CONTINGENCYPLAN.AI
WHEN TO LEAVE
WHERE TO GO
HOW TO EXIT
Settings
WHEN
WHERE
HOW
CONTINGENCYPLAN.AI
WHEN TO LEAVE
WHERE TO GO
HOW TO EXIT
Settings
Back to Privacy Toolkit
πŸ’ΎStorage

Tresorit

A polished end-to-end encrypted cloud storage service with enterprise-grade features β€” strong encryption but closed-source and expensive with limited anonymous payment options.

Domain Rank
#3
Score
6.75

This toolkit is for informational purposes. Security needs vary by situation. No tool guarantees complete privacy or anonymity.

Evaluation Scores

Encryption Architecture9

Client-side end-to-end encryption with zero-knowledge architecture; files cannot be decrypted by Tresorit or any third party.

Anonymous Usage5

Requires account with email; enterprise-focused onboarding collects organizational information.

Open Source & Auditability3

Fully proprietary; encryption claims are supported by third-party audits but source code is not publicly available.

Jurisdiction & Legal Protection8

Swiss company (Tresorit AG) headquartered in Zurich; benefits from Swiss data protection laws.

Track Record & Trust8

Operating since 2014 with a strong security reputation; independently audited, used by businesses and legal professionals.

Usability & Accessibility9

Polished interface with seamless file sync, sharing, and collaboration features that rival mainstream cloud storage.

Cross-Platform Support8

Windows, Mac, Linux, iOS, and Android with browser access; full-featured sync clients on all platforms.

Anonymous Payment4

Paid plans only with no free tier; accepts credit card and bank transfer, no cryptocurrency or anonymous payment options.

Overview

Tresorit is an end-to-end encrypted cloud storage service built for people who need the reliability and polish of enterprise software with the cryptographic guarantees of a zero-knowledge architecture. Founded in 2011 by Hungarian cryptographers and now headquartered in ZΓΌrich, Switzerland, Tresorit encrypts all files on your device before upload. The company cannot read your data, and neither can anyone who compromises their servers.

For crisis privacy, Tresorit fills a specific niche: it is the most polished and feature-rich encrypted storage option available, with capabilities like encrypted file requests, secure sharing with non-users, and digital rights management on shared links. If you need to coordinate document exchange with lawyers, family members, or trusted contacts who are not themselves privacy-savvy, Tresorit makes encrypted collaboration seamless β€” the recipient does not need a Tresorit account or any technical knowledge to access a shared file securely.

Tresorit is best suited for people who need full-featured cloud storage with strong encryption and are willing to pay for a premium product. It is not the cheapest or most anonymous option, but for people managing complex document collections during a crisis β€” legal proceedings, international relocations, asset protection β€” its combination of security and usability is unmatched.

Encryption Architecture

Tresorit uses AES-256 encryption for file contents with RSA-4096 for key exchange. All encryption and decryption happens client-side β€” files are encrypted before leaving your device, and the encryption keys never touch Tresorit's servers. The architecture is zero-knowledge by design: Tresorit cannot access your files, folder names, or metadata even under legal compulsion.

Each file is encrypted with a unique symmetric key, and those keys are themselves encrypted with your account key pair. Shared files use a separate key exchange mechanism so that revocation is possible without re-encrypting the underlying file. Tresorit also encrypts file metadata including names, modification dates, and thumbnail previews. The cryptographic protocol has been audited by Ernst & Young and published in peer-reviewed academic papers by the founding team, several of whom hold PhDs in cryptography from the Budapest University of Technology and Economics.

Anonymous Usage

Tresorit requires an email address to create an account, and its paid plans require a payment method. There is no free tier with meaningful storage β€” the free offering is limited to 3 GB and is primarily a trial. This makes fully anonymous usage more difficult than with open-source alternatives. However, you can sign up with an anonymous ProtonMail address and pay with a method that does not link to your identity.

Tresorit does not block VPN or Tor usage, and the web interface functions over Tor. The desktop and mobile sync clients work behind VPNs without issues. Tresorit logs some connection metadata for security purposes (login times, IPs), so using a VPN consistently is important if your threat model includes network-level surveillance. Tresorit does not publish details about what metadata it retains beyond what is described in its privacy policy.

Open Source & Auditability

Tresorit is not open source. The client and server code are proprietary, which means you cannot independently verify the encryption implementation by reading the source code. This is the most significant trust concern with Tresorit and the primary reason it ranks below open-source alternatives like Cryptomator for users with the highest security requirements.

To compensate, Tresorit has invested heavily in third-party auditing. Ernst & Young has audited the cryptographic implementation, and the company has published academic papers detailing their protocol in peer-reviewed venues. Tresorit also runs a bug bounty program and has engaged with the security research community. The founding team's academic background in cryptography provides additional credibility, but ultimately, closed-source encryption requires a higher degree of trust in the organization.

Jurisdiction & Legal Protection

Tresorit AG is incorporated in ZΓΌrich, Switzerland, which provides strong jurisdictional protection. Swiss privacy laws require a Swiss court order for data disclosure, and foreign government requests must go through the mutual legal assistance treaty process. Switzerland is outside the EU, the Five Eyes, and all extended intelligence-sharing arrangements.

Tresorit publishes a transparency report detailing government data requests. Due to the zero-knowledge architecture, even when Tresorit complies with valid Swiss court orders, the data provided is encrypted and useless without the user's password. Tresorit has stated publicly that they have never been compelled to build a backdoor, and the Swiss legal framework makes such compulsion significantly harder than in Five Eyes jurisdictions. In 2022, Tresorit was acquired by Swiss Post (the Swiss national postal service), which provides institutional backing and financial stability while remaining under Swiss jurisdiction.

Track Record & Trust

Tresorit has operated since 2011 without a known breach of encrypted user data. The company was founded by a team of Hungarian cryptographers who built the encryption protocol as part of their academic research. This academic origin gives the product stronger cryptographic foundations than most commercial competitors.

The 2022 acquisition by Swiss Post was a significant event. Swiss Post is a government-owned entity, which raised questions in the privacy community about potential state influence. However, Swiss Post operates as an independent commercial entity, the acquisition terms preserved Tresorit's operational independence, and Switzerland's legal framework provides robust protections against government overreach. The acquisition actually strengthened Tresorit's financial stability and long-term viability, reducing the risk that the service will shut down or be acquired by a less privacy-friendly entity.

Usability & Accessibility

Tresorit offers the most polished user experience in the encrypted storage space. The desktop clients feel native on Windows and macOS, with system tray integration, smart sync (files can be cloud-only to save local space), and conflict resolution for simultaneous edits. File sharing is exceptionally well-designed β€” you can send encrypted links to anyone, set passwords and expiration dates, limit download counts, and revoke access after sharing.

The file request feature is particularly valuable for crisis coordination: you can send a secure upload link to a lawyer or family member, and they can upload documents to your encrypted vault without needing a Tresorit account. The mobile apps support offline access, automatic photo backup, and document scanning with OCR. For non-technical users, Tresorit feels like using Dropbox β€” except everything is encrypted. The learning curve is essentially zero for anyone who has used mainstream cloud storage.

Cross-Platform Support

Tresorit is available on Windows, macOS, Linux, iOS, and Android, with a full-featured web interface. The Linux client is a notable inclusion β€” many encrypted storage services skip Linux support. All platforms support the full feature set including sync, sharing, file requests, and offline access.

Sync between devices is seamless and automatic. Changes made on one device appear on all others within seconds. The smart sync feature on desktop allows you to keep files cloud-only and download them on demand, which is useful if you are working from a device with limited storage. Feature parity across platforms is excellent, with the web interface serving as a capable fallback when native apps are not available.

Anonymous Payment

Tresorit's payment options are more limited than open-source alternatives. The primary payment methods are credit card and PayPal, both of which create identity links. Tresorit does not currently accept Bitcoin, Monero, or other cryptocurrency payments directly.

The 3 GB free tier is functional for storing a small collection of critical documents, but it is clearly designed as a trial rather than a permanent free offering. For anonymous payment, your best option is to purchase the subscription using a prepaid Visa or Mastercard bought with cash, or to use a PayPal account funded through an indirect method. This is a meaningful limitation for high-anonymity use cases, and it is the primary reason Tresorit scores lower on payment anonymity than competitors like Proton Drive or Cryptomator.

Setup Guide

Navigate to tresorit.com and click "Get Tresorit." Choose the Personal plan for individual use (starts at approximately $10/month billed annually for 1 TB of storage). Sign up with an anonymous email address β€” a ProtonMail account created over Tor works well. If paying with a prepaid card, ensure the card has enough balance for at least one billing cycle.

After creating your account, download the Tresorit desktop client for your operating system. Sign in and choose a sync folder location on your computer. Create a new "tresor" (Tresorit's term for an encrypted folder) for your crisis documents. Organize sub-folders by category: legal, financial, identity, medical, contingency plans. Drag your critical files into the tresor β€” they will be encrypted locally and synced to the cloud automatically.

Install the Tresorit mobile app and sign in with the same account. Enable the photo backup feature if you want to preserve photographic evidence or documentation. To share encrypted documents with a trusted contact, right-click any file and choose "Share." You can generate an encrypted link with a password, download limit, and expiration date. Send the link through one channel (email) and the password through another (Signal). For ongoing coordination, invite your contact to a shared tresor so they can access updated documents in real time. Test all of these workflows before you need them β€” in a crisis, you need confidence that your document access system works.

Last evaluated: 2026-03-28
WHEN
WHERE
HOW