Skip to main content

Frequently Asked Questions

How does ByteHide’s platform work?

ByteHide is a unified yet modular platform, meaning you can select and enable only the features you need. However, all selected features must fall under the same plan to ensure seamless integration and optimal performance. This allows you to tailor your experience while maintaining consistency across the features you use.

Can I upgrade or downgrade my ByteHide plan anytime?

Yes, you can upgrade or downgrade your plan at any time based on your evolving needs. When upgrading, your changes will take effect immediately, unlocking the additional features and limits. For downgrades, the changes will be applied at the end of your current billing cycle.

What happens if I exceed my plan’s usage limits?

If you exceed your usage limits, ByteHide will notify you and continue providing essential services temporarily. For sustained use beyond the limits, you’ll need to upgrade your plan to avoid interruptions. This ensures your application stays secure and operational at all times.

How does ByteHide pricing work for large teams or enterprises?

For large teams or enterprises, we offer custom pricing tailored to your specific requirements. This includes scalability, usage, and personalized features to match your business goals. Contact our sales team to learn more and design a plan that works best for you.

Is there a free plan available?

Yes, ByteHide offers a free Developer plan to help you get started with our platform. It’s perfect for individual developers or small projects, offering essential features with limited usage. As your needs grow, you can easily transition to a paid plan.

Are all ByteHide features included in every plan?

All ByteHide plans provide access to our unified platform, but the availability of features and their limits vary by plan. For example, advanced enterprise-grade security and features, dedicated support or unlimited usage are exclusive to the Enterprise plan. Check the plan comparison on our pricing page for details.

Can I purchase additional usage without upgrading my plan?

At this time, ByteHide does not offer standalone usage add-ons. If you exceed your current plan’s limits, you’ll need to upgrade to the next plan level to access higher limits and advanced features.

How does ByteHide ensure value across all plans?

Each ByteHide plan is designed to offer value for its target audience. Whether you’re an individual developer or a large enterprise, our plans scale with your needs, offering features like end-to-end encryption, real-time monitoring, and modular functionality to maximize efficiency and security at every level.

How do I contact ByteHide for specific questions about pricing or features?

You can reach out to our team through the contact form or email provided on the pricing page. We’re here to answer your questions and help you choose the plan that best suits your needs. If you prefer, schedule a call with one of our experts for personalized guidance.

Does my application get uploaded to your servers or do you have access to my code?

No, Shield does not have access to your code nor does it upload your application to our servers. All protection processes occur locally on your environment.

Will a protected application make connections to your service during execution?

No, once protected, your application will not make any connections to our services. The entire process is completely independent.

How does the protection limit work?

The protection limit refers to the number of times you can apply protection to a project per month. Each time you obfuscate or protect a project, whether it’s the same project or different ones, it counts as one protection.

Will my application stop working if I cancel my Shield subscription?

No, once an application is protected, that protection is permanent and will remain in effect even if you cancel your subscription.

Does Shield negatively impact my application's performance?

No, Shield is designed to minimize any impact on performance. The advanced optimizations available in the Enterprise plan can even enhance overall application performance.

Can I configure exclusions to prevent certain code members from being protected?

Yes, Shield allows you to configure exclusions using attributes in the code to prevent certain members from being protected.

Is it possible to deobfuscate stack traces and exceptions with Shield?

Yes, Shield offers online deobfuscation of stack traces, and the Enterprise plan provides an API for deobfuscating stack traces and exceptions.

What happens if I exceed the number of protections allowed in my plan?

If you exceed the number of protections allowed in your plan, you will need to wait until the next billing cycle or upgrade your plan to continue protecting your applications. However, if you are on the Enterprise plan, there is no limit on the number of protections you can apply.

How does Shield handle compatibility with future updates of .NET or other platforms?

Shield is regularly updated to ensure compatibility with the latest versions of .NET and other supported platforms. It is always up-to-date, so you won’t need to worry about manual updates.

What specific protections does Shield offer for mobile applications?

Shield includes advanced protections like anti-jailbreak and anti-rootkit for Android and iOS, which are available exclusively in the Enterprise plan.

How does Shield integrate with my CI/CD workflow?

Shield integrates easily with CI/CD systems, enabling automatic protection of applications during the development process. It also includes a Visual Studio extension and a cross-platform CLI for seamless integration into your development workflow.

What features differentiate the Developer, Startup, and Enterprise plans?

Team: Ideal for small projects or individual developers, offering up to 12 protections per month and support for a single project. This plan is suitable for development environments but is not intended for production.

Scale: Offers 25 protections per month and supports up to 5 projects simultaneously, allowing protected applications to be deployed in production environments. It also includes additional features like resource compression and priority support.

Enterprise: Designed for companies with valuable software assets that generate revenue and could suffer significant losses from attacks. This plan offers unlimited protections, advanced project support, optimizations, and includes enterprise-level support with a dedicated cybersecurity expert.

What type of support is included in each plan?

Team: Ideal for small projects or individual developers, offering up to 12 protections per month and support for a single project. This plan is suitable for development environments but is not intended for production.

Scale: Offers 25 protections per month and supports up to 5 projects simultaneously, allowing protected applications to be deployed in production environments. It also includes additional features like resource compression and priority support.

Enterprise: Designed for companies with valuable software assets that generate revenue and could suffer significant losses from attacks. This plan offers unlimited protections, advanced project support, optimizations, and includes enterprise-level support with a dedicated cybersecurity expert.

What auditing options does Shield offer?

Shield provides protection log retention, with a limit of 1 day in the Developer plan, 365 days in the Startup plan, and unlimited retention in the Enterprise plan. The Enterprise plan also includes detailed reports and security certificates.

What is the Web Panel and Protection History?

The Shield Web Panel allows users to manage their protected projects, view the history of applied protections, and access security reports. This functionality is available in all plans, providing a clear view of active protections and their performance.

How does Shield ensure application integrity in production environments?

In the Startup and Enterprise plans, Shield includes an SDK that allows the application to verify if it is properly protected during runtime. Additionally, the Enterprise plan includes advanced anti-tamper protection and other security measures to ensure the application operates securely in production environments.

What payment methods do you accept?

We accept a wide variety of payment methods, including credit and debit cards, SEPA, PayPal, and all payment methods supported by Stripe.

How do you process payments?

We process all payments through Stripe, which means we do not store any credit card information on our servers. Stripe handles all security and compliance aspects, ensuring that your payment information is protected.

I need the highest level of security possible; what should I do?

The Enterprise plan provides the best security on the market by combining obfuscation protections with integrity and anti-tampering measures. Additionally, you can combine it with Linker to secure your dependencies: (https://www.nuget.org/packages/Bytehide.Linker.Integration).

Does the support include pentesting or security audits?

Yes, the ByteHide team is composed of cybersecurity and reverse engineering experts. The Enterprise plan includes three pentests per year at no additional cost to ensure that your protected application is secure before launch.

Does Shield also protect my dependencies?

Yes, you can configure Shield to protect the internal dependencies of your application by adding the integration. It can also be used to protect third-party software used in your application. Additionally, you can use the free Linker module to protect all your application dependencies quickly, easily, and securely: https://www.nuget.org/packages/Bytehide.Linker.Integration

I have more questions. Where can I get help?

If you have more questions or concerns, you can visit our support center or contact us directly. We are here to help!

What is Secrets and what is it used for?

Secrets is a solution that combines a scanner and a secrets manager. It’s designed to securely identify and manage credentials, API keys, tokens, and certificates that applications need to authenticate and communicate with other services. This prevents accidental exposure of these secrets in the source code and facilitates their secure handling.

What features differentiate the Team, Scale, and Enterprise plans?

Team: Ideal for individual projects or small applications, with up to 3 secret detection scans and 5 secret synchronizations per month, limited to one project and one environment.

Scale: Suitable for startups and small teams, offering 10 secret detection scans and 100 secret synchronizations per month, supporting up to 5 projects and 2 environments.

Enterprise: Designed for large organizations, with unlimited secret scans and synchronizations, and the ability to handle multiple projects and custom environments, along with advanced security features such as entropy-based detection and custom patterns.

What type of support is included in each plan?

Team: Includes basic support.

Scale: In addition to basic support, it offers priority support.

Enterprise: Includes priority support, enterprise support, and a dedicated cybersecurity expert.

How does Secrets help keep my application's secrets secure?

Secrets performs automatic scans of your source code to detect any exposed credentials or keys and notifies you of their exact location. It also allows you to securely manage these secrets by storing them encrypted in a centralized vault, avoiding their direct inclusion in the source code.

What is automatic secret synchronization and how does it work?

Automatic secret synchronization allows that, once a secret is detected in your code, it is automatically extracted, stored in the secure vault, and replaced in your code with a secure reference. This ensures that secrets are never exposed in the code, maintaining security and allowing updates without the need to manually modify the code.

What secret detection methods does Secrets support?

Secrets supports detection based on predefined patterns, specialized plugins, and in the Enterprise plan, entropy-based detection and custom patterns. Additionally, advanced AI-based detection can be added through the Secrets AI add-on.

How does Secrets protect stored information?

Secrets uses encryption in transit and at rest to protect all stored information. The Enterprise plan also offers support for Hardware Security Modules (HSM) and the option of a locally encrypted vault for offline environments.

Does Secrets support automatic secret rotation?

Yes, in the Enterprise plan, Secrets supports automatic secret rotation, both via API and internally, ensuring that credentials and keys are periodically updated to minimize security risks.

What happens if I need to manage multiple environments?

Secrets allows managing secrets in different environments (for example, development, testing, and production), ensuring that each environment has access only to the secrets it needs. In the Enterprise plan, this management can be customized to adapt to the specific needs of each organization.

Does Secrets offer integration with CI/CD and other development tools?

Yes, Secrets integrates easily with CI/CD tools and other cross-platform development and DevOps systems. This allows for automatic secret detection and continuous management throughout the development lifecycle.

What notification and alert options does Secrets offer?

Secrets offers email notifications in all plans. The Enterprise plan adds integration with communication tools such as Slack, Discord, and Telegram, as well as Webhooks for greater alert customization.

How do you process payments?

We process all payments through Stripe, which means we don’t store any credit card information on our servers. Stripe handles all aspects of security and regulatory compliance, ensuring that your payment information is protected.

What payment methods do you accept?

We accept a wide variety of payment methods, including credit and debit cards, SEPA, PayPal, and all forms of payment compatible with Stripe. This allows you to choose the method that best suits your needs.

How is an active secret measured?

An active secret is measured as any credential, API key, token, or other type of sensitive information that has been scanned, managed, or synchronized by Secrets in a given month.

I have more questions. Where can I get help?

If you have more questions or concerns, you can visit our support center or contact us directly. We’re here to help you.

What is Monitor and what is it for?

Monitor is an advanced security tool focused on protecting distributed applications in environments where complete control of the device is not possible. It functions as a RASP (Runtime Application Self-Protection), providing real-time protection against threats and attacks from within the application, regardless of the environment in which it operates.

How does Monitor differ from a WAF (Web Application Firewall)?

Monitor is a RASP that integrates directly into the application to protect it from within, analyzing its behavior in real time. In contrast, a WAF operates at the network perimeter and protects the application by filtering incoming and outgoing traffic. While a WAF focuses on protecting web traffic, Monitor safeguards the internal logic of the application, offering a more detailed and specific defense.

What are the main differences between the Team, Scale, and Enterprise plans?

  • Team: Designed for small developers or early-stage projects, with monitoring limited to 250 devices per month and 30 days of data storage.
  • Scale: Tailored for startups requiring broader coverage, with up to 5,000 monitored devices per month, 90 days of data storage, and advanced security features like reverse engineering tool detection.
  • Enterprise: The most comprehensive plan for large businesses with advanced security and scalability needs, offering unlimited device support, unlimited data storage, and exclusive features like malware detection and custom remote actions.

What type of support is included in each plan?

  • Team: Includes basic support.
  • Scale: Offers basic support plus priority support.
  • Enterprise: Provides priority support, enterprise-level support, and a dedicated cybersecurity expert.

What detection capabilities does Monitor offer?

Monitor can detect a wide range of threats, including emulators, virtual machines, jailbroken or rooted devices, reverse engineering tools, dynamic memory alterations, and malware. It also protects against hooking techniques, deobfuscation, and memory tampering.

How does Monitor handle security notifications and alerts?

Monitor sends notifications via email across all plans. The Enterprise plan also includes integration with communication tools and Webhooks for more advanced alert management.

What analysis and reporting capabilities does Monitor provide?

Monitor delivers detailed analyses of devices, sessions, and security events. Security data is stored for 30 days in the Team plan, 90 days in the Scale plan, and indefinitely in the Enterprise plan.

What happens if a threat is detected in my application?

Monitor allows configuring automatic response actions, such as closing the application, locking the device, or even deleting the application and its data. These actions are customizable and can be executed remotely from the control panel in the Enterprise plan.

Can I customize detection and response rules in Monitor?

Yes, in the Enterprise plan, you can define custom rules for threat detection and response, enabling greater flexibility and adaptation to your application’s specific needs.

Does Monitor work without an internet connection?

Yes, Monitor can operate and protect your application even in offline environments, a feature exclusive to the Enterprise plan.

How is the use of Monitor billed?

Monitor is billed based on the number of devices monitored per month, with specific rates for each plan. The Team plan costs €0.04 per device, the Scale plan costs €0.9 per device, and the Enterprise plan offers customized pricing based on the customer’s needs.

How do you process payments?

All payments are processed through Stripe, meaning we do not store any credit card information on our servers. Stripe handles all aspects of security and compliance, ensuring that your payment information is protected.

What payment methods do you accept?

We accept a wide range of payment methods, including credit and debit cards, SEPA, PayPal, and all forms of payment compatible with Stripe. This allows you to choose the method that best suits your needs.

How is an active device measured?

An active device is defined as any end device monitored by Monitor within a given month. This includes any device running your application where Monitor has performed detection or analysis tasks.

I have more questions. Where can I get help?

If you have more questions or concerns, you can visit our support center or contact us directly. We are here to assist you.

What is ByteHide Logs?

ByteHide Logs is a secure, cloud-based logging solution designed to centralize, encrypt, and manage application logs. It provides real-time monitoring, advanced filtering, and tools to analyze logs effectively while ensuring data privacy and compliance with security regulations.

Why do I need a centralized logging solution?

A centralized logging solution simplifies log management by storing all your application logs in one secure place. It eliminates the need to manually access logs from individual devices or servers, ensures security with end-to-end encryption, and enables advanced analysis and filtering to diagnose issues efficiently.

How does ByteHide Logs ensure log security?

Logs are encrypted end-to-end, from the moment they leave your application until they are securely stored in the cloud. Additionally, sensitive data such as passwords or tokens can be automatically masked to prevent accidental exposure.

What are the key differences between the Team, Scale, and Enterprise plans?

  • Team: Up to 1 million logs/month 7-day log retention Support for 3 applications Basic support
  • Scale: Up to 10 million logs/month 30-day log retention Support for 10 applications Includes data masking, priority support, and Slack/Telegram integrations
  • Enterprise: Unlimited logs/month Custom retention periods Unlimited applications Enterprise-level support, custom integrations, and advanced features

What happens if my log volume exceeds the plan limits?

ByteHide Logs calculates log usage based on encrypted and compressed storage. If you exceed the limit for your plan, you may need to upgrade to a higher-tier plan or purchase additional storage.

Can ByteHide Logs integrate with my existing tools?

Yes, ByteHide Logs integrates seamlessly with CI/CD pipelines, communication tools like Slack and Telegram (Team and Enterprise plans), and provides SDKs for .NET applications. It also supports Webhooks for custom actions and alerts.

What advanced features does ByteHide Logs offer?

Some key features include:

  • Real-time monitoring and alerts
  • Advanced filtering for logs by date, severity, or user
  • Duplicate log suppression Global metadata enrichment
  • User identification in logs
  • End-to-end encryption
  • Data masking (Scale and Enterprise plans)

How long are my logs retained?

Retention periods depend on the plan:

  • Team: 7 days
  • Scale: 30 days
  • Enterprise: Custom retention periods

Can I use ByteHide Logs with mobile or IoT applications?

Yes, ByteHide Logs is designed to work with distributed applications, including mobile and IoT. It provides secure logging and monitoring even in complex, multi-device environments.

How does ByteHide Logs handle real-time monitoring?

ByteHide Logs monitors application logs in real time, allowing you to address issues as they occur. You can set up alerts for critical events, such as errors or unusual behavior, ensuring rapid response to potential problems.

What compliance standards does ByteHide Logs meet?

ByteHide Logs helps ensure compliance with security and privacy standards like GDPR and HIPAA by encrypting logs, masking sensitive data, and providing secure storage.

What happens to my logs if a threat is detected?

If a threat is identified in your logs, you can configure automatic alerts and actions to address the issue. For Enterprise users, Webhooks and integrations can trigger custom workflows for incident response.

Can I customize the logging levels?

Yes, ByteHide Logs allows you to set custom logging levels (Info, Warning, Error) to capture the most relevant data for your application’s needs.

How does ByteHide Logs improve my debugging process?

ByteHide Logs enhances debugging with:

  • Advanced filtering for pinpointing specific issues
  • Contextual logs enriched with tags and metadata
  • Correlation IDs to track operations across services
  • Real-time monitoring for immediate issue detection

How does ByteHide Logs compare to traditional logging tools?

Unlike traditional tools, ByteHide Logs focuses on security, offering end-to-end encryption, data masking, and centralized cloud storage. It also integrates seamlessly with other ByteHide products like Shield and Monitor, creating a unified security and monitoring ecosystem.

Is ByteHide Logs scalable for growing applications?

Yes, ByteHide Logs is built on a scalable cloud infrastructure designed to handle high volumes of logs and support the growth of your applications without compromising performance or availability.

How can I start using ByteHide Logs?

Getting started is easy! Simply integrate the ByteHide Logs SDK into your .NET application, configure your logging preferences, and start monitoring your logs through the intuitive web dashboard.

Where can I learn more or get support?

Visit our support center for documentation, FAQs, and direct assistance. Our support team is available to help you make the most of ByteHide Logs.

What is ByteHide Storage?

ByteHide Storage is a secure and developer-friendly cloud storage solution designed to integrate directly into your applications. It simplifies file management, ensures data privacy with end-to-end encryption, and provides advanced features like file expiration, compression, and organization.

How is ByteHide Storage different from services like Dropbox?

While Dropbox is designed for end users to store and share personal files, ByteHide Storage is built specifically for developers to integrate secure storage into their applications programmatically. It offers an SDK, APIs, and advanced features like zero-knowledge encryption, environment-based encryption, and customizable file management.

What makes ByteHide Storage unique?

End-to-End Encryption: Files are encrypted on the client side before upload, ensuring privacy.

Zero-Knowledge Model: Only you have access to your encryption keys, guaranteeing data privacy.

Easy Integration: Simplified SDK for .NET applications that eliminates the need for complex configurations like buckets or IAM permissions.

Advanced Features: Includes file expiration, compression, tagging, and metadata management.

Developer Focus: Designed to handle application-specific needs rather than personal file storage.

What are the storage limits for each plan?

Team: 250 GB total storage with a 5 GB file size limit.

Scale: 1 TB total storage with a 5 GB file size limit.

Enterprise: Unlimited storage with support for larger file uploads.

Can I use ByteHide Storage for temporary file storage?

Yes, ByteHide Storage allows you to set expiration dates for temporary files, ensuring they are automatically removed after the specified time. This feature is ideal for handling sensitive or short-lived data.

How does ByteHide Storage ensure data security?

End-to-End Encryption: Files are encrypted on the client side before leaving your application.

Post-Quantum Encryption: Advanced algorithms like Kyber1024 safeguard data against future quantum computing threats.

Zero-Knowledge Model: Only you have access to encryption keys.

Environment-Based Encryption: Links encryption to specific environments or devices for added security.

What are the key differences between the Developer, Startup, and Enterprise plans?

Team: 250 GB storage 5 GB file size limit Basic support

Scale: 1 TB storage 5 GB file size limit Priority support Advanced features like Slack/Telegram integrations

Enterprise: Unlimited storage Support for larger files Dedicated cybersecurity expert Advanced security and file management options

How does ByteHide Storage simplify integration?

ByteHide Storage provides an intuitive SDK for .NET applications, allowing developers to integrate storage capabilities with just a few lines of code. There’s no need to configure buckets, regions, or complex permissions.

Is ByteHide Storage compatible with all .NET frameworks?

Yes, ByteHide Storage supports all .NET versions and frameworks, including .NET MAUI, Xamarin, Blazor, and ASP.NET.

Does ByteHide Storage offer encryption during transmission and storage?

Yes, all files are encrypted both in transit and at rest. This ensures that data is secure during transmission to the cloud and while stored in our infrastructure.

How does ByteHide Storage handle large files?

The Enterprise plan supports large file uploads beyond 5 GB, leveraging optimized performance to handle high-volume file transfers efficiently.

Can I organize files into directories?

Yes, ByteHide Storage allows logical organization of files into directories and subdirectories, making file management intuitive and efficient.

What happens if a file has expired?

ByteHide Storage automatically validates file expiration before allowing access. Expired files are securely deleted according to your configured rules.

How does ByteHide Storage help save storage space?

ByteHide Storage features automatic file compression, reducing file sizes before upload. This optimizes storage usage and lowers transfer costs.

Is ByteHide Storage suitable for compliance with regulations like GDPR or HIPAA?

Yes, ByteHide Storage’s encryption and zero-knowledge architecture facilitate compliance with data protection regulations like GDPR and HIPAA, ensuring data privacy and security.

What integration options does ByteHide Storage offer?

SDK for .NET: Seamlessly integrate storage into .NET applications. S3-Compatible API: Use familiar S3 APIs for compatibility with existing workflows. Signed URLs: Generate temporary access URLs for secure file sharing. Integration with ByteHide Secrets: Securely store encryption keys and tokens for enhanced security.

Can I host a static website using ByteHide Storage?

Yes, the Startup and Enterprise plans include support for static website hosting directly from storage buckets.

Does ByteHide Storage offer geo-replication for redundancy?

Geo-replication is available on the Enterprise plan, ensuring data is automatically replicated across multiple regions for faster access and increased redundancy.

How does ByteHide Storage compare to other cloud storage solutions?

Unlike traditional storage services, ByteHide Storage prioritizes security with features like end-to-end encryption and zero-knowledge architecture. It also offers developer-focused tools and integration options, making it ideal for applications requiring secure, scalable, and programmatic file storage.

Where can I get support or learn more?

Visit our support center for comprehensive documentation and FAQs. Our team is available to assist you with any questions or integration challenges.

Take control of your application security today.

Start for Free
Bytehide Dashboard