October 23, 2017 at 11:08 #8089
Thank you for your input. We’d love to please everyone, but as it stands we simply don’t have the resources to work on version 1 as well. The source is out there, but apparently although over 20 million people have tried and used AxCrypt 1, not a single one of them have felt that it’s worth the time and effort to continue working on version 1 either… The source code is out there, so anyone with the right skills certainly could do it!
Right now, I can’t suggest a replacement – but we are working on making the AxCrypt 2 experience being improved as we go along.
For what it’s worth – we’ve received many comments to the effect of “I was initially disappointed like so many others by version 2, but after using it a while I realize that the changes are actually an improvement”.
So, you might also want to give it a try…October 23, 2017 at 11:22 #8090
Thanks for your input!
I’ll try to respond to some of your concerns.
“Why does it need to go online at all?!” – It doesn’t, you can use it entirely offline. Online does offer some advantages though.
“Why do you need a verified email address for the user?” – Two reasons: One as you say to support the business model. But the other reason is because it enables us to communicate with users, and it helps us immensely when we provide support. Although we log very little, and no individual encryption / decryption actions, we do log events such as failed and successful sign ins, password resets (the fact, not the password) etc. This gives us a chance to help users who have gotten themselves into trouble.
“… the comments/reviews the downsides of AC2 are pretty much related to a business model need rather than a user functional need” – Some few changes are indeed to support the business model, but they also overlap with features and user friendliness aspects. The account email is for example also used to implement the key sharing functionality, which has been requested by many for a long time. This enables us to use a single password model for all AxCrypt functions, while allowing you to share encrypted files securely with others using advanced public key technology without hardly noticing it. This also enables a feature even if you don’t share with anyone – if you change your password, this new password can be used to open even old encrypted files, since we always ‘key share’ encrypted files with yourself.
“It does not need much functional change from year to year ( 95% of its function was present in version 1)” – Not really true, and with version 2 we now support iOS, Android and OS X, also requested by many for many years.
“Rather charge a nominal fee for version 1.8 which would include 256 encryption than pursue AC2 would be my recommendation” – We have of course considered this, but there are some problems. It’s a non-trivial thing to implement, and we just don’t think it’s worth the effort. But, the source code is out there, so anyone could if they wanted to! I’d be happy to give advice and some support to a serious such effort.
“The new website for AC2 lists and uses links for reviews of AC1 as support for a reason to buy AC2” – We feel this is fair, because effectively, version 2 is a superset of version 1. Even the normal use case is click and type identical! If you close your eyes and don’t look at the different look, the clicks and typing is actually identical to version 1 with “Remember this password for encryption and decryption” enabled.
And, as you’ve noticed, we do keep the old version around and will continue to do so indefinitely.November 11, 2017 at 22:33 #8230
I agree with users say that the 1x version is much easier than 2x. Maybe for free users the 2x could have a menu or a setting equal to the 1x.
Jag håller med med användare säger att 1x-versionen är mycket enklare än 2x. Kanske för gratis användare kan 2x ha en meny eller en inställning som är lika med 1x.November 27, 2018 at 02:31 #12240
i left AxCrypt for similar reasons, besides paying every year (i hate subscriptions), the online account adds complexity and an internet requirement.November 27, 2018 at 07:19 #12241
Sorry to hear it! What were you paying for the old version 1 if I may ask ;-) ? You do know that essentially equivalent functionality is still free in version 2? Unfortunately we have bills to pay every year, and with a regular license model we either have to keep finding new paying users at a steadily increasing rate (if we want to grow and improve the software), or engage in the continuous version-switching and upgrade “offers”. AxCrypt 1 stayed at version ‘1’ for 15+ years. Version ‘2’ has stayed at version ‘2’ for 4+ years. With a license model we’d be forced to bump the major version every year or so in order to entice or force you to upgrade… We really do think the subscription model is a more honest way of doing business.
The online account has its’ sides, some plus and some minus. We think benefits far outweighs the disadvantages. You can of course run AxCrypt 2 entirely offline if you insist. Just enable the ‘always offline’ option. You still have to do a ‘registration’, i.e. assign a user name, but the information is never sent anywhere. All is 100% local.January 13, 2019 at 07:33 #12738
dont like axcrypt 2.. because 1 password to all files.. I scare if someone can acces my computer then he can acces all my encrpyt files…
how if every want open some files, we need typy password no just open like now.. maybe it more safeJanuary 13, 2019 at 12:51 #12741
One strong password is actually safer than many not-so-strong passwords, and just as safe as many strong passwords.
No, having access to your computer does not typically mean they have access to your encrypted files. However, if someone does have access to your computer, you can in principle no longer trust that computer for anything since any kind of software may have been installed by the person gaining access. The good thing about AxCrypt is just that – gaining access to the computer will not (at least in the first stage) gain access to encrypted files.January 14, 2019 at 06:46 #12743
Svante is correct in his comments: however you are correct in your fear of version 2. The real issue is that Svante changed his business model from v1.7 to 2 and showed that he was tying is individual (and immediate family) financial and personal security to Axcrypt. He will be the one that has installed the “backdoor” and his server based “password collection” system in version 2 and will under promise of reward (money and financial security) or penalty (physical threat to his family – going to jail) give your passwords to anyone how asks and rewards or penalizes him. I only use a copy of v1.7 that I downloaded many years before he changed his model (and was relatively unknown to codebreakers). I don’t use the current copy of v1.7 put on the old website since it may have been compromised when the business model was changed. If Svante wanted to give some confidence in his claims of security he would make 1.7 open source so it could be at least checked for backdoors”.August 4, 2019 at 12:07 #14131
I continue to receive error messages for files in only one folder on my tablet. I believe I used Microsoft encryption for these files prior to my upgrade from AxCrypt 1.7 to 2.0, and now these files are “double encrypted” which is preventing me from decrypting these files with the new version of AxCrypt. Microsoft is precenting me from changing the attributes of these files. Do I need to uninstall AxCrypt version 2.0 and reinstall version 1.7 in order to decrypt these files, then change the file properties (undo the Microsoft encryption), and then reinstall AxCrypt version 2.0? What will happen to all my other files (which have no issues with access) while I transition between the two versions of AxCrypt?August 5, 2019 at 10:13 #14136
AxCrypt 1.x and 2.x are compatible in the sense that 2.x can open all files secured with 1.x. In addition to that, 2.x implements of lot of new rich features, while some functions of 1.x are deprecated. Files secured with AxCrypt 2.x are not possible to open with AxCrypt 1.x.
Please note: You cannot have both AxCrypt 1.x and 2.x installed at the same time.
Still, you can open/decrypt the old encrypted files with the original file password(which was used in the file encryption process).
If the above does not help,please provide more information about the issue and write a mail to email@example.com . you can send a screenshot showing where the problem is, it often helps us understand.