

Our goal since the beginnings has been to respond to the growing demand for privacy and security and create a service that enables users to fully control what happens to their data due to the built-in end-to-end encryption and other security and control features.įor non-technical heads like me, many important differences between Tresorit and other solutions are not understood because of terminology. Also, numerous mega breaches showed that hackers are increasingly after the information stored in the cloud.

Shortly after we started working on Tresorit, our fears proved to be real: Edward Snowden revealed how easily global authorities can get access to tons of user data. However, we also knew how easy it is to get access to the data stored online. We saw that the cloud is a convenient way to store and share files. We started Tresorit seven years ago because we couldn’t find a cloud storage service that we trusted. I wanted to know first why did Tresorit choose to differentiate themselves from other cloud storage solutions. In the present, Istvan focuses mostly on the company’s strategy and business decisions. He is a cryptography engineer, computer scientist and entrepreneur. In the beginnings of the project, Istvan wrote parts of Tresorit’s encryption code. What makes the difference and how do these differences impact the cloud user? I spoke to Istvan Lam, co-founder & CEO of Tresorit, the end-to-end encrypted file sync & sharing company. This also means that some cloud services are, privacy-wise, a better option than others. But not all computers are the same – some are more secure than others. Surely a high percentage of this article’s readers already know that in reality there is no magic cloud, instead just other people’s computers. With cloud computing being the sector developing most in the IT industry, close to all Europeans have their data hosted by a cloud storage service.
