, any text, and share via any medium, any time

Secure any text and file with end-to-end encryption. One click. Complete protection. The software encrypts all text messages and files that you can conveniently share via e-mail, cloud storage or any chat system. The solution also verifies the sender's identity for added security. If you value the privacy and confidentiality of your communication, give our user-friendly software a try, as it rightly maintains the highest message security level. To use the plugin for encrypting email messages, it is necessary to install the Cypherdog Encryption desktop application and register an account. Download the application from the website https://www.cypher.dog/cdog-download-the-app-encryption/ Cypherdog Encryption Application - installed in the operating system, available from the sidebar. Cypherdog Encryption Plugin - installed in a browser or e-mail native client. The Cypherdog Encryption Plugin module is responsible for interaction with the user and managing the encryption and decryption of messages.The Cypherdog Encryption Application module, on the other hand, supervises the authorisation to your private key and performs cryptographic operations in a tangible sense. This plugin: is supporting encryption and decryption e-mail messages in Gmail and web Outlook. is not supporting other webmail clients Encryption and decryption of attachments (or every file) is possible using Cypherdog Encryption Application Only processes authorized by the Cypherdog Encryption Application module can use your private key. This means that the browser and other approved methods will never have control over your private key. They will only be able to use it to encrypt and decrypt messages. The architecture of our solution ensures complete separation of customer's e-mail from your private key. Cypherdog uses proven cryptographic algorithms, such as the 3072-bit RSA key and the SHA512 hash function. The assurance of complete security is based on the zero-knowledge security model, without involving any "trusted" third party, including Cypherdog, Certification Authority, and e-mail provider.

5 out of 55 ratings

Google doesn't verify reviews. Learn more about results and reviews.

Details

  • Version
    1.1.0
  • Updated
    May 27, 2023
  • Offered by
    Cypherdog Security Inc.
  • Size
    91.68KiB
  • Languages
    English
  • Developer
    Cypherdog Security Inc.
    2040 Martin Ave Santa Clara, CA 95050-2702 US
    Email
    k.glocka@cypher.dog
  • Trader
    This developer has identified itself as a trader per the definition from the European Union.

Privacy

The developer has disclosed that it will not collect or use your data.

This developer declares that your data is

  • Not being sold to third parties, outside of the approved use cases
  • Not being used or transferred for purposes that are unrelated to the item's core functionality
  • Not being used or transferred to determine creditworthiness or for lending purposes

Support

For help with questions, suggestions, or problems, visit the developer's support site

Google apps