You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/comparisons/boxcryptor-alternative.de.md
+59Lines changed: 59 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,6 @@
1
1
---
2
2
type: article
3
+
weight: 2
3
4
4
5
title: "Kostenlose Alternative zu Boxcryptor: Cryptomator"
5
6
description: "Du willst deine Daten in der Cloud verschlüsseln und suchst die beste Alternative? Wir vergleichen für dich Boxcryptor mit der Open-Source-Lösung Cryptomator."
Copy file name to clipboardExpand all lines: content/comparisons/boxcryptor-alternative.en.md
+61-2Lines changed: 61 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,6 @@
1
1
---
2
2
type: article
3
+
weight: 2
3
4
4
5
title: "Free Alternative to Boxcryptor: Cryptomator"
5
6
description: "You want to encrypt your data in the cloud and are looking for the best alternative? We compare Boxcryptor with the open-source solution Cryptomator."
<div class="tooltip tooltip-center rounded-sm shadow-md bg-white text-xs w-max max-w-xs p-2">Opt-in for local account; default settings store your key on Boxcryptor server</div>
# The Best Alternative to Encrypt Your Sensitive Data in the Cloud: Boxcryptor vs. Cryptomator
@@ -308,7 +367,7 @@ Let's now take a look at these features. For this we compare the features again
308
367
<td class="font-p p-4" colspan="3">
309
368
<p class="label-uppercase mb-2">What does that mean?</p>
310
369
<p class="mb-4">The encryption algorithms used are still secure even if the attacker has quantum computers.</p>
311
-
<p class="label-uppercase mb-2">Why is this important for data security?<p>
370
+
<p class="label-uppercase mb-2">Why is this important for data security?</p>
312
371
<p>Some encryption methods are based on mathematical problems that are normally difficult to calculate. For quantum computers, however, they are much less complex. If an attacker has access to a corresponding quantum computer, the encryption of your data is de facto ineffective.</p>
313
372
</td>
314
373
</tr>
@@ -344,7 +403,7 @@ Let's now take a look at these features. For this we compare the features again
344
403
<td class="font-p p-4" colspan="3">
345
404
<p class="label-uppercase mb-2">What does that mean?</p>
346
405
<p class="mb-4">The key derivation function (KDF) is used to derive the cryptographic key from the password you enter. This function must be as complex as possible to prevent bruteforce attacks (randomly trying out combinations of characters).</p>
347
-
<p class="label-uppercase mb-2">Why is this important for data security?<p>
406
+
<p class="label-uppercase mb-2">Why is this important for data security?</p>
348
407
<p class="mb-2">To derive your key from your password, a computer needs 200ms. That sounds short, but it quickly adds up to astronomically high times if an attacker has to try all conceivable passwords. Attackers could, however, use special hardware (so-called ASICs) to try hundreds of thousands of possibilities simultaneously.</p>
349
408
<p>To prevent this, KDFs are used that are memory-intensive ("memory-hard"), i.e. they require a particularly large amount of memory. This makes an attack disproportionately costly and thus unattractive for the attacker.</p>
0 commit comments