In April 2021, while researching how to develop an end-2-end encryption plugin for OnlyOffice web using the Seald E2EE SDK, we at Seald reviewed the source code of the plugin developed for OnlyOffice Desktop and found some weaknesses in the way the E2EE was implemented.
Seald.io offers an SDK that allows you to do end-to-end encryption, with advanced management features, without any priorcryptographic knowledge. This SDK can be integrated into web, backend, mobile, or desktop applications.
> Timothée Rebours, Seald: “it’s now nearly impossible to protect or even define the perimeter as everything's so intertwined” With the number of connected devices and users growing by the minute, securing large amounts of sensitive data becomes increasingly more difficult. As more aspects of our lives become digitized, many companies and institutions providing online services start to struggle with ensuring their user data is safe. Sure, implementing quality authentication measures or encrypti
If you want to play with the final project, you can find it on our Github repository seald/sdk-upload-example [https://github.com/seald/sdk-upload-example/], with instructions to run it on Docker. Be careful, this is a demonstration project, which comes with no guarantee and needs some improvements to be used in production. An end-to-end encrypted file sharing application There are many file sharing applications (WeTransfer, OneDrive, Dropbox, ...). However, how do these platforms ensure the co
On June 18, 2021 the European Data Protection Board (the assembly of European data protection authorities) published its recommendations on supplementary measures to be applied to ensure compliance with the GDPR for data transfers outside the European Union.
On July 16, 2020, the CJEU ruled that the Privacy Shield that regulated transfers between the EU and the US does not comply with the GDPR, making it illegal to transfer personal data to the US without strict precautions.
Crypto-shredding is a data destruction technique that consists in destroying the keys that allow the data to be decrypted, thus making the data undecipherable. Difficulty of data destruction Data destruction is a major issue in data protection regulations such as the GDPR in the context of exercising an individual's right to erasure. When a company exercises a person's right to erasure, it must search all databases, all object or flat storage, all logs (and their backups) to find all occurrenc
End-to-end encryption can be complex and expensive to redevelop, although it is essential to protect the confidential data your applications handle. With Seald SDK, we perform end-to-end encryption on data stored, produced or received by your applications.
The concept of digital sovereignty has been gaining momentum lately. Where do we stand in France and what actions are we taking to limit our dependence on foreign digital products and services?
At a time when economic and digital sovereignty are at the heart of concerns, at Seald we are proud to announce that our product has a Security Visa from the ANSSI with a CSPN.
Doctolib, Zoom... The recent news allows us to take stock of the interest in adopting end-to-end encryption and to highlight its usefulness in securing uses in the Cloud.
On Tuesday the 23rd of August 2016 [https://www.liberation.fr/france/2016/08/23/tandem-franco-allemand-pour-renforcer-l-arsenal-antiterroriste-europeen_1474164] , Interior Minister Bernard Cazeneuve received his German counterpart, Thomas de Maizière, to exchange views on the control of data encryption means to strengthen the means of the fight against terrorism. Some politicians, including Mr. Cazeneuve, demand against the unanimous opinion of experts that every message transmitted on the Inte