Our main focus is to encrypt single files. But, sure, you can encrypt all your files with 2ndLock, but there are much better solutions on the market.
No, 2ndLock have nothing to do with PGP. PGP is a perfect technical solution for a problem but does not take the holistic view into consideration. Encrypting a file is only half way towards secure communication. How to exchange the sicrate communication token and manage individual devices makes 2ndLock the best solution to exchange data as simple as possible.
To have an optical description. If you want to send a parcel secured to someone at work. All you want to do is to drop the parcel on your way to lunch at the outbound desk. Just a recipient email address on it. With pgp you need to call the recipient, exchange a very long hex number or google for it and hope the number is right from this www.trustme-i-tell-the-trooth.xxx server. Then get a new box to put your parcel in, use the special machine to wrap it. And then you can trop it on the way out. With 2ndLock you just put it on the nice and friendly table next to the outbound desk, labled 2ndLock. Done. Btw it’s the same for the recipient.
Yes, without it it would not work unfortunately and/or would be then rather insecure. An account on our Community Edition does not cost any money.
We use the email address to identify a recipient.
Then you can remove the affected device via our web client. This means that all 2ndLock files on the device can no longer be decrypted.
Just like you’ve always done. Simply use a transmission medium of your choice or what is easiest for your customer.
We use a hybrid procedure, which means a combination of AES and RSA. And very important: 2ndLock does NOT build new encryption software. It does use well know, open, heavy used and audited crypto libraries.
We are currently support tho whole apple ecosystem, web, windows and linux. Android will be probably available at the end of the year.
No, we can’t do that. First of all, all the files you encrypt remain on your device. Our infrastructure never knows which files you have encrypted. We “only” take care of the exchange of keys. We create so-called content objects, which are completely useless for us due to hash functions and other mechanics.