Security Documentation
Deep dive into Cryptomator's security architecture, encryption methods, and best practices for keeping your data safe. Understand the cryptographic foundations and security principles that protect your files.
Security Target
Cryptomator was designed to solve privacy issues when saving files to cloud storages.
Security Architecture
Virtual Filesystem {/ #virtual-filesystem /}
Cryptomator Hub
Cryptomator Hub facilitates asymmetric encryption to allow sharing the key material used in Cryptomator vaults between multiple parties.
Vault Cryptography
File Header Encryption {/ #file-header-encryption /}
Best Practices
Sharing of Vaults {/ #sharing-of-vaults /}
Verify Installer Signatures
If you are not sure whether an alleged Cryptomator installer is legitimate, you can verify its authenticity and integrity.