Cypherdog
Cypherdog. Secure encryption. Secure communication
Project title
Cypherdog
Name of Beneficiary/Beneficiaries
Cypherdog Sp. z o.o.
Name of programme
SMART GROWTH OPERATIONAL PROGRAMME
Competition
BRIdge Alfa
Project value
PLN 1,000,000.00 - budget
Funding value
PLN 800,000.00 - NCBR (SG OP)
PLN 200,000.00 - the Fund
Project delivery period
1 July 2019 - 30 March 2020
Meet our team
View the results of our work
What problem is addressed by the project?
The development of any country in numerous spheres depends on the level of cybersecurity, while counteracting threats in this areas belongs to one of the most desired skills. Polish companies have the ability to outdistance major players in this field, and we want to be the best. PHOTO 02 - We provide a unique solution for data encryption during file sharing between network users.
Cypherdog goes six years back, when Sebastian Krakowski, company founder, was preparing the first project involving encrypted cloud for file sharing between users. The issue of cybersecurity came up naturally in the project, although at the time the issue of the extent to which social media, especially Facebook, are spying on us, and how our data can be leaked, were not as widely debated and publicised as they are now. These matters are highly relevant today.
The concept of Cypherdog was born soon after the first start-up was sold to a California-based company. It is true that currently a lot of new start-ups operating in the field of encryption are being established with a view to securing files shared between two parties. However, an exceptional characteristic feature of our projects is the fact that file sharing does not require the presence of a “middleman”. Put most simply, if I need to send someone a file (for instance, financial statements or a report, or other confidential documents), I can open Cypherdog, I have a recipient on an anonymised contact list and I send a document that is encrypted with my own password and my own keys (private and public), and the recipient also must use their own password and key. There are no “middlemen” between me and the recipient, say an “encryption service provider.” There is no one to give us the keys, no - to use a parallel - concierge to keep the private key, which is held only by the sender. Even if hackers attacked the Cypherdog servers on which our files are stored, it would be impossible to decrypt them.
Who uses the project results?
Our project is a global innovation. Except for Australia, in which end-to-end encryption is not allowed by law (although everyone uses Facebook's Whatsapp anyway), similar projects might be of interest to any country in the world.
As of now, we have over 30 sales partners in Poland, Europe and North America, we are entering into new agreements with partners in Europe and America, and Asia is also within our reach. In other words, we will succeed globally by continuing to secure distributors, and they will provide the project to their partners, which support business clients. Looking at the size of the network and the financial scale of this project, the sky is the limit when it comes to its potential to grow, and in more specific terms (the investment funds involved in start-ups need to know the specifics), within 2 years we are planning to enter 80 countries through agreements with major distributors, which are being finalised as we speak. Our solution is a breakthrough which might, or even should, be of interest to anyone concerned with the safety of their digital data.
What was the greatest challenge during project implementation?
The greatest challenge was to prove the validity of the project assumption from the perspective of end users and market needs, which we managed to do in the development stage, thus avoiding the need to devote time to changes. The next challenge was the selection of appropriate developers who understand the complexity of the solution and appropriate person/team members who would be engaged in product marketing. The understanding and the willingness of such person to engage in company activities as CMO is a considerable challenge, as it is extremely difficult to convince and obtain this vital company asset.
Our advice for other applicants
I would advise companies applying under NCBR programmes to remain consistent, persevere and believe in success. These are the simplest and most important things. As far as cooperation with funds is concerned (including those involved in programmes such as
BRIdge Alfa), we need to develop a degree of tolerance against traditional, perhaps a
bit rigid methodologies used to assess the potential of high-risk start-up projects. We also need to assess to what extent a given fund is credible and actually interested in finalising the investment.