FAQ’S

Is 2ndLock a solution for hard disk encryption?
Did you recreate PGP there?
Does the recipient need to have your software installed?
How do I specify a recipient?
What happens if I lose my device?
How can I share the encrypted files with others?
What's 2ndLock cost?
What encryption do you use?
Which platforms are supported by 2ndLock
Can 2ndLock draw conclusions about my encrypted data ?
Is 2ndLock a solution for hard disk encryption?

Our main focus is to encrypt single files. But, sure, you can encrypt all your files with 2ndLock, but there are much better solutions on the market.

Did you recreate PGP there?

No, 2ndLock have nothing to do with PGP. PGP is a perfect technical solution for a problem but does not take the holistic view into consideration. Encrypting a file is only half way towards secure communication. How to exchange the sicrate communication token and manage individual devices makes 2ndLock the best solution to exchange data as simple as possible.

 

To have an optical description. If you want to send a parcel secured to someone at work. All you want to do is to drop the parcel on your way to lunch at the outbound desk. Just a recipient email address on it. With pgp you need to call the recipient, exchange a very long hex number or google for it and hope the number is right from this www.trustme-i-tell-the-trooth.xxx server. Then get a new box to put your parcel in, use the special machine to wrap it. And then you can trop it on the way out. With 2ndLock you just put it on the nice and friendly table next to the outbound desk, labled 2ndLock. Done. Btw it’s the same for the recipient.

Does the recipient need to have your software installed?

Yes, without it it would not work unfortunately and/or would be then rather insecure. An account on our Community Edition does not cost any money.

How do I specify a recipient?

We use the email address to identify a recipient.

What happens if I lose my device?

Then you can remove the affected device via our web client. This means that all 2ndLock files on the device can no longer be decrypted.

How can I share the encrypted files with others?

Just like you’ve always done. Simply use a transmission medium of your choice or what is easiest for your customer.

What's 2ndLock cost?

We provide a free and opensource community edition. If you want more features like expire date for file, have a look into our enterprise solutions or our edition matrix.

What encryption do you use?

We use a hybrid procedure, which means a combination of AES and RSA. And very important: 2ndLock does NOT build new encryption software. It does use well know, open, heavy used and audited crypto libraries.

Which platforms are supported by 2ndLock

We are currently support tho whole apple ecosystem, web, windows and linux. Android will be probably available at the end of the year.

Can 2ndLock draw conclusions about my encrypted data ?

No, we can’t do that. First of all, all the files you encrypt remain on your device. Our infrastructure never knows which files you have encrypted. We “only” take care of the exchange of keys. We create so-called content objects, which are completely useless for us due to hash functions and other mechanics.

Menu