Strong, extensive and audited end-to-end-encryption (E2EE)
No collection of customers' data
Good company's general stance on customers' privacy
Trustworthy privacy policy
Apps and servers are completely open source
No provision of regular transparency report
Functional range
Usability
Server speed
Mega is located in New Zealand. Founded in 2013, Mega is offered through web-based apps. MEGA mobile apps are also available for Android and iOS. MEGA is known for the largest fully featured free cloud storage in the world with 20 GB storage allocation for free accounts..
Strong, extensive and audited end-to-end-encryption (E2EE)
No collection of customers' data
Good company's general stance on customers' privacy
Trustworthy privacy policy
Apps and servers are completely open source
No provision of regular transparency report
Functional range
Usability
Server speed
Sync is located in Toronto, Canada. Founded in 2011, Sync is one of the leading secure cloud storage services. It offers excellent security and privacy with its end-to-end (zero knowledge) encrypted network, along with large amounts of storage and bandwidth. The web panel is 100 % open source.
Strong, extensive and audited end-to-end-encryption (E2EE)
No collection of customers' data
Good company's general stance on customers' privacy
Trustworthy privacy policy
Apps and servers are completely open source
No provision of regular transparency report
Functional range
Usability
Server speed
ProtonMail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. ProtonMail is based in Genève, Switzerland. Accounts start with 500 MB storage with their free plan. Proton Drive encrypted cloud storage is available in beta.
Strong, extensive and audited end-to-end-encryption (E2EE)
No collection of customers' data
Good company's general stance on customers' privacy
Trustworthy privacy policy
Apps and server are completely open source
Provision of regular transparency report
Functional range
Usability
Server speed
Nextcloud is a suite of free and open-source client-server software for creating your own file hosting services on a private server you control. The only limits on storage and bandwidth are the limits on the server provider you choose. Next cloud is also offered ready to use by several providers, e.g. tab.digital.
Strong, extensive and audited end-to-end-encryption (E2EE)
No collection of customers' data
Good company's general stance on customers' privacy
Trustworthy privacy policy
Apps and server are completely open source
Provision of regular transparency report
Functional range
Usability
Server speed
Cryptee is a cross platform, encrypted and secure home for your private documents, notes, journals, files and photos. Cryptee was launched in 2018 and is located in Tallinn, Estonia, Europe. It works on all your devices and provides a zero-knowledge place to keep all your sensitive digital belongings. With a strong encryption, security and deniability at its core, Cryptee is a unified platform for all your personal privacy needs.
Strong, extensive and audited end-to-end-encryption (E2EE)
No collection of customers' data
Good company's general stance on customers' privacy
Trustworthy privacy policy
Apps and server are completely open source
Provision of regular transparency report
Functional range
Usability
Server speed
Internxt's headquarter is located in Valencia, Spain. Launched in 2017, Internxt is working on building a private Internet. Its first service, Internxt Drive, is a decentralized cloud storage service available for individuals and businesses. It counts with a Mobile, Desktop and Web app. Files uploaded to Internxt's infrastructure are client-side encrypted and fragmented. Internxt counts with its own token, INXT, which acts as a payment method for its node operators, who are distributed all over the globe. Internxt is currently working on two new products, Internxt Photos and Internxt Send.
Strong, extensive and audited end-to-end-encryption (E2EE)
No collection of customers' data
Good company's general stance on customers' privacy
Trustworthy privacy policy
Apps and servers are completely open source
No provision of regular transparency report
Functional range
Usability
Server speed
Since the dawn of History, every society has endeavored to develop a sense of individuality. This is a trait they strived to fulfill in themselves in order to thrive. Today, the individual is a role model and an active participant of his or her society. Individuals radiate an energy that is magnetic. It is this innate ability that has prompted individuals to develop personalities that convey a sense of being unique and valuable.
From a very young age, children are instilled with the concept that there are dangers lurking out there on the Web. Your child should know that to be safe, he or she must learn to protect themselves by not giving out too much information about themselves. It is imperative that children acquire this awareness because it is difficult for them to grow up without having this basic knowledge. The consequence is that children become easy targets for pedophiles and other criminals.
The Internet is a murky region, which is why it is important for children to avoid it. However, this is also why it is important for them to know how to enter the Web safely. Preaching to the converted is easier than one would think; contrary to what most would expect. The concept of Internet safety is more helpful than most would think; it is this concept that is relevant and practical.
One of the most direct and easiest ways of identifying danger is through the means of encryption. Encryption is the process of scrambling electronic data or information so that it is not easily readable to anyone without the required passwords. When the right people have the right tools, encrypted information is unreadable to anyone but the intended recipients.
Encryption is a method of making information or messages secure. The person who has the tools to decrypt the information or message uses a secret code to make it decipherable. This is the key component of Internet security. If the code is ever breached, all related data is lost.
Encryption has improved over the years, thanks to the development of better and more advanced encryption software. The first encryption software was created back in the early 1970s. It was not, however, successful because it was very weak.
This kind of software was very easy to hack and began losing information fast. It was not, however, weak enough to encourage wholesale substitution of other codes for the letters and numbers. This happened too slowly for writing and reading the information to be of any interest.
It took about 15 years for hand written communications to be replaced by electronic ones. It was not, however, easy for computers to interpret this kind of code. After all, computers are not that sophisticated.
The first encrypted computer message was sent in August 1974. It was a scrambled tape with the message "ERRNO VOID". This showed that the first encrypted computer message was actually a message safe.
The first encrypted computer file was a simple note taken from a friend of yours for you to sign when you visit them. It was not, however, safe because someone could easily toss it in the bin without even having to open it.
The second stage of encryption involved taking a message and scrambling it such that it took a hacker a long time to decipher it. This meant that the intended recipient could not decrypt the message without help.
AYEP (Another entity that should have no access to your computer) should be able to decrypt any encrypted file or note, provided that he has the right software or program to do this.
Encryption became a routine part of computer security practice after the war, when the Americans tried to fight the war in computers. They won't have to fight the computers alone, however, because you can't stop the computers from spreading the secrets of their defeats.
To protect your privacy, America's computersecrets, computer virus victims and computer users worldwide have to use encryption.
Fortunately, there are levels of encryption software or programs that will permit you to gain access to files and areas of a computer that for security reasons are deemed unreadable.
The method of encryption used is a very simple and common method known as asymmetric encryption. This means that the encryption is based on the fact that the symmetric encryption code (also know as the key) is available to both the sender and receiver alike.
Asymmetric encryption uses keys only. It does not use passwords or any other type of security measures previously used in file encryption. Using this method means that someone who is not supposed to have access to your files can easily get into your files.
For example, go to your computer and try to copy a file. When you do, a window appears asking you "Why do you want to copy this file?" You can answer yes or no.
If you choose yes, then a black window appears indicating that you can't open that file. But, if you choose no, then you won't be able to copy it at all.
Why bother to encrypt my files?