Security Documentation
Deep dive into Cryptomator's security architecture, encryption methods, and best practices for keeping your data safe. Understand the cryptographic foundations and security principles that protect your files.
📄️ Security Target
Cryptomator was designed to solve privacy issues when saving files to cloud storages.
📄️ Security Architecture
Virtual Filesystem
📄️ Cryptomator Hub
Cryptomator Hub facilitates asymmetric encryption to allow sharing the key material used in Cryptomator vaults between multiple parties.
📄️ Vault Cryptography
File Header Encryption
📄️ Best Practices
Sharing of Vaults
📄️ Verify Installer Signatures
If you are not sure whether an alleged Cryptomator installer is legitimate, you can verify its authenticity and integrity.