Cypherdog Encryption
Featured
Encrypt any file, any text, and share via any medium, any time
Overview
What is Cypherdog Encryption?
Encrypt any file, any text, and share via any medium, any time.
SCREENSHOT
SUMMARY
Secure any text and file with end-to-end encryption.
One click. Complete protection.
The software encrypts all text messages and files that you can conveniently share via e-mail, cloud storage or any chat system. The solution also verifies the sender's identity for added security. If you value the privacy and confidentiality of your communication, give our user-friendly software a try, as it rightly maintains the highest message security level.
To use the plugin for encrypting email messages, it is necessary to install the Cypherdog Encryption desktop application and register an account. Download the application from the website https://www.cypher.dog/cdog-download-the-app-encryption/
Cypherdog Encryption Application - installed in the operating system, available from the sidebar.
Cypherdog Encryption Plugin - installed in a browser or e-mail native client.
The Cypherdog Encryption Plugin module is responsible for interaction with the user and managing the encryption and decryption of messages.The Cypherdog Encryption Application module, on the other hand, supervises the authorisation to your private key and performs cryptographic operations in a tangible sense.
This plugin:
is supporting encryption and decryption e-mail messages in Gmail and web Outlook.
is not supporting other webmail clients
Encryption and decryption of attachments (or every file) is possible using Cypherdog Encryption Application
Only processes authorized by the Cypherdog Encryption Application module can use your private key. This means that the browser and other approved methods will never have control over your private key. They will only be able to use it to encrypt and decrypt messages. The architecture of our solution ensures complete separation of customer's e-mail from your private key.
Cypherdog uses proven cryptographic algorithms, such as the 3072-bit RSA key and the SHA512 hash function. The assurance of complete security is based on the zero-knowledge security model, without involving any "trusted" third party, including Cypherdog, Certification Authority, and e-mail provider.
See More
Stats
Trends for Cypherdog Encryption:
Rank
User count
Category Rank
Rating
Download
HOW TO INSTALL Cypherdog Encryption FROM A CRX FILE
- Download Cypherdog Encryption CRX file
- NOTE: Sometimes the browser may block downloading / installing CRX file from outside the Chrome Web Store. If so, you may need to download the ZIP file instead
- In the URL bar, go to chrome://extensions
- Enable Developer mode
Ratings
USER REVIEWS (0)
No reviews