Tresorit

From Wikipedia, the free encyclopedia

Tresorit
Tresorit logo.svg
Operating systemWindows, macOS, Android, iOS, Windows Phone, Linux
Available inEnglish, French, German, Hungarian, Spanish
TypeCloud storage
LicenseProprietary software
Websitetresorit.com

Tresorit is an online cloud storage service based in Switzerland and Hungary that emphasizes enhanced security and data encryption for businesses and individuals. The Business version offers up to 1TB of storage space per user (the Solo version offers 2TB for one user) and extra security features such as DRM,[1] granular access levels and other functions, which Tresorit cites to creating a safer collaborative environment.[2] Tresorit's service is accessible through client desktop software, a web-based application and mobile apps.[3] Currently, the software is available for Windows, macOS, Android, Windows Phone 8, iOS, and Linux.[4] Currently as of 2021, Swiss Post owns a majority stake in the cloud storage service. Tresorit works as an independent entity under Swiss Post.[5]

History[]

Tresorit was founded in 2011 by Hungarian programmers , who remains CEO, , who is currently CIO and , who is the CPO of the company.[6]

Tresorit officially launched its client-side encrypted cloud storage service after emerging from its stealth beta in April 2014.[7]

In August 2015, Wuala (owned by LaCie and Seagate), a pioneer of secure cloud storage, announced it was closing its service after 7 years, and recommended their users to choose Tresorit as their secure cloud alternative.[8][9]

By the end of 2016, Tresorit launched a beta of the software development kit (SDK) ZeroKit.[10] In January 2017, Apple's SDK project CareKit announced the option for mobile app developers using CareKit to integrate ZeroKit, enabling zero knowledge user authentication and encryption for medical and health apps.[11][12]

Technology[]

Tresorit claims to encrypt files using client-side encryption with AES-256 before uploading them. Files are also secured by HMAC message authentication codes applied on SHA-512 hashes.[13]

"Tresors" (German for safes) are encrypted counterparts of uploaded directories. Tresors automatically sync with the cloud as files are added or removed from them, similar to Box.com and Dropbox's desktop software. The main difference between Tresorit and its competition is that Tresorit applies AES-256 client-side encryption to files while they are still local and then uploads them to the cloud. The company claims that due to its end-to-end encryption, users can share protected files and folders with others and work together on them, keeping the documents synced and secure in every step of the process.[14] [non-primary source needed]There are additional layers of security, but the core privacy feature of the service is that the encryption key never leaves the user:[15] Using Zero-Knowledge encryption protocols,[16] Tresorit is not in possession of the users’ authentication data, so the content of files cannot be accessed from their servers nor delivered to authorities upon request.[17]

Hacking contest[]

In 2013 and 2014, Tresorit hosted a hacking contest offering $10,000 to anyone who hacked their data encryption methods to gain access to their servers.[18] After some months, the reward was increased to $25,000 and later to $50,000, challenging experts from institutions like Harvard, Stanford or MIT.[19][20][21] The contest ran for 468 days and according to the company, nobody was able to break the encryption. [22]

Reception[]

Tresorit has received a number of nominations and awards. Up-Cloud Rewards named it one of the top 5 Cloud security solutions for 2012.[23][24] Early 2016, Forbes listed Tresorit's cofounder Istvan Lam among the European "30 under 30".[25] In 2017, Tresorit was listed as finalist in the Cybersecurity Excellence Awards, category Encryption.[26]

See also[]

References[]

  1. ^ "Tresorit Brings DRM To Cloud Data". Forbes. Retrieved 22 February 2016.
  2. ^ Kucan, Berislav. "Tresorit for Business". Help Net Security. Retrieved 22 February 2016.
  3. ^ "Our biggest update yet in 2015 – work securely without installing Tresorit, using your browser". 29 July 2015. Retrieved 11 January 2016.
  4. ^ "Weekend Recap: Intel CEO on iPhone, Handbrake 0.9.9, Tresorit for Mac Teased | Mac|Life". Maclife.com. 20 May 2013. Retrieved 18 June 2013.
  5. ^ "Swiss Post acquires e2e encrypted cloud services provider, Tresorit". techcrunch.
  6. ^ "Management - Tresorit | We encrypt - You share". Tresorit. Archived from the original on 11 June 2013. Retrieved 18 June 2013.
  7. ^ Tresorit opens its end-to-end encrypted file-sharing service to the public
  8. ^ Seagate and LaCie spark security concerns by killing off Wuala cloud storage
  9. ^ Wuala cloud storage to shut down, offers Tresorit as potential new home
  10. ^ "0_kit by Tresorit: End-to-end Encryption for Your App". Retrieved 11 January 2017.
  11. ^ "CareKit + ZeroKit: Protect patient data in the cloud". CareKit. Archived from the original on 12 January 2017. Retrieved 11 January 2017.
  12. ^ Hinchliffe, Emma. "Apple enhances security options for its CareKit apps". Mashable. Retrieved 11 January 2017.
  13. ^ Get 50GB of Free, Encrypted Online Storage from Tresorit
  14. ^ "Cloud Storage Security - Secure Cloud Storage from Tresorit". tresorit.com. Retrieved 9 January 2018.
  15. ^ Tresorit takes on PRISM-provoked worries with encrypted cloud storage
  16. ^ https://tresorit.com/blog/zero-knowledge-encryption/
  17. ^ "Here is Tresorit's first transparency report". Tresorit Blog. 14 December 2017. Retrieved 9 January 2018.
  18. ^ "Secure cloud storage outfit Tresorit posts $10K hacker bounty — Tech News and Analysis". Gigaom.com. Retrieved 18 June 2013.
  19. ^ Hungarian ‘security freaks’: Hack our startup and we’ll give you $25K
  20. ^ Hackers, Here's a Way To Make An Easy $25k
  21. ^ Secure cloud firm Tresorit boosts hacker bounty to $25,000
  22. ^ https://tresorit.com/business/wuala-alternative
  23. ^ UP Cloud Computing Conference-Start Cloud Awards rankings as of October 17, 2012 Archived 30 June 2016 at the Wayback Machine
  24. ^ awards | UP 2012 - Cloud Computing Conference 2012
  25. ^ https://www.forbes.com/pictures/mfg45jmjh/istvan-lam-28/
  26. ^ "2017 Cybersecurity Product Awards - Winners and Finalists - Cybersecurity Excellence Awards". cybersecurity-excellence-awards.com. Retrieved 16 June 2017.

External links[]

Retrieved from ""