As part of our Public Preview & Technology Review, we’re working with security experts to develop detailed documentation on Lockify’s security model. This will be posted in a rolling manner over the coming weeks. In the meantime, we’re providing the following security overview. We welcome feedback and questions at security@lockify.com.
Lockify takes a layered approach to security. Rather than relying on any single measure, wherever possible we combine complementary measures to create as secure a solution as possible.
Every time you or your business sends a confidential message online, copies of it are made on your end, the recipient’s end and at multiple points in between. These copies multiply and exist forever, compromising your, your customers’ and your partners’ privacy and security. Frequently, these insecure communications violate a variety of laws and regulations, exposing your business to stiff fines and other penalties, as well as risking public relations disasters.
Some people are under the misunderstanding that SSL (HTTPS) is all the protection they need for their confidential messages. SSL is valuable (Lockify uses it as one of our layers of defense), but only for protecting your messages “in transit.” It doesn’t protect them “at rest,” and therefore all the aforementioned copies still get made.
With Lockify, your confidential messages are encrypted on your machine and decrypted on your recipient’s. Lockify servers can’t decrypt your messages. Decryption requires two things, the encrypted info and the key. Lockify only ever possesses one of these while the other is embedded in your Lockify Link. Here’s a diagram illustrating a typical (but simplified) use of Lockify:
As part of our Public Preview & Technology Review, we’re working with security experts to develop detailed documentation on Lockify’s security model. This will be posted in a rolling manner over the coming weeks. In the meantime, we’re providing the following security overview. We welcome feedback and questions at security@lockify.com.Lockify takes a layered approach to security. Rather than relying on any single measure, wherever possible we combine complementary measures to create as secure a solution as possible.Every time you or your business sends a confidential message online, copies of it are made on your end, the recipient’s end and at multiple points in between. These copies multiply and exist forever, compromising your, your customers’ and your partners’ privacy and security. Frequently, these insecure communications violate a variety of laws and regulations, exposing your business to stiff fines and other penalties, as well as risking public relations disasters.Some people are under the misunderstanding that SSL (HTTPS) is all the protection they need for their confidential messages. SSL is valuable (Lockify uses it as one of our layers of defense), but only for protecting your messages “in transit.” It doesn’t protect them “at rest,” and therefore all the aforementioned copies still get made.With Lockify, your confidential messages are encrypted on your machine and decrypted on your recipient’s. Lockify servers can’t decrypt your messages. Decryption requires two things, the encrypted info and the key. Lockify only ever possesses one of these while the other is embedded in your Lockify Link. Here’s a diagram illustrating a typical (but simplified) use of Lockify:
การแปล กรุณารอสักครู่..
