Software Alternatives, Accelerators & Startups

Authy VS Cryptomator

Compare Authy VS Cryptomator and see what are their differences

Note: These products don't have any matching categories. If you think this is a mistake, please edit the details of one of the products and suggest appropriate categories.

Authy logo Authy

Best rated Two-Factor Authentication smartphone app for consumers, simplest 2fa Rest API for developers and a strong authentication platform for the enterprise.

Cryptomator logo Cryptomator

When it comes to saving your files on a cloud server, it is important to ensure the security of those files. Keeping your delicate files out of the wrong hands can save you a lot of time and hassle. Read more about Cryptomator.
  • Authy Landing page
    Landing page //
    2021-10-05
  • Cryptomator Landing page
    Landing page //
    2023-09-12

Authy features and specs

  • Multi-device synchronization
    Authy allows users to sync their 2FA tokens across multiple devices, which provides a convenient way to access tokens from phones, tablets, and desktops.
  • Encrypted backups
    Authy provides encrypted backups of the 2FA tokens to the cloud, ensuring that users can recover their tokens in case of device loss or damage.
  • Offline usage capability
    Authy can generate 2FA codes even when the user’s device is offline, providing access to tokens without requiring an active internet connection.
  • Desktop app available
    Authy offers a desktop application that allows users to manage and use their 2FA tokens directly from their computer, enhancing accessibility and usability.
  • Security features
    Authy includes advanced security features such as PIN protection and biometric login options, adding an additional layer of security to the 2FA tokens.

Possible disadvantages of Authy

  • Dependency on cloud service
    Authy’s cloud-based backup and multi-device synchronization features create a dependency on their cloud service, which may raise privacy and security concerns for some users.
  • Limited customization options
    Compared to some other authentication apps, Authy offers fewer options for custom-tailoring the appearance and organization of the 2FA tokens.
  • Potential for lockout
    If users forget their Authy backup password or lose access to all trusted devices, they may have difficulty recovering their 2FA tokens, leading to a potential lockout of their accounts.
  • Initial setup complexity
    The initial setup process, which includes account verification and device synchronization, may be more complex and time-consuming compared to other simpler 2FA apps.
  • Limited platform support
    While Authy supports major platforms such as iOS, Android, and Windows, it does not have the same broad platform compatibility as some other 2FA solutions, potentially limiting its usability for some users.

Cryptomator features and specs

  • Open Source
    Cryptomator is open source, meaning its source code is available for review and audit by the community, ensuring transparency and trustworthiness.
  • User-Friendly
    The application has an intuitive and easy-to-use interface, making it accessible for users with varying levels of technical skill.
  • Encryption Standard
    Cryptomator uses AES (Advanced Encryption Standard) with 256-bit key length to secure your data, providing robust protection against unauthorized access.
  • Cross-Platform
    It supports multiple operating systems, including Windows, macOS, Linux, iOS, and Android, allowing for seamless synchronization across devices.
  • No Account Required
    Users do not need to create an account to use Cryptomator, enhancing user privacy and data protection.
  • Integration with Cloud Services
    Cryptomator can integrate with various cloud storage solutions like Google Drive, Dropbox, and OneDrive, providing an extra layer of security for your cloud-stored files.

Possible disadvantages of Cryptomator

  • Performance Limitations
    Because files are encrypted and decrypted on-the-fly, the application may experience slower performance, especially for large files or folders.
  • Mobile App Cost
    While the desktop version is free, the mobile apps require a one-time purchase, which might deter some users.
  • No Native Cloud Backup
    Cryptomator itself does not offer native cloud backup services. Users must rely on third-party cloud providers for storing encrypted files.
  • No Live Collaboration Features
    The application does not support live collaboration on encrypted documents, limiting its utility for team-based projects.
  • Compatibility Issues
    Certain cloud providers may occasionally change their APIs or policies, potentially causing compatibility issues until updates are made.

Analysis of Authy

Overall verdict

  • Authy is generally considered a good and reliable two-factor authentication (2FA) app.

Why this product is good

  • Authy is praised for its ease of use, cross-platform support, and strong security features. It provides cloud backup of authentication tokens, which is convenient for users who switch devices. The app supports a wide range of online services, making it a versatile option for enhancing account security.

Recommended for

    Authy is recommended for individuals who seek a user-friendly and secure way to manage their two-factor authentication across multiple devices and platforms. It is suitable for both beginners and experienced users who prioritize security and convenience in their digital security practices.

Analysis of Cryptomator

Overall verdict

  • Cryptomator is a highly recommended tool for individuals seeking a secure and private method of encrypting files before uploading them to cloud storage. It strikes a balance between security and usability, making it appealing for both technical and non-technical users.

Why this product is good

  • Cryptomator is considered good because it provides client-side encryption, ensuring that only you have access to your files. It is open-source, which means its code is transparent and has been reviewed by the community, enhancing its security credibility. It's also user-friendly, allowing seamless integration with cloud storage providers and offering a zero-knowledge architecture, which means even their developers cannot access your data.

Recommended for

  • Individuals concerned about privacy and security of their data in the cloud.
  • Users looking for an open-source, community-reviewed encryption tool.
  • People who need a user-friendly encryption solution that works with various cloud storage services.
  • Those who prefer a service with a zero-knowledge policy, ensuring complete data confidentiality.

Authy videos

How to Use Authy To Keep Your Data Safe

More videos:

  • Review - GOOGLE AUTHENTICATOR vs. AUTHY - (AUTHY WON)
  • Review - Productivity Tuesday Ep#4 -- Authy Two Factor Authentication

Cryptomator videos

Cryptomator Tutorial: Get Started

More videos:

  • Tutorial - How To Easily Encrypt Anything - Cryptomator The Best FREE Encryption Software! (multiplatform)
  • Review - Cryptomator and Nextcloud

Category Popularity

0-100% (relative to Authy and Cryptomator)
Identity And Access Management
Cloud Storage
0 0%
100% 100
Two Factor Authentication
File Sharing
0 0%
100% 100

User comments

Share your experience with using Authy and Cryptomator. For example, how are they different and which one is better?
Log in or Post with

Reviews

These are some of the external sources and on-site user reviews we've used to compare Authy and Cryptomator

Authy Reviews

7 Best Google Authenticator Alternatives For Android And iOS
And another big difference that it provides over the Google Authenticator is the Authy passcode. Using this code, no one will be able to browse through all your codes.
The Best Authenticator Apps for 2023
One of Twilio Authy’s big advantages is encrypted cloud backup. However, it’s somewhat concerning that you can add the account to a new phone using “a PIN code sent via a call or an SMS,” according to Authy’s support pages. There’s also an option to enter a private password or passphrase that Authy uses to encrypt login info for your accounts to the cloud. The password is...
Source: www.pcmag.com
Top 6 Google Authenticator Alternatives in 2023
Although most alternatives to Google Authenticator are completely free but potentially relatively limited in terms of options, Duo can offer you a lot if you’re willing to pay for it. The free option, which Cisco advises is aimed towards individuals and very small teams, is most comparable to what Google offers and will be enough for many, though it faces stiff competition...
Is Authy better than Google Authenticator?
.large-mobile-banner-1-multi-842{border:none!important;display:block!important;float:none;line-height:0;margin-bottom:3px!important;margin-left:0!important;margin-right:0!important;margin-top:3px!important;min-height:250px;min-width:300px;padding:0;text-align:center!important}But to avoid this problem entirely, make sure to add Authy to any devices you want and then Disable...
The Best 2FA Apps 2021: Locking Down Your Online Accounts
As far as website support goes, Authy 2FA tokens work with any service that accepts TOTP-based authenticator apps. Authy even maintains a database of services it supports, complete with step-by-step instructions for how to enable 2FA on those services. In addition to password managers like Keeper, cloud storage like Box and encrypted email services like ProtonMail, Authy...

Cryptomator Reviews

6 TrueCrypt Alternatives for Reliable Data Encryption
Cryptomator is a great free encryption software tool for users looking to encrypt individual files rather than a large volume of data as seen with TrueCrypt or other alternatives mentioned here. This makes sense if you update only a few files regularly and the rest of your files remain relatively unchanged. Cryptomator is supported on Windows, Mac, and Linux operating...
15 Best Rclone Alternatives 2022
With Cryptomator, what you get is a simple digital protection tool. Rclone syncs your files to cloud storage, while Cryptomator syncs and locks your files to cloud storage. Cryptomator gives you access to your files on any device and only you hold the keys to access them.
5 Best TrueCrypt Alternatives - Open source encryption apps
Cryptomator for the desktop works on a pay what you want model. It can be had for free, but users are encouraged to donate towards its development. The mobile apps (which support fingerprint unlock) cost $8.99 at time of writing.
Source: proprivacy.com
16 Tresorit Alternatives
Cryptomator will be giving you the full permission in which you can choose to encrypt the whole of your data on your series of workstations or top of any cloud devices or any storage media. It will be working all through the creation of the virtual device right through which the encrypted content can be readily displayed.

Social recommendations and mentions

Based on our record, Cryptomator should be more popular than Authy. It has been mentiond 298 times since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.

Authy mentions (139)

  • A list of SaaS, PaaS and IaaS offerings that have free tiers of interest to devops and infradev
    Authy - Two-factor authentication (2FA) on multiple devices, with backups. Drop-in replacement for Google Authenticator. Free for up to 100 successful authentications. - Source: dev.to / over 1 year ago
  • Ask HN: What 2FA iOS app do you use?
    Https://authy.com/ Acquired by Twilio. I'm not even sure if they still update it, last blog post was 3 years ago. - Source: Hacker News / over 1 year ago
  • How to Set Up 2FA on Your BitStarz Account
    2FA apps such as Google Authenticator and Authy randomly generate a code every minute or so, which is matched to a specific key associated with your login. In essence, this means that whenever a login asks for your 2FA code, it knows which number to expect and will only unlock if that correct number is entered. Source: over 1 year ago
  • How can I avoid MFAuthenticator?
    You can also set up the Authy authenticator app on a PC, so you don't have to use a mobile app at all, but use a PC app instead :). Source: almost 2 years ago
  • Coworker refused to use a second factor for his Azure Global ADM bcs he doesn‘t need a „Gadget“ like a FIDO key.
    Check out authy. It's considered less secure than other device-specific OTP solutions, but it's better than not using it. Source: about 2 years ago
View more

Cryptomator mentions (298)

  • Owning my own data, part 1: Integrating a self-hosted calendar solution
    I know this is not what people want to hear, but your data will never be safer than it is in the cloud. No setup you can dream up at home with in a reasonable budget will ever come close to the resilience and redundancy you have in the cloud. Ownership is not about storing everything at home (or well, it's part of it), but having control over your data, which you can easily have while at the same time using the... - Source: Hacker News / about 2 months ago
  • Apple pulls data protection tool after UK government security row
    It's a drag that we're seeing this crap happen, but authoritarians will be authoritarians. What's the general opinion of tools like Cryptomator? [^1] [^1]: https://cryptomator.org. - Source: Hacker News / 4 months ago
  • Cryptomator: end-to-end encrypt files in any cloud
    To prevent this from happening, you can use a tool like Cryptomator to automatically encrypt your files before uploading them to the cloud. - Source: dev.to / 11 months ago
  • Dropbox: How to opt out of 3rd party AI partner access to your Dropbox
    The best way to do this is with https://cryptomator.org. - Source: Hacker News / over 1 year ago
  • Is it private if I lock my pdf
    Before putting anything on a cloud service I would recommend 3rd party tools, like Cryptomator, to encrypt folders and such, then upload to a cloud service. Source: over 1 year ago
View more

What are some alternatives?

When comparing Authy and Cryptomator, you can also consider the following products

Google Authenticator - Google Authenticator is a multifactor app for mobile devices.

VeraCrypt - VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux.

Duo Security - Duo Security provides cloud-based two-factor authentication. Duo’s technology can be deployed to protect users, data, and applications from breaches, credential theft, and account takeover.

BoxCryptor - Boxcryptor encrypts your sensitive files before uploading them to cloud storage services like Dropbox, Google Drive, Microsoft OneDrive, Box, and many others.

Azure Multi-Factor Authentication - Azure Multi-Factor Authentication helps safeguard access to data and applications while meeting user demand for a simple sign-in process.

Mega - Secure File Storage and collaboration