Technology that makes your data truly private

Hybrid Virtual Key Management (HVKM) is an unique method of encrypting digital data, based on division of the RSA private encryption key. Your unique half of the key is stored on your device, the other part is on the server. Decryption is possible only when those two parts of the key work together in the on-line mode.

Read more

Scroll down
The app

No one can see your files. Not even us.

Both software developer and system administrators have no technical possibility to access your data — they don’t have your unique half of the private key. Not only files are encrypted, but also their names are. With Safe App you can securely:

01

Store & archive

Data is encrypted on your device using HVKM. Then they become .enc files format, saved in a preferred folder. You get a safe storage for your data. You can remove the original file from your device and leave only the encrypted copy in a cloud.

Store & archive
02

Send

You can send any encrypted file to trusted recipients and track every modification. You are the owner of your data, so you decide who sees it. Files are always encrypted with HVKM and sent via Usecrypt Secure Tunnel. Once they get access to the files, recipients will get informed about it via e‑mail.

Send
03

Share

You can effectively and securely share any data within your group of trusted members. You can create larger teams and share specific files within the group. App allows 3 different levels of data access: data owner, operator and user. You can also track every operation made on the file.

Share
Technology

8 layers of security

We use well-known, advanced cryptographic mechanisms that ensure the highest level of security. All algorithms and cryptographic protocols have certificates from specialized institutions.

01

Hybrid Virtual Key Management

HVKM is our original technology of asymmetric encryption process. You encrypt files with a public key and the receiver decrypts it by using its private key. The private key is divided into two parts. One of them is stored on your device, the other part is kept on the server. To decrypt the file, both parts of the private key must be used at the same time.

02

End-to-end encryption

E2EE is a system of communication where only the communicating users can read the messages. Your data is always secure, whether you want to store, share or send it via Usecrypt. Only you and the people you choose have keys to decrypt and view the files. It never leaves your device unencrypted – your files are always protected.

03

Usecrypt Secure Tunnel

Are you familiar with little padlocks that you see in your URL bar? It’s the sign of the SSL protocol and it means that your data is being sent securely. In theory. The SSL protocol has gaps which make it vulnerable to data capture. Usecrypt uses its own communication tunnel, based on strong asymmetric and symmetric algorithms.

04

Secure connection

Diffie-Hellman is a method of securely exchanging cryptographic keys over a public channel. It’s used in Usecrypt for the first connection between the device and server to establish a Usecrypt Secure Tunnel (based on standards: RFC 2631, IEEE 1363-2000 and ANSI X9.42:2003).

05

The strongest encryption

The Advanced Encryption Standard is an algorithm used globally, also known by its original name – Rijndael. It’s a specification used in encrypting data. It’s based on the strongest 256 bit symmetric key randomly chosen by your device (in accordance with FIPS 197 norm, certificate in X.509 form).

06

Based on verified methods

RSA is a well known and widely used algorithm where the encryption key is public and is different from the decryption key which is private (in accordance with PKCS#1 2.1 standards). This method is used in Usecrypt together with the KEM encryption technique, which eliminates the complexity of the padding scheme.

07

Resistant to hackers

Usecrypt applies a Message Authentication Code (MAC) to each file. Every file has a randomly designated code. Even if somebody hacks your system, they can’t modify anything without your knowledge. And they can’t modify your file, due to the fact that the key to it is stored and encrypted, and can be decrypted only by your device.

08

Securely generated key

KDF is a mechanism of creating cryptographic keys. It’s an essential component of cryptographic systems that basically takes a human readable text password and turns it into bits and bytes to be used as the key to a cryptographic algorithm (in accordance with the IEEE 1363-2000 standards).

Usecrypt Safe Plans

Individual, business and enterprise plans.
Try for free in a 30-day trial and choose the best option that fits you.

Pro

Per user, per month

Fully customizable account for personal use and for small businesses for up to 25 licenses.

  • 1-25 licenses
  • Additional team storage for collaboration
  • 100 GB per license
  • For personal & business use
  • Verified & patented HVKM technology
  • Local file encryption
  • 1 month file recovery
  • Strict data access policy
  • Unlimited data transfer
  • Secure server infrastructure
  • 24/7 support

Custom

$

Custom plans for larger teams

Need a non-standard offer for an enterprise?
We will prepare a dedicated plan for your organization.

  • For more than 25 licenses
  • Additional team storage for collaboration
  • 100 GB per license
  • For business use
  • Verified & patented HVKM technology
  • Local file encryption
  • 1 month file recovery
  • Strict data access policy
  • Unlimited data transfer
  • Secure server infrastructure
  • 24/7 support
  • Integration and development support
  • Full training for end-users and admins
They take privacy seriously

  • Dell
  • IBM Bluemix
  • Ernst & Young
  • WAT
  • Instytut Łączności
GDPR

Get Usecrypt now or cry later

General Data Protection Regulation (GDPR) will change how businesses and public sector organizations process and handle data and information about customers.

This European Union law will come into force on May 25, 2018. If there is a security breach in data administration, an organisation can be fined up to €20 million. That’s quite a lot. To avoid leaks, data must be encrypted. Efficiently.

Learn how