Security of SimpleumSafe
SimpleumSafe protects your data by:
- Encrypted files and folders
- No unauthorized access from outside
- Encrypted filenames and attributes
- Encrypted cloud
- Encrypted synchronization
- Encrypted backup
- Encrypted photography
- Encrypted scanning
- Encrypted document view
- Encrypted editing of documents
- Encrypted image viewer
- Assistance with password quality
- Passwords are not saved
- Biometric authentication
- Screen protection
- 2-factor authentication (Mac)
- Checking the app for manipulation every time it is started
The security concept of SimpleumSafe with continuous encryption and minimal opening to the outside is unique.
Open Safe with password, Face ID or Touch ID
With SimpleumSafe you can create multiple Safes. Each Safe has its own Safe password. You can only open a Safe and decrypt files with your Safe password.
SimpleumSafe does not save these passwords and cannot reconstruct them. Even Simpleum Media GmbH and its employees cannot reconstruct the Safe password.Therefore, we recommend that you set up the recovery password immediately after installing SimpleumSafe. You can find instructions here.
Recovery Password / Digital Legacy
Just like a real Safe has a spare key, you can also create a recovery password that can be used like a spare key.
You can print out this second password and keep it in a Safe place. If you ever forget your password, you can create a new Safe Password using your recovery password.You can also use the recovery password to access your digital legacy or in case of an emergency. You can give the printout of the recovery password to a person you trust or to a notary, or enclose it with your will.
We recommend that you generate the recovery password immediately after you have created your Safe. You can find instructions here.
Help for a secure password
Even the best encryption algorithm won’t help if the password used is easy to determine. SimpleumSafe evaluates the quality of the password you enter and estimates the time it will take to “crack” your password. This will give you helpful feedback about your password strength.
If an incorrect password is entered into SimpleumSafe, there is a time delay until you can next enter a password (2 seconds for the first failed attempt, then 4 seconds, 8 seconds, 16 seconds, etc.).A secure password protects you from being guessed through careful trial and error. A good encryption algorithm ensures that all options (with AES-256 there are 2^255 options) have to be tried out and that there are no “shortcuts”.
If you would like to find out more about the topic of “secure passwords”, read our blog post.
Lock Safe (e.g. in case of inactivity)
By keeping the safe open but the screen locked, SimpleumSafe ensures your data remains protected while remaining accessible for ongoing tasks. It’s a mix of accessibility and security!
Your data operations do not have to be interrupted. Whether you’re importing large amounts of data or syncing files, these tasks continue seamlessly even when your screen is locked.
Optional 2-Factor Authentication (2FA) - Mac
-
Double Layer Security: Increase security even further with an additional layer. After the password or biometric verification, 2FA intervenes as a second line of defense and requires a unique six-digit code. It is a double check to ensure your safe remains protected.
-
Advanced Security: The biggest advantage of the 2FA feature is its ability to provide an additional layer of security, making unauthorized access extremely difficult. It’s not just about what you know (your password), but also what you have (your second factor).
-
Dynamic Protection: The One Time Password (OTP) is not static; It is a moving target that changes every 30 seconds. This dynamic thwarts any malicious attempt to crack your Safe.
-
User-Friendly: The six-digit OTP is simple and effective, offering the perfect balance between ease of use and security. And since the OTP changes every 30 seconds, the risks of static passwords are eliminated.
-
Compliance and Best Practices: Implementing 2FA aligns with global cybersecurity best practices and can help meet compliance requirements, which is critical for professionals and businesses.
-
Affordable Security: Since no additional hardware is required, this feature is an affordable security upgrade. Your smartphone is your second factor, there are no additional costs.
-
Ensuring your security for the future: As cyber threats evolve, so should your security measures. The 2FA feature is a step towards securing your digital safe against emerging threats.
Nobody else sees your data
Would you like to keep your personal or business data Safe? SimpleumSafe uses strong encryption with AES-256 and is designed for security and confidentiality throughout. Only you can decrypt the data because only you know the password used to encrypt the files in the Safe.
The fastest supercomputers would take longer than the current age of the universe to crack an AES-256 key through trial and error.
Throughout encrypted
In SimpleumSafe, all files are throughout encrypted.
You can edit and change your files and documents in other programs, move, copy and much more. Your files remain encrypted. Even if you view your photos in full screen mode using the image viewer or slide show, your data is and will remain encrypted at all times.
Strong encryption
SimpleumSafe uses the industry standard for strong encryption. All your data is encrypted with AES-256. You use the same encryption technology as banks, governments and industrial companies.
AES-256 (Advanced Encryption Standard with a key length of 256 bits) is arguably the best-researched encryption algorithm and has been considered secure since its inception. It is even approved for use in the highest security level “Top Secret” in the U.S. government approved. SimpleumSafe has an encryption core (Simpleum®Cryptor). Every security operation is performed in the cryptor. The keys are not available outside of the cryptor.
High Security Sync
The entire synchronization of your data is end-to-end encrypted.
To increase security even further, we do not transmit the key file via the cloud. This additional security function protects the synchronization data from attackers. Even if they know their password and managed to steal the data from the cloud, they still don’t have the key file.
Technical information
Would you like to find out more about the security technology used? Fine!
Then read the technical information in the SimpleumSafe Technical White Paper (English).