E-MAIL ENCRYPTION

Send e-mail securely

Secure your messages and attachments by encrypting and decrypting any part of your text and file that can be sent via e-mail (or any media). Be assured that only the authorized recipient has access to your content.

One click. Complete protection.

FILE ENCRYPTION

Encrypt files locally on your device

Encrypt securely all files on your disk drive using the Cypherdog application. Have the guarantee of the highest confidentiality and security of your files.

MESSENGER

Use chat with encrypted communication

Cypherdog knows how to meet the requirements of today’s users.

Cypherdog guarantees: encrypted communication, total anonymity of contacts and conversations, end-to-end encryption, no data records on our servers’ hard drives, zero collection of any metadata, and complete deletion of all encrypted content after 24 hours. Try it and see for yourself.

CLOUD STORAGE

Manage your files in an ecrypted cloud

Are you looking for a safe place to store documents, contracts, and reports that no one has access to?

Manage files in the encrypted, entirely safe, Cypherdog cloud. We guarantee that only you have access to it.

FILE EXCHANGE

Send files securely

Keep your files completely secure by sending them in all formats and sizes, with end-to-end asymmetric encryption, unauthorized third-party access, and identity confirmation. Use any media to send or share encrypted files with Cypherdog E-mail Encryption or Cypherdog File Exchange & Storage.

Cypher.dog - Privacy first

No "trusted third party"

Cypherdog does not use e-mails and/or text messages to confirm the identity of its communication users. It does not use any third party global organisations, such as Google, Facebook, Apple or Microsoft, and other providers, e.g. electronic signatures or certification centers.

Public keys in blockchain

Public keys used to encrypt transmitted files and communication content are stored in distributed registers using blockchain technology. This guarantees protection against data loss and leakage.

Local encryption

By using Cypherdog you have the option to encrypt files that you manage on your local device using the application. You can also save them to your device in an encrypted format.

Exclusive access to the private key

As a user, you are the only person who has access to the private key that you create when logging in to the application for the first time. It is not possible to recover the private key, this means that no one but you can access it.

Ranking of credibility in blockchain

If you want to send a file to someone and need to check if this is the person they claim to be, all you have to do is check their credibility ranking, that is, the number of other people’s identity confirmations.

End to end encryption

The data you send or receive is encrypted from the moment it is sent until it is received by the recipient. You cannot decrypt files without a private key which is only found in the Cypherdog application.

Encrypted cloud

Through the application you have access to a private encrypted cloud in which you can place your files in a completely secure way. It is your private space for keeping important documents, files, contracts and invoices.

No administrator access to data

As a data administrator, Cypherdog does not have access to the user’s address book or their contact network. During the process of transferring files between parties, the administrator does not have access to files in any form.

Zero-knowledge security

The service provider cannot help you to recover encrypted data or gain access to your account in case you lose your login details. Zero-knowledge security guarantees real data confidentiality and privacy.

Simple Pricing

Messenger

End-to-end encryption of messages
C$ 3
99
Monthly
  • For single user
  • End-to-end encryption of messages
  • Automatically delete messages after 24 hours
  • Communication only with Cypherdog users
  • Anonymization of communication
  • Mobile application (Android)
  • On-line support
  • Confirmation of user identity only by physical meeting
  • Connected identity with the application on the computer

Premium

For business, administration and private use
C$ 9
99
Monthly
  • For single user
  • For business, administration and private use
  • For top management in Enterprises
  • No data access policy: The user is an administrator
  • Unlimited file transfer
  • Encryption on local disk
  • Secure cloud storage
  • Text messenger on your computer
  • On-line support
  • Simple installation and start-up
  • On-line training for users

Enterprise

For business and administration
C$ 9
99
Monthly per user
  • From 25 corporate users
  • For business and administration
  • Unlimited file transfer
  • Encryption on local disk
  • Data access policy for companies
  • Secure storage in cloud or on the company's server
  • Text messenger on your computer
  • Admin console for managing users
  • Import of contact book
  • 24/7 support
  • Support in integration and implementation processes in organizations
  • Comprehensive training for end users and administrators
Popular

Cypherdog E-mail Encryption

Without creating an account for the recipient of encrypted e-mails, it is impossible to encrypt messages, because there is no created pair of keys assigned to the recipient (public for encryption and private for decryption). So encrypting and decrypting the content and attachments of e-mails requires an application on the sender and recipient side.

The Single User E-mail Encryption application works in the Trial version for 14 days with full functionality. After this period, if the user decides not to use the paid version, he can use it to decrypt the content and attachments of e-mails sent to him.

The client application looks the same in the Single User and Business versions. The main difference in the Business version is that one company needs one license for many users and you have Admin Panel for managing users under one license (Administrator in the company can add, suspend or delete users), decide on allowed user domains, store private keys in Vault on company’s server and use Proxy Server for communication between client apps and Vault.

You can change the details of your subscription or cancel it at any time. You can also increase/decrease the number of users, and change the payment method or the billing address.

With E-mail Encryption Business you get access with one license to 25 and up users. There is no upper limitation. You should decide how many users you want to cover. If you want to cover a smaller team choose Single User licenses (every user should have a separate license).

No. You only need licenses for the number of users who will actively use E-mail Encryption. The implementation of the solution should be preceded by an analysis of the processes, data sent in them, and people involved in their processing. You can always increase or decrease the number of users when your needs evolve.

You can use the “magic window” available from the menu of the application in the taskbar (Encrypt/Text), where you can type or paste any text, after entering the recipient’s e-mail address click Encrypt. After that encrypted message is copied into the clipboard. You can paste it to an email window or any other communication medium. To decrypt the received encrypted message in case it is not a supported browser or e-mail application you should select a block with encrypted text and use the “magic window” available from the application menu in the taskbar (Decrypt/Text).

For every encryption process, a random symmetric key is generated. This key is used for the encryption of messages and attachments. This key is encrypted using an asymmetric public key for every recipient and sender. All results of this process generate blocks of data in the header of the file of attachment (or message) The decryption process started by trying to decrypt header blocks using the asymmetric encryption and private key connected with the user which has the rights to decrypt a message or attachment. After that, the symmetric key is extracted and used for decrypting the main block of data (attachment or message).

A private key is unique for every user and (in the Single User version) only the owner has access to it (in the Business version administrators of Admin Console). You can decrypt messages and attachments using this key.
• If you lose it (because of disk drive damage, stealing your notebook, deleting some files, ransomware attack, or any other reason) you cannot decrypt any data. That’s why you should have a backup of your private key
• If you want to use CEE or another computer you should back up the key on the first computer and restore it on the new one.

No, you can use your Cypherdog account on multiple devices First, you should back up your private key e.g on a pen drive. After that, you can install Cypherdog E-mail Encryption on the other computer. During the login process to the app you enter your e-mail address and password to the app and when Cypherdog cannot find your profile will ask about the path to your backup of the private key. After choosing a file with a private key your account will work on a new device.

Cypherdog File Exchange & Storage

Without creating an account for the recipient of a file transferred, it is impossible to send files, because there is no created pair of keys assigned to the recipient (public for encryption and private for decryption). So encrypting and decrypting files requires an application on the sender and recipient side.

The Single User File Exchange & Server application works in the Trial version for 14 days with full functionality. After this period, if the user decides not to use the paid version, he can use it to decrypt the received files sent to him.

In the standard version you have a limit of transfer files up to 20GB for 14 days. If you want to have a bigger limit (up to 1TB file) please contact our sales department.

Every file you transfer by CFE&S is available for 14 days for downloading after being sent.

Every chat disappeared after 24 hours and there is no digital fingerprint. Text messages are stored only on the RAM of servers.

The client application looks the same in the Single User and Business versions. The main difference in the Business version is that one company needs one license for many users and you have Admin Panel for managing users under one license (Administrator in the company can add, suspend or delete users), decide on allowed user domains, store private keys in Vault on company’s server and use Proxy Server for communication between client apps and Vault.

You can change the details of your subscription or cancel it at any time. You can also increase/decrease the number of users, and change the payment method or the billing address.

With File Exchange & Storage Business you get access with one license to 25 and up users. There is no upper limitation. You should decide how many users you want to cover. If you want to cover smaller team choose Single User licenses (every user should have separate license).

No. You only need licenses for the number of users who actively use File Exchange & Storage. The implementation of the solution should be preceded by an analysis of the processes, data sent in them, and people involved in their processing. You can always increase or decrease the number of users when your needs evolve.

Cypherdog Messenger

Every chat disappears after 24 hours and there is no digital fingerprint. Text messages are stored only on the RAM of servers.

Without creating an account for the recipient of a text message, it is impossible to send text, because there is no created pair of keys assigned to the recipient (public for encryption and private for decryption). So encrypting and decrypting files requires an application on the sender and recipient side. In the case of Cypherdog Messenger, it could be Cypherdog File Exchange & Storage, too.

Download app and get 14 days for free!

If you need to learn more about our solution or need help with implementing it in, contact us! sales@codespherenetwork.com

    Etiam magna arcu, ullamcorper ut pulvinar et, ornare sit amet ligula. Aliquam vitae bibendum lorem. Cras id dui lectus. Pellentesque nec felis tristique urna lacinia sollicitudin ac ac ex. Maecenas mattis faucibus condimentum. Curabitur imperdiet felis at est posuere bibendum. Sed quis nulla tellus.

    ADDRESS

    63739 street lorem ipsum City, Country

    PHONE

    +12 (0) 345 678 9

    EMAIL

    info@company.com

    Cart