Richard Caetano
Richard Caetano
21 Feb 2020 · 3 min read

Encryption Explained

A computer screen with code running down.

Photo by Markus Spiske

Both in our homes and in our digital lives, there is one thing we all need - privacy.

Encryption – the Privacy Enabler

At home we feel safe and comfortable knowing that we can keep valuables, conversations and intimate time with loved ones private and secure.

This sense of protection is something we all care about and need. Any idea of a random person listening in, or watching without us knowing, would be disturbing.

Like the physical world, we need this sense of security in our digital lives. There are many things we need to keep private: passwords, search history, chat messages, photos, documents… the list goes on.
Encryption gives us the ability to hide, shield and secure the privacy of our digital lives.

Taking advantage of the special properties that come with prime numbers, encryption allows us to scramble messages in a way that would be impossible to break in millions of years given the computing power we have today.

Without encryption, there can not be any privacy online. Using this protection, our valuable data can be safely stored and made available to who we want, when we want.

How Does Encryption Work?

Encryption is the process of taking documents, photos or files and scrambling them into an unreadable format. As your data often passes across multiple computer systems connected over the internet, the ability to encrypt is essential.

With Akord, the service begins by encrypting all your files before they leave your device. The password you provide to encrypt is never revealed to us. You can be sure your files are safely stored and transmitted to the recipient.

Once the recipient is notified, they are able to unlock the file with the password you’ve provided them. The same password will allow their computer to decrypt the scrambled data along with the consent rules, resulting in them having access to the original file.

Akord uses various encryption methods, enabling you and your receiver to share documents, contracts, photos and more, without the risk of anyone in the middle having access, not even us.