Please Play Fair: What Boxcryptor License Matches Your Requirements?
We provide an overview of our current licensing model with exemplary use cases.
Boxcryptor’s GDPR Journey Part 3: Internal implementation and external data protection officers
This is the third part of our series, describing our journey to GDPR conformity. Our CEO Andrea talks about her way to understanding and implementing the GDPR, here at Boxcryptor.
Save your Crypto Wallet with Boxcryptor
Cryptocurrency: This is how You save coins and tokens securely and encrypt Your currency and private keys.
Shadow IT: How to Prevent Unauthorized Software
Unauthorized software brings a variety of problems. Some of them can be solved with the help of encryption.
Goodbye Windows Phone, Windows RT and Blackberry OS
On the 31st of March we are cancelling the support for Windows Phone, Windows RT and Blackberry.
Boxcryptor’s GDPR Journey Part 2: Optimization of existing processes
This is the second part of our series, describing our journey to GDPR conformity. Our CEO Andrea talks about her way to understanding and implementing the GDPR, here at Boxcryptor.
Meltdown & Spectre: Why Boxcryptor users don’t have to worry (so much)
Phishing – Do Not Enter Login Details Anywhere Flippantly
Christian Olbrich, developer and software security advisor at Boxcryptor, has put together a checklist that helps you detect phishing emails.