Data Security

Data Security and End-to-End Encryption
A mode of communication in which no one else but the end-users can access and read the data can be achieved with the use of end-to-end encryption. At DOKY, this simply means that data can only be read by the client. No third Party!
In the event of a security breach, whether intentional or inadvertent, data is always protected due to its encryption and only the client possesses the encryption keys. This makes end-to-end encryption the best and most important form of data security.

The Crucial Protection
Our end-to-end encryption at DOKY provides crucial protection for your most private data. Make use of it to protect copies of your passwords, information of bank account, driver’s license or passport. Employees of organizations should be required to keep parts of their most confidential data client-side encrypted. Confidentiality of strategic documents, researches or customer information is assured.

Email Encryption
Even when on stored on the DOKY servers, all emails are encrypted. At every point of transmission from the client’s device to the cloud and vice versa, every email is always encrypted. This ensures that even when there is a breach, the contents of the emails are still secure and cannot be read by a third party.

Encryption Keys
This process begins from the client side. Whenever the encryption password is entered on the client’s device, the encryption keys are generated. The client’s private encryption key which is stored on the browser is decrypted by the encryption password. Therefore, it is important to make your encryption password as strong as possible.

Server Encryption and Anonymity
At DOKY, we make sure every client data are server encrypted. With the use of your private encryption key, every message you send to the server is encrypted. Since we do not have access to your encryption key, we, therefore, cannot decrypt your messages.
So be rest assured, your privacy is guaranteed.

Open Source Cryptography
Our end-to-end encryption is done with open source libraries. This is to ensure that our encryption algorithms we are using do not have built in back doors.
We want everyone to see that DOKY mail does what it is meant to do in the right way and that there are no security holes.

Advertisement free
We do not display ads!
At DOKY, we believe anyone’s private thoughts should NOT be spied on; this is why we accept absolutely no information from you and we also do not track you for advertising or marketing purposes.
Our end-to-end encryption helps guarantee that data mining your private communications would be impossible and your data would never be sold to a third party.

Ease of Use
At DOKY, we understand that a major aspect of security is its simplicity, therefore, you do not have any issue with account management, cipher configurations or cloud access grants. All you need to do is to see your password and you are good to go.
DOKY Mail can be used on every device without installing any software and emails are secure and fully compatible with other email providers. The ease of use due to major features such as offline encryption keys, 24 hours support as well as the seamless integration makes DOKY end-to-end encryption the perfect protection for your data.

Enterprise-grade End-to-End-Encryption
Asides from the easy to use approach that DOKY offers, we also provide a well-integrated file sync as well as an exceptionally layered security approach (SSL). Our solution provides profound infrastructure integration to support every storage technology in addition to a powerful end-to-end encryption as well as a server side encryption both of which are used in a subtle manner.