FAQ’S

Our main focus is to encrypt single files. You of course can encrypt all your files with 2ndLock – we’d be flattered –  but there are much better solutions on the market for that.

No:)

PGP is a great technical solution for one aspect of data protection, namely encryption itself, but that is only half of the secure communication. We went a bit further by addressing how the secret communication token was exchanged and the management of communication over individual devices.

To put it into more visual terms: imagine you want to send a secured parcel to someone at work. All you want to do is to drop the parcel on your way to lunch at the reception desk, with just a recipient name on it. With PGP you need to call the recipient, exchange a very long hex number or google for it and hope the number is right from this www.trustme-i-tell-the-trooth.xxx server. Then get a whole new box for your parcel, and use a special machine to wrap it. And only then you can drop it on the way out.

With 2ndLock, you just put your parcel with recipients name on the special “2ndLock” table next to the reception desk.

Yes, both parties at each end of the communication must be software users for a reliable encryption. But our Community edition is really easy to setup and free of charge:)

We use the email address to identify a recipient.

You can always remove the affected device, logging on to our platform. This means that all 2ndLock files on the device can no longer be decrypted.

Once you have encrypted the file you want to send, it sits in you “Downloaded” folder; you can send it over any communication app, put it up on cloud or attach it in your email – whatever works for you and your recipient.

Our Community edition is free for everyone.

For Business we have upgraded features, tailored to most GDPR requirements, such as expiration date for files, or revoking keys individual keys of access. For more details, check out our edition matrix.

We use a hybrid procedure, which means a combination of AES and RSA, we did NOT build a new encryption software. Instead we use a combination of well-known, open, heavy-used and audited crypto libraries. This is important, cause we don’t want you to feel you are buying a cat in a bag; in fact – we’re open-source, so we’d be delighted to have you checking out our code.

We currently support tho whole apple ecosystem, web, windows and linux. Android will be probably available at the end of the year.

No, we can’t do that. First of all, the whole encryption process happens within your device, without exposing your content to the online environment, and our infrastructure never knows which files you have encrypted. We “only” handle of the exchange of keys. We create so-called content objects, which we couldn’t access if we wanted to, due to hash functions and other mechanics.

If your questions go beyond this – please contact us via email or chat, or take a look at our code (we’re open-source).