
Cypherdog Encryption Autor: Cypherdog Security Inc.
Encrypt any file, any text, and share via any medium, any time
Na použitie tohto rozšírenia budete potrebovať Firefox
Metadáta rozšírenia
Snímky obrazovky




O tomto rozšírení
Secure any text and file with end-to-end encryption.
One click. Complete protection.
The software encrypts all text messages and files that you can conveniently share via e-mail, cloud storage or any chat system. The solution also verifies the sender's identity for added security. If you value the privacy and confidentiality of your communication, give our user-friendly software a try, as it rightly maintains the highest message security level.
To use the plugin for encrypting email messages, it is necessary to install the Cypherdog Encryption desktop application and register an account. Download the application from the website.
Cypherdog Encryption Application - installed in the operating system, available from the sidebar.
Cypherdog Encryption Plugin - installed in a browser or e-mail native client.
The Cypherdog Encryption Plugin module is responsible for interaction with the user and managing the encryption and decryption of messages.The Cypherdog Encryption Application module, on the other hand, supervises the authorisation to your private key and performs cryptographic operations in a tangible sense.
This plugin:
is supporting encryption and decryption e-mail messages in Gmail and web Outlook.
is not supporting other webmail clients
Encryption and decryption of attachments (or every file) is possible using Cypherdog Encryption Application
Only processes authorized by the Cypherdog Encryption Application module can use your private key. This means that the browser and other approved methods will never have control over your private key. They will only be able to use it to encrypt and decrypt messages. The architecture of our solution ensures complete separation of customer's e-mail from your private key.
Cypherdog uses proven cryptographic algorithms, such as the 3072-bit RSA key and the SHA512 hash function. The assurance of complete security is based on the zero-knowledge security model, without involving any "trusted" third party, including Cypherdog, Certification Authority, and e-mail provider.
One click. Complete protection.
The software encrypts all text messages and files that you can conveniently share via e-mail, cloud storage or any chat system. The solution also verifies the sender's identity for added security. If you value the privacy and confidentiality of your communication, give our user-friendly software a try, as it rightly maintains the highest message security level.
To use the plugin for encrypting email messages, it is necessary to install the Cypherdog Encryption desktop application and register an account. Download the application from the website.
Cypherdog Encryption Application - installed in the operating system, available from the sidebar.
Cypherdog Encryption Plugin - installed in a browser or e-mail native client.
The Cypherdog Encryption Plugin module is responsible for interaction with the user and managing the encryption and decryption of messages.The Cypherdog Encryption Application module, on the other hand, supervises the authorisation to your private key and performs cryptographic operations in a tangible sense.
This plugin:
is supporting encryption and decryption e-mail messages in Gmail and web Outlook.
is not supporting other webmail clients
Encryption and decryption of attachments (or every file) is possible using Cypherdog Encryption Application
Only processes authorized by the Cypherdog Encryption Application module can use your private key. This means that the browser and other approved methods will never have control over your private key. They will only be able to use it to encrypt and decrypt messages. The architecture of our solution ensures complete separation of customer's e-mail from your private key.
Cypherdog uses proven cryptographic algorithms, such as the 3072-bit RSA key and the SHA512 hash function. The assurance of complete security is based on the zero-knowledge security model, without involving any "trusted" third party, including Cypherdog, Certification Authority, and e-mail provider.
Ohodnoťte svoju skúsenosť
PovoleniaĎalšie informácie
Tento doplnok potrebuje:
- Zobrazovať upozornenia
- Pristupovať k údajom pre všetky webové stránky
Ďalšie informácie
- Odkazy doplnku
- Verzia
- 1.1.2
- Veľkosť
- 105,53 kB
- Posledná aktualizácia
- pred 2 rokmi (20. jún 2023)
- Príbuzné kategórie
- Licencia
- Všetky práva vyhradené
- História verzií
- Značky
Pridať do kolekcie
Poznámky k vydaniu pre verziu 1.1.2
Made it possible to use the plugin on any website.
Ďalšie rozšírenia od autora Cypherdog Security Inc.
- Doplnok zatiaľ nie je ohodnotený
- Doplnok zatiaľ nie je ohodnotený
- Doplnok zatiaľ nie je ohodnotený
- Doplnok zatiaľ nie je ohodnotený
- Doplnok zatiaľ nie je ohodnotený
- Doplnok zatiaľ nie je ohodnotený