Zero-knowledge, end-to-end encryption is the best way to ensure users’ online security and data privacy. End-to-end encryption means all the encryption happens on your device so all your files leave your phone or computer already encrypted. Even your passwords are encrypted and hashed in your device before being stored on the cloud. This means in case of a cyberattack hackers can only see your hashed passwords which are very hard to decode. Nevertheless, we encourage you to have a strong password. The stronger it is, the harder for hackers it will be to decode your password and get access to your account.
End-to-end encryption is also crucial in cases when admins’ login details are leaked. If an app uses server-side encryption and the system admin gets hacked, hackers can possibly access and decrypt users’ passwords no matter how strong of a password you have. This might happen because server-side encryption means encrypting and decrypting the files on the service provider’s servers. The system admins can have the encryption keys which means hackers will easily get access to your files and passwords.
In case of end-to-end encryption, if the system gets hacked hackers will get a bunch of encrypted files that are impossible to decode without the encryption keys. This is the reason end-to-end encryption should be mandatory for truly secure apps. Basically, your files are being encrypted on your device and only you get the key to them so the provider has no access and possibility to see the content.
Of course, users’ can’t just rely on app security and have to think of strong passwords. Data breaches may provide access to users’ hashed credentials and weak passwords could be decrypted.
You already know how important it is to take care about your online privacy, even if you think you have nothing to hide. It’s even more important to be cautious when it comes to sharing your personal files with different cloud-based service providers. You trust the app to keep your personal files safe and the last thing you want is to have your files leaked or learn that the provider has access to your data and is scanning your photos and videos. Whether you store the pictures of your family or your tax returns, you must have the right to data privacy.