Apps with 'Encrypted links' feature

All apps in Apps with 'Encrypted links' feature category. Use the filters below to narrow down your search. 
  1. Tresorit icon
     105 likes

    Tresorit is an end-to-end encrypted file synchronization and sharing solution for desktop and mobile platforms. It secures confidential data and doesn't have access to user's files for maximum confidentiality.

    102 Tresorit alternatives
    Access encrypted documents from any device and stay in sync with your team.

    License model

    Platforms

    • Mac
    • Windows
    • Linux
    • Android
    • iPhone
    • Android Tablet
    • iPad
    Securely share anything within the company, or with clients and contractors.
    Replace attachments with encrypted links. Send files even directly from Outlook with download limit, expiry data and password protection.
    +5
    Keep track of changes and stay safe and productive. Users can roll back to any previous version of a document.

    Top Tresorit Features

    1.  Encrypted Backup
    2.  End-to-End Encryption
    3.  Two-factor Authentication
    4.  Secure File Sharing
    5.  Selective Synchronization
    6.  Cloud Sync
    7.  Real time collaboration
    8.  File Versioning
    9.  File Storage
    10.  Remote URL upload
    11.  Location-based
    12.  Encrypted links
  2. Peergos icon
     12 likes

    Peergos is a secure and private online space where you can store, share and view your photos, videos, music and documents.

    11 Peergos alternatives
    Thumbnails are created upon upload.
Filesystem can be mounted via FUSE and a command line interface also exists.

    License model

    • FreemiumOpen Source

    Platforms

    • Mac
    • Windows
    • Linux
    • Online
    • Self-Hosted
    • Java
    Dark mode is avaiable
    Uniquely, it is possible to stream media within the browser.
    +5
    Custom apps can be added.

    Properties

    1.  Privacy focused

    Features

    1.  Shared Folders
    2.  Shared Calendar
    3.  Ad-free
    4.  PGP Encryption
    5.  Dark Mode
    6.  End-to-End Encryption
    7.  No Tracking
    8.  Decentralized
    9.  Two-factor Authentication
    10.  Development API
    11.  Distributed
    12.  Encrypted links