Protect your files with end-to-end encryption
Stay safe with the world’s best data security method
What does end-to-end encryption mean?
End-to-end encryption is a method of connecting two or more parties so no outsiders can spy on them. As you can imagine, this technology is priceless for government spies. However, nowadays, end-to-end encryption finds more and more uses in everyday situations, like messaging a friend or sharing sensitive information.
The truth is, the more people and devices go online, the more we need secure and private means of communication, like end-to-end encryption, or E2EE.
Who can benefit from end-to-end encryption?
Because of a few fortunate accidents, the public is now much more aware of the scope of data collection, surveillance, and profiling that is happening with every single click online. End-to-end encryption is the technology that gives all the power back to users, who can now decide what they want to share with the world and what should stay private.
End-to-end encryption is incredibly important for any kind of communication: audio, video, data sharing, and more. It provides security to journalists and whistleblowers. It's also a way for businesses and government institutions to communicate with clients and protect their data from hackers. Even ordinary consumers can use end-to-end encryption to enhance their privacy and defend themselves from snoopers, algorithms, and low-ethics brands.
How does end-to-end encryption work?
End-to-end encryption secures a message between two devices, or endpoints. The question is: how is it possible to secure something so that two people, and no one else besides them, have the password to access it? The answer is in key exchange.
Key exchange is an essential part of communication that allows it to stay private. Thanks to asymmetric encryption algorithms, parties never expose the whole encryption key during the exchange because its part, or a public key, is enough.
The sender encrypts a message using their secret key with the recipient’s public key and sends it to the recipient. The message can be decrypted using the sender’s public and the recipient’s secret keys. Simply knowing someone’s public key isn’t enough to decrypt the message, which prevents any third party from interfering with the communication.
How does NordLocker use end-to-end encryption?
If you want to share files securely via NordLocker, end-to-end encryption will make sure that only the intended recipient will be able to access them. You can exchange keys by granting the person permission to access your locker. To do that, right-click on one of your local lockers and select Share locker. Then, enter the recipient’s email address and click Add.
If the person you’re sharing your locker with is a NordLocker user, you will exchange keys. If not, we’ll lead them through the account registration and help you exchange keys then.