Skip to content

Cryptomator

Basic Information

  • Tool Name: Cryptomator
  • Category: Encryption
  • URL: https://cryptomator.org/
  • Description: Designed to provide client-side encryption for files stored in the cloud
  • Status: Active

Core Features and Compatibility

  • Core Features: Local-First Encryption, Cross-Platform Support, Zero-Knowledge Architecture, Vault Recovery, Cloud Storage Integration, AES-GCM Encryption, Password Protection, File Content and Metadata Encryption, Multiple Language Support, Mobile Apps
  • Operating Systems: Windows, macOS, Linux, Android, iOS
  • Offline Functionality: ✅
  • Mobile Support: ✅
  • Languages Supported: Over 50 languages including Chinese (Simplified and Traditional), Japanese, and Korean
  • Technical Level: Beginner

Security and Privacy

  • Security Features: End-to-End Encryption, AES-GCM (256-bit), ECDH-ES for Key Exchange, PBES2-HS256+A128KW for Key Derivation, Zero-Knowledge Architecture, Metadata Encryption, No Third-Party Trackers, Plausible Deniability, Local Encryption Processing
  • Data Collection Level: Minimal
  • Security and Privacy Rating: ⭐⭐⭐⭐☆ (4.20)

Deployment and Technical Details

  • Deployment Architecture: A standalone software - Runs entirely locally (e.g., runs on computer and doesn't depend on external server)
  • License: GPLv3
  • Cost: Free Core

Maintenance and Support

  • Maintenance Status: Updated weekly/monthly with very responsive development team. Funded by Skymatic GmbH (core development company) and user contributions through direct donations, GitHub Sponsors, and app store purchases. No major NGO or government funders. 390k+ downloads and daily users.
  • Community Support: ✅
  • Maintenance and Sustainability Rating: ⭐⭐⭐⭐⯪ (4.60)

Performance and Ratings

  • Operational Functionality: ⭐⭐⭐⭐⭐ (5.00)
  • Usability: ⭐⭐⭐⭐⯪ (4.30)
  • Effectiveness and Reliability: ⭐⭐⭐⭐☆ (4.00)
  • Overall Rating: ⭐⭐⭐⭐⯪ (4.34)

Documentation & Testing

  • Full Documentation: Cryptomator Documentation
  • Version Tested: 1.15.3
  • Date Tested: 2025-04-22
  • Testing Environment: HP Envy x360, 13th Gen Intel(R) i7 processor, 16 GB RAM, Windows 11, Network: 4G

Additional Information

  • Limitations and Vulnerabilities: No built-in syncing (relies on third-party cloud sync clients), Paid features for mobile apps (iOS and Android require one-time purchase), Vaults need to be manually created in cloud storage, No built-in circumvention tools, Potential metadata leakage if server traffic is monitored
  • Additional Notes: Particularly valuable for civil society organizations in authoritarian environments as it encrypts files locally before cloud storage, requires no registration or cloud-based logins, works across diverse platforms, and prevents data interception through local encryption/decryption. Its decentralized nature makes it harder for governments to block or disrupt.

Submission Information

  • Submitted By: adequatej
  • Submission Date: 2025-05-06
  • Last Updated: 2025-05-06