Let's decrypt together the 8 advantages of end-to-end encryption and discover why this technology has become a game changer for applications that collect sensitive data. But before diving into the 8 benefits that end-to-end encryption offers, it's essential to understand the problem this technology can address 🧐. Take the example of a "traditional" messaging application not encrypted end-to-end: During the transmission of a message, the sender sends their message to the application's server,
Seald's Blog
I'm sometimes asked how secure the algorithms used by Seald are, what their "security level" is. In reality, the weakness of a cipher rarely lies in the algorithms used, but in the way they are implemented, or in the way they are combined. We sometimes see projects (even well-known ones) in which developers have implemented encryption, armed with their Crypto 101 course, but rarely end up with a robust mechanism. Unfortunately, implementing encryption isn't just about using AES and having a dec
The original post was written by Sander Goossens, developer at In The Pocket, you can find it here: https://dev.inthepocket.com/posts/2022-02-15-creating-an-encrypted-chat-with-getstream-and-seald-io/ Sander Goossens: Recently, a client came to us asking for a chat solution with encryption support. After some research, we quickly came to a combined solution of GetStream.io and Seald.io. GetStream.io offers real-time chat messaging with a reliable chat infrastructure and feature-rich SDKs. One
On April 6, 2023, Bruno Le Maire (Minister of Economy, Finance and Industrial and Digital Sovereignty) and Jean-Noël Barrot (Minister Delegate in charge of Digital Transition and Telecommunications) announced the winners of the call for projects "Development of cloud office suites for collaborative work", in the framework of France 2030. As you understood, Seald is part of it 🔥 It is alongside Wimi (but not only 😎), that we will take up this challenge. The project has a simple goal: to make
Created in 2016, Recare is a solution that coordinates patient transfer requests between hospitals and healthcare facilities. Example: between emergency rooms and MSO (Medicine, Surgery and Obstetrics) facilities. Present in France 🇫🇷 and in Germany 🇩🇪, the Recare solution: * Reduces the Average Length Of Stay (ALOS) in the facilities * Saves time for medical and administrative teams * Centralizes all transfer requests on a single platform The Recare problem For Charles Cote - CTO @
In April 2021, while researching how to develop an end-2-end encryption plugin for OnlyOffice web using the Seald E2EE SDK, we at Seald reviewed the source code of the plugin developed for OnlyOffice Desktop and found some weaknesses in the way the E2EE was implemented.
Seald.io offers an SDK that allows you to do end-to-end encryption, with advanced management features, without any prior cryptographic knowledge. This SDK can be integrated into web, backend, mobile, or desktop applications.
Timothée Rebours, Seald: “it’s now nearly impossible to protect or even define the perimeter as everything's so intertwined” With the number of connected devices and users growing by the minute, securing large amounts of sensitive data becomes increasingly more difficult. As more aspects of our lives become digitized, many companies and institutions providing online services start to struggle with ensuring their user data is safe. Sure, implementing quality authentication measures or encryptin
If you want to play with the final project, you can find it on our Github repository seald/sdk-upload-example [https://github.com/seald/sdk-upload-example/], with instructions to run it on Docker. Be careful, this is a demonstration project, which comes with no guarantee and needs some improvements to be used in production. An end-to-end encrypted file sharing application There are many file sharing applications (WeTransfer, OneDrive, Dropbox, ...). However, how do these platforms ensure the co
On June 18, 2021 the European Data Protection Board (the assembly of European data protection authorities) published its recommendations on supplementary measures to be applied to ensure compliance with the GDPR for data transfers outside the European Union.
On July 16, 2020, the CJEU ruled that the Privacy Shield that regulated transfers between the EU and the US does not comply with the GDPR, making it illegal to transfer personal data to the US without strict precautions.
Crypto-shredding is a data destruction technique that consists in destroying the keys that allow the data to be decrypted, thus making the data undecipherable. Difficulty of data destruction Data destruction is a major issue in data protection regulations such as the GDPR in the context of exercising an individual's right to erasure. When a company exercises a person's right to erasure, it must search all databases, all object or flat storage, all logs (and their backups) to find all occurrenc
End-to-end encryption can be complex and expensive to redevelop, although it is essential to protect the confidential data your applications handle. With Seald SDK, we perform end-to-end encryption on data stored, produced or received by your applications.
The concept of digital sovereignty has been gaining momentum lately. Where do we stand in France and what actions are we taking to limit our dependence on foreign digital products and services?
At a time when economic and digital sovereignty are at the heart of concerns, at Seald we are proud to announce that our product has a Security Visa from the ANSSI with a CSPN.
Doctolib, Zoom... The recent news allows us to take stock of the interest in adopting end-to-end encryption and to highlight its usefulness in securing uses in the Cloud.
On Tuesday the 23rd of August 2016 [https://www.liberation.fr/france/2016/08/23/tandem-franco-allemand-pour-renforcer-l-arsenal-antiterroriste-europeen_1474164] , Interior Minister Bernard Cazeneuve received his German counterpart, Thomas de Maizière, to exchange views on the control of data encryption means to strengthen the means of the fight against terrorism. Some politicians, including Mr. Cazeneuve, demand against the unanimous opinion of experts that every message transmitted on the Inte