End-to-end encryption means that a computer file being shared is encrypted before it is sent, and it stays encrypted until the authorised recipient decrypts it. It is only then that the contents of the file can be accessed again.

The way things usually work when you send files

Normally a file you share is sent to the recipient in several stages. These stages take place in different parts of the world. To protect the content of the file it is often encrypted.

The problem with this solution is that it is not complete. It is not uncommon for the content to be decrypted at each stage, and then being encrypted again before it is sent on. This means the content are exposed several times and in different parts of the world.

This is better than having no encryption at all. But it still poses a risk of unauthorised people seeing your data. Especially if they have bad intentions.

If you want to make sure no unauthorised person can access you files during transfer, you have to use end-to-end encryption.

End-to-end encryption in practice

In practice, end-to-end encryption means that users have to have software installed on their computer. This client software handles encryption and the so-called encryption keys. This software is the foundation for securely storing and sharing files in the cloud.


End-to-end encrytion using Synkzone

End-to-end-kryptering med Synkzone skyddar din data.

End-to-end encryption is one of the cornerstones of the Synkzone secure cloud storage and sharing service. It is one of the integral parts needed to provide zero knowledge.

The Synkzone cloud service solution is based on software – a client – being installed on all computers used to access the information. The client handles the encrypting and decrypting of data before it is stored in the cloud or shared with another client. The client computers are the end-points in this solution.

Everything is encrypted and decrypted

The contents of the file are only encrypted or decrypted in the client software. In all other places, the information is encrypted. It is encrypted using the AES-256 standard. Furthermore, we encrypt the data in multiple layers, making an already extremely strong solution even stronger.

Like the files, the encryption keys and passwords are handled using the same strong encryption protection.

In addition to the information being encrypted in the client software and staying encrypted while stored in the cloud or being shared, no one else has access to the encryption keys.

You are in full control over your data at all times.




Zero Knowledge


You have full control of your data at any time. You control all encryption keys and user accounts. Nobody unauthorised can access your data. There are no back doors.


End-to-end encryption


End-to-end-encryption ensures your data is constantly encrypted when transfering to and from your computer. It can only be decrypted by authorised users.


Multi layer encryption


Synkzone not only encrypts data end-to-end. We also encrypt it several times and in different ways. This makes an already secure solution virtually impossible to hack.


Ransomware protection


Synkzone detects any ransomware attacks at an early stage. When an attack is detected the client is put in quarantine. Once the attack has been addressed all files are recovered.


Private server


With Synkzone all your data is stored in an encrypted format in a private server solution dedicated to your organization. All servers are located in Sweden.


Swedish law


Many traditional cloud storage solutions are governed by US laws. This gives the NSA the right to access all your data without permission. Synkzone is subject to Swedish law.