{"id":5486,"date":"2018-04-17T20:39:18","date_gmt":"2018-04-17T20:39:18","guid":{"rendered":"https:\/\/dataethics.eu\/?p=5486"},"modified":"2018-05-07T18:06:06","modified_gmt":"2018-05-07T18:06:06","slug":"tresorit-istvan-lam","status":"publish","type":"post","link":"https:\/\/dataethics.eu\/da\/tresorit-istvan-lam\/","title":{"rendered":"A Swiss Zero-knowledge Cloud Provider"},"content":{"rendered":"<p><strong><span style=\"font-family: Times\\ New\\ Roman, serif;\">INTERVIEW. With cloud computing being the sector developing most in the IT industry, close to all Europeans have their data hosted by a cloud storage service. Surely a high percentage of this article&#8217;s readers already know that in reality there is no magic cloud, instead just other people&#8217;s computers. But not all computers are the same \u2013 some are more secure than others. This also means that some cloud services are, privacy-wise, a better option than others. <\/span><\/strong><span style=\"font-family: Times\\ New\\ Roman, serif;\"><strong>What makes the difference and how do these differences impact the cloud user? I spoke to Istvan Lam, co-founder &amp; CEO of Tresorit, the end-to-end encrypted file sync &amp; sharing company.<\/strong> <\/span><\/p>\n<h5>Why Tresorit as it is?<\/h5>\n<p><span style=\"font-family: Times\\ New\\ Roman, serif;\">In the beginnings of the project, Istvan wrote parts of Tresorit&#8217;s encryption code. He is a cryptography engineer, <span lang=\"en-US\">computer scientist and entrepreneur. In the present, Istvan focuses mostly on the company\u2019s strategy and business decisions. I wanted to know first why did Tresorit choose to differentiate themselves from other cloud storage solutions. Istvan explains:<\/span><\/span><\/p>\n<p lang=\"en-US\"><span style=\"font-family: Times\\ New\\ Roman, serif;\"><i>We started Tresorit seven years ago because we couldn\u2019t find a cloud storage service that we trusted. We saw that the cloud is a convenient way to store and share files. However, we also knew how easy it is to get access to the data stored online. Shortly after we started working on Tresorit, our fears proved to be real: Edward Snowden revealed how easily global authorities can get access to tons of user data. Also, numerous mega breaches showed that hackers are increasingly after the information stored in the cloud. Our goal since the beginnings has been to respond to the growing demand for privacy and security and create a service that enables users to fully control what happens to their data due to the built-in end-to-end encryption and other security and control features. <\/i><\/span><\/p>\n<p><img decoding=\"async\" class=\"wp-image-5501 alignleft\" src=\"https:\/\/dataethics.eu\/wp-content\/uploads\/tresoritCEO.jpg\" alt=\"\" width=\"263\" height=\"282\" srcset=\"https:\/\/dataethics.eu\/wp-content\/uploads\/tresoritCEO.jpg 2640w, https:\/\/dataethics.eu\/wp-content\/uploads\/tresoritCEO-280x300.jpg 280w, https:\/\/dataethics.eu\/wp-content\/uploads\/tresoritCEO-955x1024.jpg 955w, https:\/\/dataethics.eu\/wp-content\/uploads\/tresoritCEO-220x236.jpg 220w, https:\/\/dataethics.eu\/wp-content\/uploads\/tresoritCEO-250x268.jpg 250w, https:\/\/dataethics.eu\/wp-content\/uploads\/tresoritCEO-355x381.jpg 355w, https:\/\/dataethics.eu\/wp-content\/uploads\/tresoritCEO-730x783.jpg 730w, https:\/\/dataethics.eu\/wp-content\/uploads\/tresoritCEO-90x97.jpg 90w\" sizes=\"(max-width: 263px) 100vw, 263px\" \/><\/p>\n<h5>Lost in Translation<\/h5>\n<p><span style=\"font-family: Times\\ New\\ Roman, serif;\">For non-technical heads like me, many important differences between Tresorit and other solutions are not understood because of terminology. Looking through the company&#8217;s webpage, I stumbled upon &#8220;client-side encryption&#8221; and &#8220;zero knowledge protocols&#8221; and I got stuck. So I asked: What do these mean?<\/span><\/p>\n<p><span style=\"font-family: Times\\ New\\ Roman, serif;\"><i>Client-side, or end-to-end, encryption means that we encrypt the user\u2019s files on the user\u2019s device before they are uploaded to the cloud. The encryption keys to encrypt and decrypt these files are never sent to the cloud in a readable format, so our servers never have access to them and to the user\u2019s file contents. This ensures that we have \u201czero-knowledge\u201d of the file contents: we never see files in plaintext, unencrypted format. This technology guarantees that files are readable only for the sender and the recipients, and no third parties beyond them. Even if a hacker or a surveillance body accesses our servers and the encrypted files, they cannot read them. <\/i><\/span><\/p>\n<h5>Businesses and average users<\/h5>\n<p><span style=\"font-family: Times\\ New\\ Roman, serif;\">A-ha! It makes much more sense know. Tresorit makes sure that, even if they wanted to, it would be impossible for them to access users&#8217; stored files. End-to-end encryption allows for these files to be &#8220;sealed&#8221; even before they leave one&#8217;s computer, on their journey to the cloud. As Tresorit is aimed mostly at businesses and freelancers, I wondered what does it mean to choose Tresorit as a business solution.<\/span><\/p>\n<p><span style=\"font-family: Times\\ New\\ Roman, serif;\"><i>Tresorit\u2019s end-to-end encrypted approach provides more privacy and security because it is impossible for us and other third-parties to read the files. Other services use server-side encryption, which means they do the encryption process in the cloud on their servers and can so access encryption keys and the readable files. An analogy that might help showing the difference: with end-to-end encryption you store your credit card and PIN code completely separated from each other, while with server-side encryption you keep them in the same pocket of your wallet. With the upcoming EU data protection regulation, the GDPR, companies need to make sure that they manage the data of their employees and customers in a secure way. Tresorit helps them in this. <\/i><\/span><\/p>\n<p><span style=\"font-family: Times\\ New\\ Roman, serif;\">As 25<sup>th<\/sup> of May 2018 is around the corner, a hosting cloud solution that keeps companies storing practices in line with GDPR might be really helpful hand. But what about the average user? Is end-to-end encrypted file sync and sharing worth considering for personal use? <\/span><\/p>\n<p><span style=\"font-family: Times\\ New\\ Roman, serif;\"><i>Yes, I believe that end-to-end encryption should be the default way how digital services handle user data in the cloud and all users should have automatic access to this technology. I\u2019m happy that thanks to huge services like WhatsApp or iMessage, end-to-end encryption is already used by billions of users worldwide, maybe even without knowing about it. Privacy is crucial for all of us: it is not about protecting something we want to hide but about practicing our fundamental rights. If only those people used end-to-end encrypted services who are at risk, for example NGOs protecting very sensitive data from hackers or surveillance, simply using these services would serve as a red flag and become suspicious. We shouldn\u2019t use secure solutions only when we try to protect something sensitive but all the time. <\/i><\/span><\/p>\n<h5>Trust<\/h5>\n<p><span style=\"font-family: Times\\ New\\ Roman, serif;\">The &#8220;nothing to hide&#8221; argument has been displaced several times, especially in the wake of Cambridge Analytica scandal. When we strip ourselves from privacy, we give unknown entities immense powers. On one hand, avoiding transparency puts individuals into an unfortunate suspicious light. On the other, being transparent about how data is stored and handled is very important in maintaining trust between a cloud storage provider and its clients. <\/span><\/p>\n<p><span style=\"font-family: Times\\ New\\ Roman, serif;\"><i>Even if our end-to-end encryption guarantees that it is technologically infeasible for us or for hackers to get access to the files stored with Tresorit, we work hard on building and maintaining our users\u2019 trust in our service. To maintain our users\u2019 trust that we handle all data with utmost care, we published our <a href=\"https:\/\/tresorit.com\/blog\/here-is-tresorit-first-transparency-report\/\">transparency report<\/a> where we detail what data we access and how we handle them in case we receive government data requests. <\/i><\/span><\/p>\n<p><span style=\"font-family: Times\\ New\\ Roman, serif;\">In the wake of scandals as the one mentioned above and new data protection regulation in Europe, 2018 is a crucial year for privacy advocates. What does Tresorit plan for this period? <\/span><\/p>\n<p><span style=\"font-family: Times\\ New\\ Roman, serif;\"><i>Our short-term goal is scaling up our processes to help even more teams and businesses work securely. We\u2019re always developing new features to meet our customers\u2019 requirements in terms of data control features and compliance. At the same time, we\u2019re also working on finding new ways to make Tresorit\u2019s encryption even more accessible to users all over the world &#8211; but this project is still stealth mode. Besides, we have just started a crowdfunding <a href=\"#\/\">project<\/a> to generate discussion on how end-to-end encryption could help build a privacy-first social network after #DeleteFacebook story. Our goal is to see whether there is a real demand for a privacy-first service like that. <\/i><\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-medium wp-image-5551 alignleft\" src=\"https:\/\/dataethics.eu\/wp-content\/uploads\/tresorit-video-300x195.jpg\" alt=\"\" width=\"300\" height=\"195\" srcset=\"https:\/\/dataethics.eu\/wp-content\/uploads\/tresorit-video-300x195.jpg 300w, https:\/\/dataethics.eu\/wp-content\/uploads\/tresorit-video-220x143.jpg 220w, https:\/\/dataethics.eu\/wp-content\/uploads\/tresorit-video-250x163.jpg 250w, https:\/\/dataethics.eu\/wp-content\/uploads\/tresorit-video-355x231.jpg 355w, https:\/\/dataethics.eu\/wp-content\/uploads\/tresorit-video-730x475.jpg 730w, https:\/\/dataethics.eu\/wp-content\/uploads\/tresorit-video-90x59.jpg 90w, https:\/\/dataethics.eu\/wp-content\/uploads\/tresorit-video.jpg 1000w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p><a href=\"https:\/\/tresorit.com\/about-us\">See the video about Tresorit here<\/a><\/p>\n<p>Istvan Lam is one of the speakers at this year&#8217;s <a href=\"https:\/\/dataethics.eu\/en\/conference18\/\">European Data Ethics Forum.<\/a> The event is held in Copenhagen on the 28th of September 2018.<\/p>\n<p>&nbsp;<\/p>\n<p>[spacer height=&#8221;20px&#8221;]<\/p>\n<p><strong>Read more in this series of short interviews:<\/strong><\/p>\n<p><a href=\"https:\/\/dataethics.eu\/en\/interview-christian-panton-spiir\/\">Spiir&#8217;s Working with Anonymization, Security and Trust<\/a> &#8211; An interview with Christian Panton<\/p>\n<p><a href=\"https:\/\/dataethics.eu\/en\/interview-emil-ivov-jitsi-video-conferencing-snowden\/\">Jitsi Video Conferencing &#8211; Open Source and Privacy enhancing<\/a> &#8211; An interview with founder Emil Ivov<\/p>\n","protected":false},"excerpt":{"rendered":"<p>INTERVIEW. With cloud computing being the sector developing most in the IT industry, close to&#8230;<\/p>\n","protected":false},"author":22,"featured_media":5551,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[230,9,370],"tags":[2301,528,2299],"class_list":["post-5486","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","category-latest-news","category-news","tag-cloud","tag-encryption","tag-tresorit"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Interview: Istvan Lam - Tresorit (end-to-end encrypted file sync &amp; sharing)<\/title>\n<meta name=\"description\" content=\"What makes the difference between cloud storage providers and how do these differences impact users&#039; privacy? I spoke to Istvan Lam, co-founder &amp; CEO of Tresorit, the end-to-end encrypted file sync &amp; sharing company, a found out some answers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dataethics.eu\/da\/tresorit-istvan-lam\/\" \/>\n<meta property=\"og:locale\" content=\"da_DK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Interview: Istvan Lam - Tresorit (end-to-end encrypted file sync &amp; sharing)\" \/>\n<meta property=\"og:description\" content=\"What makes the difference between cloud storage providers and how do these differences impact users&#039; privacy? I spoke to Istvan Lam, co-founder &amp; CEO of Tresorit, the end-to-end encrypted file sync &amp; sharing company, a found out some answers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dataethics.eu\/da\/tresorit-istvan-lam\/\" \/>\n<meta property=\"og:site_name\" content=\"Dataetisk T&aelig;nkehandletank\" \/>\n<meta property=\"article:published_time\" content=\"2018-04-17T20:39:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-05-07T18:06:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dataethics.eu\/wp-content\/uploads\/tresorit-video.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"650\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Andreea M. Belu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@EveDaRib\" \/>\n<meta name=\"twitter:site\" content=\"@dataethicseu\" \/>\n<meta name=\"twitter:label1\" content=\"Skrevet af\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andreea M. Belu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimeret l\u00e6setid\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/dataethics.eu\\\/da\\\/tresorit-istvan-lam\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dataethics.eu\\\/da\\\/tresorit-istvan-lam\\\/\"},\"author\":{\"name\":\"Andreea M. Belu\",\"@id\":\"https:\\\/\\\/dataethics.eu\\\/da\\\/#\\\/schema\\\/person\\\/af0d649c57ae97230a2d6dd2af93cf24\"},\"headline\":\"A Swiss Zero-knowledge Cloud Provider\",\"datePublished\":\"2018-04-17T20:39:18+00:00\",\"dateModified\":\"2018-05-07T18:06:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/dataethics.eu\\\/da\\\/tresorit-istvan-lam\\\/\"},\"wordCount\":1211,\"publisher\":{\"@id\":\"https:\\\/\\\/dataethics.eu\\\/da\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/dataethics.eu\\\/da\\\/tresorit-istvan-lam\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/dataethics.eu\\\/wp-content\\\/uploads\\\/tresorit-video.jpg\",\"keywords\":[\"cloud\",\"encryption\",\"tresorit\"],\"articleSection\":[\"Blog Post\",\"Latest News\",\"News\"],\"inLanguage\":\"da-DK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/dataethics.eu\\\/da\\\/tresorit-istvan-lam\\\/\",\"url\":\"https:\\\/\\\/dataethics.eu\\\/da\\\/tresorit-istvan-lam\\\/\",\"name\":\"Interview: Istvan Lam - Tresorit (end-to-end encrypted file sync & sharing)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dataethics.eu\\\/da\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/dataethics.eu\\\/da\\\/tresorit-istvan-lam\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/dataethics.eu\\\/da\\\/tresorit-istvan-lam\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/dataethics.eu\\\/wp-content\\\/uploads\\\/tresorit-video.jpg\",\"datePublished\":\"2018-04-17T20:39:18+00:00\",\"dateModified\":\"2018-05-07T18:06:06+00:00\",\"description\":\"What makes the difference between cloud storage providers and how do these differences impact users' privacy? I spoke to Istvan Lam, co-founder & CEO of Tresorit, the end-to-end encrypted file sync & sharing company, a found out some answers.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/dataethics.eu\\\/da\\\/tresorit-istvan-lam\\\/#breadcrumb\"},\"inLanguage\":\"da-DK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/dataethics.eu\\\/da\\\/tresorit-istvan-lam\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\\\/\\\/dataethics.eu\\\/da\\\/tresorit-istvan-lam\\\/#primaryimage\",\"url\":\"https:\\\/\\\/dataethics.eu\\\/wp-content\\\/uploads\\\/tresorit-video.jpg\",\"contentUrl\":\"https:\\\/\\\/dataethics.eu\\\/wp-content\\\/uploads\\\/tresorit-video.jpg\",\"width\":1000,\"height\":650},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/dataethics.eu\\\/da\\\/tresorit-istvan-lam\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Hjem\",\"item\":\"https:\\\/\\\/dataethics.eu\\\/da\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Swiss Zero-knowledge Cloud Provider\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/dataethics.eu\\\/da\\\/#website\",\"url\":\"https:\\\/\\\/dataethics.eu\\\/da\\\/\",\"name\":\"Dataetisk T\u00e6nkehandletank\",\"description\":\"Alt om data-etik\",\"publisher\":{\"@id\":\"https:\\\/\\\/dataethics.eu\\\/da\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/dataethics.eu\\\/da\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"da-DK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/dataethics.eu\\\/da\\\/#organization\",\"name\":\"Data Ethics\",\"url\":\"https:\\\/\\\/dataethics.eu\\\/da\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\\\/\\\/dataethics.eu\\\/da\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/dataethics.eu\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logo_yellow.png\",\"contentUrl\":\"https:\\\/\\\/dataethics.eu\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logo_yellow.png\",\"width\":124,\"height\":151,\"caption\":\"Data Ethics\"},\"image\":{\"@id\":\"https:\\\/\\\/dataethics.eu\\\/da\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/dataethicseu\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/dataethics.eu\\\/da\\\/#\\\/schema\\\/person\\\/af0d649c57ae97230a2d6dd2af93cf24\",\"name\":\"Andreea M. Belu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ee29819f5de37a0ee24a99ba111a98579d0d0e99a4f8cc9e86d90f5620861f45?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ee29819f5de37a0ee24a99ba111a98579d0d0e99a4f8cc9e86d90f5620861f45?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ee29819f5de37a0ee24a99ba111a98579d0d0e99a4f8cc9e86d90f5620861f45?s=96&d=mm&r=g\",\"caption\":\"Andreea M. Belu\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/EveDaRib\"],\"url\":\"https:\\\/\\\/dataethics.eu\\\/da\\\/author\\\/andreea-m-belu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Interview: Istvan Lam - Tresorit (end-to-end encrypted file sync & sharing)","description":"What makes the difference between cloud storage providers and how do these differences impact users' privacy? I spoke to Istvan Lam, co-founder & CEO of Tresorit, the end-to-end encrypted file sync & sharing company, a found out some answers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dataethics.eu\/da\/tresorit-istvan-lam\/","og_locale":"da_DK","og_type":"article","og_title":"Interview: Istvan Lam - Tresorit (end-to-end encrypted file sync & sharing)","og_description":"What makes the difference between cloud storage providers and how do these differences impact users' privacy? I spoke to Istvan Lam, co-founder & CEO of Tresorit, the end-to-end encrypted file sync & sharing company, a found out some answers.","og_url":"https:\/\/dataethics.eu\/da\/tresorit-istvan-lam\/","og_site_name":"Dataetisk T&aelig;nkehandletank","article_published_time":"2018-04-17T20:39:18+00:00","article_modified_time":"2018-05-07T18:06:06+00:00","og_image":[{"width":1000,"height":650,"url":"https:\/\/dataethics.eu\/wp-content\/uploads\/tresorit-video.jpg","type":"image\/jpeg"}],"author":"Andreea M. Belu","twitter_card":"summary_large_image","twitter_creator":"@EveDaRib","twitter_site":"@dataethicseu","twitter_misc":{"Skrevet af":"Andreea M. Belu","Estimeret l\u00e6setid":"6 minutter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dataethics.eu\/da\/tresorit-istvan-lam\/#article","isPartOf":{"@id":"https:\/\/dataethics.eu\/da\/tresorit-istvan-lam\/"},"author":{"name":"Andreea M. Belu","@id":"https:\/\/dataethics.eu\/da\/#\/schema\/person\/af0d649c57ae97230a2d6dd2af93cf24"},"headline":"A Swiss Zero-knowledge Cloud Provider","datePublished":"2018-04-17T20:39:18+00:00","dateModified":"2018-05-07T18:06:06+00:00","mainEntityOfPage":{"@id":"https:\/\/dataethics.eu\/da\/tresorit-istvan-lam\/"},"wordCount":1211,"publisher":{"@id":"https:\/\/dataethics.eu\/da\/#organization"},"image":{"@id":"https:\/\/dataethics.eu\/da\/tresorit-istvan-lam\/#primaryimage"},"thumbnailUrl":"https:\/\/dataethics.eu\/wp-content\/uploads\/tresorit-video.jpg","keywords":["cloud","encryption","tresorit"],"articleSection":["Blog Post","Latest News","News"],"inLanguage":"da-DK"},{"@type":"WebPage","@id":"https:\/\/dataethics.eu\/da\/tresorit-istvan-lam\/","url":"https:\/\/dataethics.eu\/da\/tresorit-istvan-lam\/","name":"Interview: Istvan Lam - Tresorit (end-to-end encrypted file sync & sharing)","isPartOf":{"@id":"https:\/\/dataethics.eu\/da\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dataethics.eu\/da\/tresorit-istvan-lam\/#primaryimage"},"image":{"@id":"https:\/\/dataethics.eu\/da\/tresorit-istvan-lam\/#primaryimage"},"thumbnailUrl":"https:\/\/dataethics.eu\/wp-content\/uploads\/tresorit-video.jpg","datePublished":"2018-04-17T20:39:18+00:00","dateModified":"2018-05-07T18:06:06+00:00","description":"What makes the difference between cloud storage providers and how do these differences impact users' privacy? I spoke to Istvan Lam, co-founder & CEO of Tresorit, the end-to-end encrypted file sync & sharing company, a found out some answers.","breadcrumb":{"@id":"https:\/\/dataethics.eu\/da\/tresorit-istvan-lam\/#breadcrumb"},"inLanguage":"da-DK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dataethics.eu\/da\/tresorit-istvan-lam\/"]}]},{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/dataethics.eu\/da\/tresorit-istvan-lam\/#primaryimage","url":"https:\/\/dataethics.eu\/wp-content\/uploads\/tresorit-video.jpg","contentUrl":"https:\/\/dataethics.eu\/wp-content\/uploads\/tresorit-video.jpg","width":1000,"height":650},{"@type":"BreadcrumbList","@id":"https:\/\/dataethics.eu\/da\/tresorit-istvan-lam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Hjem","item":"https:\/\/dataethics.eu\/da\/"},{"@type":"ListItem","position":2,"name":"A Swiss Zero-knowledge Cloud Provider"}]},{"@type":"WebSite","@id":"https:\/\/dataethics.eu\/da\/#website","url":"https:\/\/dataethics.eu\/da\/","name":"Dataetisk T\u00e6nkehandletank","description":"Alt om data-etik","publisher":{"@id":"https:\/\/dataethics.eu\/da\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dataethics.eu\/da\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"da-DK"},{"@type":"Organization","@id":"https:\/\/dataethics.eu\/da\/#organization","name":"Data Ethics","url":"https:\/\/dataethics.eu\/da\/","logo":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/dataethics.eu\/da\/#\/schema\/logo\/image\/","url":"https:\/\/dataethics.eu\/wp-content\/uploads\/2021\/04\/logo_yellow.png","contentUrl":"https:\/\/dataethics.eu\/wp-content\/uploads\/2021\/04\/logo_yellow.png","width":124,"height":151,"caption":"Data Ethics"},"image":{"@id":"https:\/\/dataethics.eu\/da\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/dataethicseu"]},{"@type":"Person","@id":"https:\/\/dataethics.eu\/da\/#\/schema\/person\/af0d649c57ae97230a2d6dd2af93cf24","name":"Andreea M. Belu","image":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/secure.gravatar.com\/avatar\/ee29819f5de37a0ee24a99ba111a98579d0d0e99a4f8cc9e86d90f5620861f45?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ee29819f5de37a0ee24a99ba111a98579d0d0e99a4f8cc9e86d90f5620861f45?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ee29819f5de37a0ee24a99ba111a98579d0d0e99a4f8cc9e86d90f5620861f45?s=96&d=mm&r=g","caption":"Andreea M. Belu"},"sameAs":["https:\/\/x.com\/EveDaRib"],"url":"https:\/\/dataethics.eu\/da\/author\/andreea-m-belu\/"}]}},"_links":{"self":[{"href":"https:\/\/dataethics.eu\/da\/wp-json\/wp\/v2\/posts\/5486","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dataethics.eu\/da\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dataethics.eu\/da\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dataethics.eu\/da\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/dataethics.eu\/da\/wp-json\/wp\/v2\/comments?post=5486"}],"version-history":[{"count":17,"href":"https:\/\/dataethics.eu\/da\/wp-json\/wp\/v2\/posts\/5486\/revisions"}],"predecessor-version":[{"id":5529,"href":"https:\/\/dataethics.eu\/da\/wp-json\/wp\/v2\/posts\/5486\/revisions\/5529"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dataethics.eu\/da\/wp-json\/wp\/v2\/media\/5551"}],"wp:attachment":[{"href":"https:\/\/dataethics.eu\/da\/wp-json\/wp\/v2\/media?parent=5486"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dataethics.eu\/da\/wp-json\/wp\/v2\/categories?post=5486"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dataethics.eu\/da\/wp-json\/wp\/v2\/tags?post=5486"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}