Cryptomator Alternatives, Similar

1 Star 0
Loading...

Cryptomator

Explanation
Cryptomator provides transparent, client-side encryption for your cloud. Protect your documents from unauthorized access. Cryptomator on the desktop is free and open source software, so you can rest assured there are no backdoors. Cryptomator for Android/iOS costs a small fee and is not open source, but it uses an open-core component that can be ch... read more
Categories
Reviews (5.00)
Reviews (0 / 0)
Licence
Platforms
Top 5 Alternatives

All Cryptomator Alternatives

Cryptomator About

Cryptomator provides transparent, client-side encryption for your cloud. Protect your documents from unauthorized access. Cryptomator on the desktop is free and open source software, so you can rest assured there are no backdoors. Cryptomator for Android/iOS costs a small fee and is not open source, but it uses an open-core component that can be checked for backdoors.Easy and ReliableWe understand simplicity as a key aspect of security. With Cryptomator you don't have to deal with accounts, key management, cloud access grants or cipher configurations. Just choose a password and you're ready to go. More Info »You don't even need to specify what cloud you use. Cryptomator encrypts files and doesn't care where you store them. This makes it a lightweight application, which we believe is a huge benefit for reliability. Complexity would kill security.Cryptomator is a so-called transparent encryption utility. This means that you don't have to learn new workflows. Just work with your files as you're used to.Secure and TrustworthyCryptomator encrypts file contents and names using AES. Your passphrase is protected against bruteforcing attempts using scrypt. Directory structures and file sizes get obfuscated. The only thing which cannot be encrypted without breaking your cloud synchronization is the modification date of your files.Cryptomator's desktop app is a free and open source software licensed under the MIT / X Consortium License. This allows anyone to check our code. It is impossible to introduce backdoors for third parties. Also we cannot hide vulnerabilities. And the best thing is: There is no need to trust us, as you can control us!Vendor lock-ins are impossible. Even if we decided to stop development: The desktop source code is already cloned by hundreds of other developers. As you don't need an account, you will never stand in front of locked doors.

Reviews & Comments

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments
Tags

Recommendations For This Article

0
Would love your thoughts, please comment.x
()
x