File Sharing Glossary
38 file sharing and security terms explained simply.
File Sharing
The practice of distributing or providing access to digital files over a network. File sharing can be done via email attachments, cloud storage, peer-to-peer networks or dedicated services like EasySend.
End-to-End Encryption (E2E)
A security method where data is encrypted on the sender's device and can only be decrypted by the intended recipient. The server that transmits the data cannot read it. EasySend uses E2E encryption with AES-256-GCM. See also: zero-knowledge encryption.
Zero-Knowledge Encryption
An architecture where the service provider has zero knowledge of user data. The encryption keys are held only by the user, never by the server. Even if the server is compromised, user data remains protected. Used together with end-to-end encryption.
AES-256-GCM
Advanced Encryption Standard with 256-bit key length in Galois/Counter Mode. A symmetric encryption algorithm used by governments, banks and security applications worldwide. The 256-bit key means there are 2^256 possible keys. EasySend derives the key using PBKDF2 via the Web Crypto API.
PBKDF2
Password-Based Key Derivation Function 2. A method for deriving a cryptographic key from a human-readable password. It applies a hash function multiple times to make brute-force attacks computationally expensive. Used with AES-256-GCM in EasySend.
Cloud Storage
Storing files on remote servers accessed via the internet rather than on local hardware. Examples include Google Drive, Dropbox and iCloud. Cloud storage enables file access from any device.
FTP (File Transfer Protocol)
A standard network protocol for transferring files between a client and server. Created in 1971, FTP lacks encryption by default and has largely been replaced by SFTP and HTTPS-based file sharing for security reasons.
SFTP (SSH File Transfer Protocol)
A secure file transfer protocol that provides file access, transfer and management over an encrypted SSH connection. Unlike FTP, all data including credentials is encrypted during transfer.
CDN (Content Delivery Network)
A geographically distributed network of servers that delivers content to users from the nearest location. CDNs reduce latency and improve download speeds. EasySend uses a global CDN for fast downloads.
API (Application Programming Interface)
A set of rules and protocols that allows software applications to communicate with each other. EasySend's REST API lets developers upload and share files programmatically with simple HTTP requests.
REST API
Representational State Transfer API. A web service architecture that uses standard HTTP methods (GET, POST, DELETE) to interact with resources. RESTful APIs are stateless and use URLs to identify resources. EasySend uses multipart form data for file uploads.
MCP (Model Context Protocol)
An open protocol by Anthropic for connecting AI models to external tools and data sources. MCP enables AI assistants like Claude to directly interact with services like EasySend for file sharing.
Multipart Form Data
An HTTP content type used for uploading files. The request body is split into multiple parts, each containing a form field or file. This is the standard method for browser-based file uploads.
Short URL
A condensed version of a longer URL. Services like EasySend generate short codes (e.g. easysend.co/Ab3Kz) that redirect to the full resource. Short URLs are easier to share via text and messaging.
QR Code
Quick Response code. A two-dimensional barcode that stores data readable by smartphone cameras. EasySend generates QR codes for every share link, allowing recipients to scan and download from their phone.
OAuth
An open standard for access delegation. OAuth allows users to grant third-party applications limited access to their resources without sharing credentials. Many APIs require OAuth, but EasySend's API requires no authentication at all.
Webhook
An HTTP callback that sends real-time data to a specified URL when an event occurs. EasySend uses Stripe webhooks to process payment events like subscription renewals and cancellations.
PWA (Progressive Web App)
A web application that uses modern web capabilities to deliver an app-like experience. PWAs can be installed on home screens, work offline and send push notifications. EasySend is installable as a PWA.
Chunked Upload
A method of uploading large files by splitting them into smaller pieces (chunks). Each chunk is uploaded separately with automatic retry on failure. This makes large uploads resilient to network interruptions.
Rate Limiting
Restricting the number of requests a user or IP address can make within a time window. Rate limiting prevents abuse and ensures fair usage. EasySend limits uploads to 10 per hour per IP.
bcrypt
A password hashing function designed to be computationally expensive, making brute-force attacks impractical. EasySend uses bcrypt for hashing access passwords on bundles. Separate from end-to-end encryption.
Web Crypto API
A JavaScript API built into modern browsers that provides cryptographic operations. EasySend uses the Web Crypto API for client-side AES-256-GCM encryption, eliminating the need for external libraries.
SCP (Secure Copy Protocol)
A file transfer protocol that uses SSH to securely copy files between a local and remote host. SCP is simpler than SFTP but only supports file copying, not directory listing or file management.
FTPS (FTP over SSL/TLS)
An extension of FTP that adds support for TLS encryption. FTPS encrypts both the command and data channels, protecting credentials and file contents during transfer. Not to be confused with SFTP which uses SSH.
TLS (Transport Layer Security)
The cryptographic protocol that powers HTTPS connections. TLS encrypts data between your browser and the web server, preventing network eavesdropping. All EasySend connections use TLS 1.3, the latest version.
SHA-256
A cryptographic hash function from the SHA-2 family that produces a 256-bit (32-byte) hash value. Used for data integrity verification, digital signatures and password hashing. Part of the security foundation behind HTTPS and blockchain.
HMAC (Hash-based Message Authentication Code)
A mechanism for verifying both the integrity and authenticity of a message using a cryptographic hash function and a secret key. HMACs prevent message tampering and are used in API authentication and webhook signature verification.
RSA
An asymmetric encryption algorithm using a public key for encryption and a private key for decryption. RSA is widely used for secure key exchange, digital signatures and HTTPS certificate verification. Named after its creators: Rivest, Shamir and Adleman.
TOTP (Time-based One-Time Password)
An algorithm that generates temporary passwords based on the current time and a shared secret. TOTP is the standard behind authenticator apps like Google Authenticator and Authy for two-factor authentication.
SOC 2
Service Organization Control 2. An auditing framework for service providers that evaluates controls related to security, availability, processing integrity, confidentiality and privacy. SOC 2 compliance demonstrates that a service meets industry security standards.
HIPAA
Health Insurance Portability and Accountability Act. A U.S. law that sets standards for protecting sensitive patient health information (PHI). HIPAA requires encryption for electronic PHI in transit and at rest. See the healthcare file sharing guide.
DLP (Data Loss Prevention)
Security tools and policies designed to prevent sensitive data from leaving an organization through unauthorized channels. DLP systems monitor and control data transfers across email, file sharing, cloud storage and removable media.
MFA (Multi-Factor Authentication)
A security method requiring two or more verification factors (something you know, something you have, something you are) to access an account. MFA significantly reduces the risk of account compromise from stolen passwords.
SSO (Single Sign-On)
An authentication method that lets users access multiple applications with one set of credentials. SSO reduces password fatigue and simplifies user management but creates a single point of failure if the SSO provider is compromised.
RBAC (Role-Based Access Control)
A security model that restricts system access based on user roles within an organization. Users are assigned roles (admin, editor, viewer) and each role has specific permissions. Common in enterprise file sharing platforms.
DAM (Digital Asset Management)
Software for organizing, storing and distributing digital assets like images, videos, documents and brand materials. DAM systems are used by marketing teams and creative agencies to manage large media libraries with metadata and version control.
WebDAV
Web Distributed Authoring and Versioning. An extension of HTTP that lets users collaboratively edit and manage files on web servers. WebDAV enables mounting a remote server as a local drive. Used by some cloud storage services for file synchronization.
S3 (Object Storage)
Simple Storage Service. An object storage architecture originally created by Amazon Web Services. S3-compatible storage is the industry standard for scalable cloud file storage. Files are stored as objects in buckets with metadata and unique keys.