With everbase you sync your data and keep your privacy. Other public cloud providers are authorized to access your data and grant other third parties access at any time. They often advertise the encryption of your data; but this encryption protects your data only from illegal access from other third parties. However, you have transferred your data to these providers and for many different reasons theses providers have to access your data or grant other third parties access to your data. Everbase is different. You can use everbase solely on your own hardware, within a hosted environment or as a combination of the two. And no matter which environment you choose, only you have access to your data – neither everbase nor any other third party has access to your data. Also, you don’t need a bachelor in computer sciences to install and manage the software, it’s easy. With just a few clicks the software is ready to use. Any problems? We’re happy to help. Contact us via our contact form! Contact us via our contact form!
Everbase is a young company and the structure of the software allows numerous expansions and additional features. Soon, we plan to include multi-server configuration and later on full grid capability, meaning each device can connect with other registered devices and a central server is no longer necessary. A roadmap containing a more detailed development plan will be published soon.
Everbase knows the name and address of its customers (which is not unusal), the type of license and number of users for proper billing. Everbase has no knowledge what so ever of the data which is handled with everbase by the respective customers. It is impossible for us to decrypt the locally stored data or tap the encrypted transmission. We couldn`t do it, even if asked by our customers or governmental authorities.
Currently we support Windows 7, 8, 8.1, 10, 2008, 2008 R2, and 2012.
Internally we have used everbase on MacOS, but prioritized Windows support. Everbase will be running on Macs soon. If you need everbase now and are a MacOS user, please contact us.
Not very long, if you have done it before. After installation, our QA testers need less than 2 minutes until the first file synchronization starts. Our tutorial videos help you to start using everbase.
Yes, each device can be connected to multiple domains.
Yes, we would be glad to help you set up everbase – just contact us if you have any problems.
Local read and write operations are primarily limited by hard-drive speed, then by CPU speed (due to encryption and decryption). With slow internet connections, the upload and download speeds are limited by the internet connection (up to ~2MB/s upload, so most home connections). With faster connections, the CPU will be the bottleneck due to work performed for end-to-end communication encryption. On a server dealing with many clients, the CPU will likely be the bottleneck.
We recommend a 3 GHz Dual-Core CPU and 2GB RAM for clients. For servers, we recommend a 3.5 GHz Quad-Core CPU and 4GB RAM. Important: Windows XP and Windows Vista are not supported.
When stored locally on your harddrive, data is encrypted with 256-bit AES encryption. For verification, 2048-bit RSA keys and SHA256 hashes are used. Network connections are encrypted and authenticated using Ed25519 keys, followed by ChaCha-Poly1305.
- Device Keys
- Public-Private Ed25519 Key Pair
- Private keys are kept on the individual device, while public keys are shared with all other devices.
- User Keys
- Public-private RSA key pair
- Private keys of users that are created by an administrator are encrypted, then stored in the domain object (and thus on all devices in their encrypted form). This database can only be decrypted by administrators, and is used to allow login of users on new devices.
- Private keys of users that join the domain with a "Create User and Join Domain” are not added to the domain object. These keys are only located on the device where they are created.
- File Keys
- Keys used to encrypt file content are encrypted with the public key of each user that has access to the file. In this encrypted form, they are located on all devices where the file is located.
- Users created by an administrator:
- Username, salted password hash, and RSA key pair for the user are stored in the domain object (and thus on all devices). This data is, like all data, encrypted and only readable by users with permissions to do so (administrators).
- This enables password reset and login on new devices.