extension ExtPose

Cypherdog Encryption

CRX id

dhcfjhfmgoekhacekiogfhkiiipokegp-

Description from extension meta

Encrypt any file, any text, and share via any medium, any time

Image from store Cypherdog Encryption
Description from store Secure any text and file with end-to-end encryption. One click. Complete protection. The software encrypts all text messages and files that you can conveniently share via e-mail, cloud storage or any chat system. The solution also verifies the sender's identity for added security. If you value the privacy and confidentiality of your communication, give our user-friendly software a try, as it rightly maintains the highest message security level. To use the plugin for encrypting email messages, it is necessary to install the Cypherdog Encryption desktop application and register an account. Download the application from the website https://www.cypher.dog/cdog-download-the-app-encryption/ Cypherdog Encryption Application - installed in the operating system, available from the sidebar. Cypherdog Encryption Plugin - installed in a browser or e-mail native client. The Cypherdog Encryption Plugin module is responsible for interaction with the user and managing the encryption and decryption of messages.The Cypherdog Encryption Application module, on the other hand, supervises the authorisation to your private key and performs cryptographic operations in a tangible sense. This plugin: is supporting encryption and decryption e-mail messages in Gmail and web Outlook. is not supporting other webmail clients Encryption and decryption of attachments (or every file) is possible using Cypherdog Encryption Application Only processes authorized by the Cypherdog Encryption Application module can use your private key. This means that the browser and other approved methods will never have control over your private key. They will only be able to use it to encrypt and decrypt messages. The architecture of our solution ensures complete separation of customer's e-mail from your private key. Cypherdog uses proven cryptographic algorithms, such as the 3072-bit RSA key and the SHA512 hash function. The assurance of complete security is based on the zero-knowledge security model, without involving any "trusted" third party, including Cypherdog, Certification Authority, and e-mail provider.

Latest reviews

  • (2022-09-21) Małgorzata Zielaskiewicz: I am very satisfied, I think that's what I was looking for.
  • (2022-09-11) Ela Kozera: Finally, I decide which part of my e-mail and attachments I want to encrypt so that my valuable and confidential information is solely seen by those I trust.
  • (2022-09-05) Katarzyna Langer: It is a very useful and intuitive solution. 💯
  • (2022-09-05) Przemyslaw Kucharzewski: Excellent solution!

Statistics

Installs
87 history
Category
Rating
5.0 (5 votes)
Last update / version
2023-05-27 / 1.1.0
Listing languages
en

Links