image image Home Free Trial Products Download Online Store Backup Account Login Support About Us image
Online Store
Store Home
Standard Edition
Professional Edition
Express Edition
Professional Upgrade
Exchange Mailboxes

Become a Partner
Partner Enrollment
Partners Only Catalog

Backup To The Web – “Secure, Robust and Reliable”

Secure 128-bit SSL communication

All communications between Backup To The Web and your computer are transported in a 128-bit SSL (Secure Socket Layer) channel. Although all your backup files travel through a public network (internet), eavesdroppers have no knowledge of what has been exchanged.

Backup data securely encrypted

All of your files are first zipped and encrypted with your defined encrypting key before they are sent to Backup To The Web. To all people but you, your files stored on Backup To The Web are no more than some garbage files with random content.

We don’t keep your encrypting key

The encryption key used to encrypt your files resides only on your computer and is known only to you. It is never transmitted anywhere across the network. If this key is lost, all backup files can never be recovered. Therefore, although we have access to all files you stored on our backup server, we have no knowledge of the content of the files you stored.

Reminder: Please make sure you write down your encryption key in a safe place where it will never be forgotten. Otherwise, you will never be able to recover your backup files.

Best encryption algorithm is used

We give you several encryption possibilities, including 128-bit Twofish. It is a block cipher designed by Counterpane Labs. It was also one of the five Advanced Encryption Standard (AES) finalists chosen by National Institute of Standard and Technology (NIST). It subjects to frequent public reviews but no known attack against this algorithm has been reported.

You have a choice of encryption algorithms: Twofish, Triple DES, or Advanced Encryption Standard (AES).  We recommend the use of AES as it has been chosen as the encryption standard for commercial use. Please refer to references on Cryptography for more information about encryption algorithms.

You also have a choice of encryption modes: Electronic Cook Book (ECB) or Cipher Block Chaining (CBC).  We recommend the use of CBC mode as it offers better security. Please refer to references on Cryptography for more information about encryption modes.

A random initializing vector, salt and iteration count will be generated automatically for each file when encrypting your data.

Require 1.99 x 1016 years to crack the 128-bit encryption

A 128-bit key size has 2128  or around 3.4 x 1038 possible combinations. Even if you have the world’s best supercomputer at 54 teraflops*, it would take 8.77 x 10 years to test all combinations. Assuming it just needs one computer operation to test a possible combination, to use brute force attack (checking all combinations) on this encryption algorithm. It would take:

3.4 x 1038
-------------- seconds, or about 6.3 x 1023 seconds.
54 x 1012

That’s about 199,654,245,823,702,952 years to successfully try all combinations. That’s assuming that the supercomputer can test one combination per computer operation, which it can’t. You can be sure that your data stored on our server is 100% secured.

*Source: Oak Ridge National Laboratory

Restrict access to data by IP addresses

You can also restrict access to your backup files from the set of IP addresses you define. If someone tries to access your data from an IP address not on your defined list, their access will be denied. This additional security ensures backup files are not open to all locations even if the username and password are known.

For your reference:

Go Back