

At the most basic level is the free plan, a generous offering that will allow those that are unfamiliar with the platform to get a firm grasp on the fundamentals. On the receiving end, once the invitee approves their invite, the encrypted content will be stored in their own Boxcryptor drive.īoxcryptor offers a free plan as well as two paid plans for individuals (Image credit: Boxcryptor) Plans and pricingīoxcryptor offers a number of subscription options, with choices for both individual users, smaller companies, and business-level enterprise solutions. On the sender’s end, all you have to do is right-click the encrypted content you want to share, select manage permissions, after which you’ll be greeted to a window that will allow you to enter in the email of the person you’d like to share your file with. When it comes time to send a file to someone, the only thing the recipient needs is a free version of Boxcryptor installed on their device.


One of the strongest parts of the Boxcryptor suite is the ability to safely share files with multiple users across several platforms. Best of all, even if someone were able to get their hands on your password, Boxcryptor’s two-factor authentication ( 2FA) will prevent them from successfully logging in to your account.
Boxcryptor review password#
While this offers peace-of-mind when it comes to safeguarding your data, this also means that the company won’t be able to recover your account if you forget the passcode.ĭuring setup, we recommend writing down your master password and storing it in a safe location that only you know about. As a zero-knowledge company, Boxcryptor doesn’t store your login. For starters, all uploads are completely end-to-end, with each encryption utilizing AES-256 and RSA-4096 - the latter making it simple for multiple authorized users to decrypt the same file(s).īoxcryptor accounts are only accessible through a master password that you generate when setting up your membership. As a dedicated encryption suite, Boxcryptor offers a number of top-notch security tools and practices for its users.
