360 Encrypt
source

360 Encrypt

(8)
Price
Free
Category
Utilities Productivity
Last update
May 31, 2021
Publisher
南京思智信息科技 有限公司 Contact publisher
View in store
Loading...

Ratings & Reviews performance

Ratings & Reviews performance provides an overview of what users think of your app. Here are the key metrics to help you identify how your app is rated by users and how successful is your review management strategy.

Number of reviews,
total
8
Avg rating,
total
⭐4.5
Loading...

User Reviews for 360 Encrypt

Why to reply to reviews?face_screaming

User reviews affect conversion to installs and app rating. Featured and helpful reviews are the first to be noticed by users and in case of no response can affect download rate.

Description

3302 chars

360 Encrypt supports six languages, cross-platform support for Mac, IOS, Window, Linux and other mobile computers encryption and decryption, is a software that can quickly encrypt your mobile computer files (pictures, videos, office, PDF,CAD,SolidWorks) , let you better protect your privacy and secrets, and can be safely shared with authorized secret friends to better enjoy work and life; The main function: 1. Encryption: Do not change the file format, no one can open the encrypted file except yourself, you can safely save to cloud disk or export backup 2. Encrypted reading: the file can be read directly without decryption; 3. Intimate circle encryption: The encrypted files in the intimate circle can only be read by friends in the intimate circle, and cannot be decrypted and copied; 4. Shared encryption: Anyone who shares the encrypted files can browse without entering the circle of close friends. All encrypted files cannot be modified by copying screenshots and recording screens to protect the intellectual property rights of the files; 5. Photo encryption: After the photo is taken, it is automatically encrypted and saved in the safe. Steps to share encrypted files in close circle [1] Both close friends download the APP; [2] Invite friends to join the close circle (share the link through social software, the other party is to enter the mobile phone number to register the mobile phone number, social software registration only needs to enter a nickname), you can also directly enter the close circle name to enter the close circle. [3] The default is to automatically enter the close friends circle. If the close friends circle audit is enabled, the administrator's consent is required to enter the close friends circle; [4] After entering the circle of close friends, the circle of close friends encrypts the file and shares it with the other party. The other party can only read without decryption authority; [5] Remove the close friend. After selecting the close friend to move out of the close friend circle, the encrypted files received by the other party will be invalid and cannot be opened. Technical features: 1. Users do not need to remember the password (one-click identification: WeChat + mobile phone dynamic code + fingerprint identification); remove the problem of complex password forgetting; 2. Support encrypted files without changing the format and storage path, without storing the files in a specific area for protection; 3. Encrypted files can be exported and shared at will, and the problem of file protection can only be solved on a single device; 4. Support mainstream terminal device file encryption and decryption: mobile phone, computer, tablet; realize multi-terminal platform unified encryption, decrypt file, not only file encryption and decryption processing on a single device; 5. Support file encryption reading; the other party can only view the file and cannot be maliciously transmitted; 6. Support file permission control; 7. Support file encryption and circulation; 8. Support file intelligent encryption: such as: automatic copying of files and automatic encryption of files in encrypted folders; 9. Enterprise-level document security protection; contact us WhatsApp: +8615094302358 Tel: +86-4000897028 Official website: www.360jiami.com

Screenshots

https://is3-ssl.mzstatic.com/image/thumb/Purple114/v4/3b/28/75/3b2875ba-7f41-cbdb-c0d4-7727520c8f9e/pr_source.png/1242x2688bb.pnghttps://is2-ssl.mzstatic.com/image/thumb/Purple114/v4/a6/a2/dd/a6a2dd2f-7315-a600-a148-d3f14da765d6/pr_source.png/1242x2688bb.pnghttps://is3-ssl.mzstatic.com/image/thumb/Purple114/v4/e5/f6/dc/e5f6dc95-f542-a563-80a4-71e27dde3340/pr_source.png/1242x2688bb.pnghttps://is4-ssl.mzstatic.com/image/thumb/Purple114/v4/68/2c/43/682c43e5-2921-4d2a-9e63-554ebad9d0f3/pr_source.png/1242x2688bb.pnghttps://is3-ssl.mzstatic.com/image/thumb/Purple114/v4/73/e9/03/73e903f7-8c56-75e8-b1a2-183ad7028f71/pr_source.png/1242x2688bb.pnghttps://is5-ssl.mzstatic.com/image/thumb/Purple114/v4/73/02/18/7302185f-83dc-c508-1b25-f915684cdb2a/pr_source.png/1242x2688bb.png
Loading...
Loading...

Find growth insights on our blog

React to user feedback and market trends faster