What’s the difference to other cloud products?

With everbase you sync your data and keep your privacy. Other public cloud providers are authorized to access your data and grant other third parties access at any time. They often advertise the encryption of your data; but this encryption protects your data only from illegal access from other third parties. However, you have transferred your data to these providers and for many different reasons theses providers have to access your data or grant other third parties access to your data. Everbase is different. You can use everbase solely on your own hardware, within a hosted environment or as a combination of the two. And no matter which environment you choose, only you have access to your data – neither everbase nor any other third party has access to your data. Also, you don’t need a bachelor in computer sciences to install and manage the software, it’s easy. With just a few clicks the software is ready to use. Any problems? We’re happy to help. Contact us via our contact form! Contact us via our contact form!

Upcoming Features

Everbase is a young company and the structure of the software allows numerous expansions and additional features. Soon, we plan to include multi-server configuration and later on full grid capability, meaning each device can connect with other registered devices and a central server is no longer necessary. A roadmap containing a more detailed development plan will be published soon.

Honestly, what does Everbase know about me and my content? What could Everbase know about me and my content?

Everbase knows the name and address of its customers (which is not unusal), the type of license and number of users for proper billing. Everbase has no knowledge what so ever of the data which is handled with everbase by the respective customers. It is impossible for us to decrypt the locally stored data or tap the encrypted transmission. We couldn`t do it, even if asked by our customers or governmental authorities.

Which operating systems are currently supported?

Currently we support Windows 7, 8, 8.1, 10, 2008, 2008 R2, and 2012.

And what about Mac?

Internally we have used everbase on MacOS, but prioritized Windows support. Everbase will be running on Macs soon. If you need everbase now and are a MacOS user, please contact us.

How long does it take to set up an Everbase domain with one server and two clients?

Not very long, if you have done it before. After installation, our QA testers need less than 2 minutes until the first file synchronization starts. Our tutorial videos help you to start using everbase.

Can I connect to multiple domains to separate private and business data?

Yes, each device can be connected to multiple domains.

Is there a support team to help me implement everbase in my company or to provide some consulting?

Yes, we would be glad to help you set up everbase – just contact us if you have any problems.

What is the bottleneck in upload and download speeds?

Local read and write operations are primarily limited by hard-drive speed, then by CPU speed (due to encryption and decryption). With slow internet connections, the upload and download speeds are limited by the internet connection (up to ~2MB/s upload, so most home connections). With faster connections, the CPU will be the bottleneck due to work performed for end-to-end communication encryption. On a server dealing with many clients, the CPU will likely be the bottleneck.

What are the minimum system requirements?

We recommend a 3 GHz Dual-Core CPU and 2GB RAM for clients. For servers, we recommend a 3.5 GHz Quad-Core CPU and 4GB RAM. Important: Windows XP and Windows Vista are not supported.

What exactly is encrypted and how?

When stored locally on your harddrive, data is encrypted with 256-bit AES encryption. For verification, 2048-bit RSA keys and SHA256 hashes are used. Network connections are encrypted and authenticated using Ed25519 keys, followed by ChaCha-Poly1305.

How are encryption keys transmitted between devices and where are they stored?
  • Device Keys
    • Public-Private Ed25519 Key Pair
    • Private keys are kept on the individual device, while public keys are shared with all other devices.
  • User Keys
    • Public-private RSA key pair
    • Private keys of users that are created by an administrator are encrypted, then stored in the domain object (and thus on all devices in their encrypted form). This database can only be decrypted by administrators, and is used to allow login of users on new devices.
    • Private keys of users that join the domain with a "Create User and Join Domain” are not added to the domain object. These keys are only located on the device where they are created.
  • File Keys
    • Keys used to encrypt file content are encrypted with the public key of each user that has access to the file. In this encrypted form, they are located on all devices where the file is located.
Where is the login data of users stored?
  • Users created by an administrator:
    • Username, salted password hash, and RSA key pair for the user are stored in the domain object (and thus on all devices). This data is, like all data, encrypted and only readable by users with permissions to do so (administrators).
    • This enables password reset and login on new devices.

We look forward to hearing from you!

We look forward to hearing from you and will be glad to answer any questions as soon as possible!

+49 40 609 4508-0 [email protected] Am Kaiserkai 10, 20457 Hamburg


EVB Everbase GmbH
Am Kaiserkai 10
20457 Hamburg
+49 40 609 450 8-0

Managing Director: Ulrich Dreyer
Registered Court: HRB 146618, Local Court Hamburg
VAT-ID.: DE 285 309 525

Responsible according to press law: Ulrich Dreyer
EVB Everbase GmbH
Am Kaiserkai 10
20457 Hamburg

Copyright photos: Fotolia, Shutterstock

General Terms and Conditions Companies / Customers
Privacy Policy
Instructions on Withdrawal / Model Withdrawal Form