For more than 10 years, we've been building end-to-end encrypted software products for people who care about privacy & security.

SpiderOak Leadership


Alan Fairless Co-Founder & CEO

Veteran systems developer with 25 years of experience building robust and scalable distributed systems. Believes working online should be as private as meeting in person.


Jonathan Moore Chief Technology Officer

Passionate believer that technology can be used to enable more effective communication. Has over 20 years of experience delivering technology across industries, and has been a long time member of the cryptography and privacy communities.


Laura Gowans Chief Operating Officer

Believes privacy should be understandable and available to everyone. Fighting to achieve this by building better UX with privacy technologies.


Adam Mashinchi Chief Product Officer

With his technical background in systems administration, web and application development, mobile operating systems, and computer security, Adam specializes in bringing secure communication and collaboration to the enterprise marketplace.


Matt Erickson Vice President, Engineering

Believes in the fight to make tomorrow better than today. Began with HPC design, then climate & biofuel research @ U of Illinois Urbana. Fascinated with privacy UX.

Interested in Joining Us?

We always love to connect with great people who care about our mission and have great skills that match with our needs. We are always looking to add great talent to our team. Visit our Careers page to learn more our open positions and apply online. See Opportunities.

contact information

SpiderOak, Inc. works from virtual workplaces in seven timezones. Our data center is secured, maintained, and monitored 24x7. Our address is 4741 Central Street, Suite 324, Kansas City, MO 64112. While unattended, you can leave a message for us at 866-432-9888.

Recent Blog posts

Is it Worth Reporting Ransomware to the FBI?

Reporting burglary, car theft or mugging, would be a no-brainer. But online fraud or ransomware extortion?

Status Report, August 2017

Status Report, August 2017

Guest Post: Can you trust a VPN to protect your privacy?

Learn what a Virtual Private Network is as well as some key questions you need to keep in mind when searching for the right VPN for you.

How to avoid ransomware

The best defense against ransomware is to outwit attackers by not being vulnerable to their threats in the first place. Learn how.

How Does Ransomware Work?

Learn how it works so you can prevent it and protect yourself and your business.


Please read: Important information on security bug fixes in our backup products.


As threat models evolve it is imperative that security practices change to meet the new dangers

Beat Ransomware: Learn how to protect your organization

What is ransomware and how does it work? How can I protect my organization? Learn this and more in this video...

How to recover your files after a ransomware attack

Preventing ransomware attacks can be difficult, but with SpiderOak, backing up your data and getting your files back is easy.

What is Ransomware?

If ransomware is a term that you've been hearing lately, but don't quite understand, here's a quick intro for you...

Your life for sale on the dark web - Part 2

The terrified couple had more bad news coming their way. No one would ever be caught or charged with this theft.

Your life for sale on the dark web - Part 1

It was terrifying to realize someone had stolen information with the specific intention of creating a complete picture of their lives...

The Biggest Data Breaches of 2017 (So Far…)

It feels like data breaches are a fact of digital life, and they seem to be getting bigger and more frequent. And while most companies...

Hipchat hacked, following Slack - only proving the need for end-to-end encryption

Slacking on encryption will always come back to bite you. That's the lesson we've seen over and over the past few years. This week's hack...

The two types of personal data

You should be very aware that letting a company profile and data mine you is absolutely undesired, and even dangerous.

Missing the point: Your ISP, internet privacy laws & trust

Many people are upset about the roll back of internet privacy laws, and they should be. But you can reduce the need to trust your ISP and...

Traveler's Beware: Tips to Avoid Scams & Fraud

Attackers exploit the unknown - you're in environments and situations which are not familiar, and they know it. Here are some simple ways...

Start your privacy journey today - Part 1

In honor of World Backup Day, let's talk about ways you can stay protected online, from your online searches to backing up your files.

World Backup Day: What files matter to you most?

Plus, learn how to get a sweet deal: Unlimited Backup for $149/year or $17/month. Just for you!

4 encryption predictions for 2017

In 2017, cryptography is a tool you should consider to enhance security and trust in your brand.

Vault 7 hypothesis: Encryption is working

Security is a game where one of the most effective tools defenders have is to drive up the risk and cost for attackers...

Why we will no longer use the phrase Zero Knowledge to describe our software

Kissing Zero Knowledge goodbye! (But not really…let us explain)

Hard Drive Encryption: Device security you need to consider

Information on hard drive encryption and how to increase local device security

Status Report, February 2017

Status Report, February 2017

Data Privacy Day: Lessons on security from your teen

When will parents get good crypto?

Privacy Tools You Should Start Using Today

Want to take more control of your online privacy? 12 easy tools that can empower you for Data Privacy Day this week.

Survey: More than 75 Percent of Employees Are Using Unsanctioned Group Chat Tools

SpiderOak survey of enterprise employees finds that IT and leadership are the largest offenders of using unsanctioned group chat tools...

Ransomware: Your #1 Threat Online & How to Defend Yourself

“The past 12 months have seen ransomware reach a new level of maturity and menace..." What can you do? It's actually simple.

Tech companies & The long tradition of lying about encryption

At the heart of the issue is the difficulty for end users to decipher the terms cloud vendors use to describe their security...

Internet (Rightly) Freaks Out When Evernote Admits Employees Can Read Your Notes

Evernote announced updates to their privacy policy that will roll out in January to its 200 million users globally. You can't opt out of...

5 ways CIOs/CISOs can easily increase web security with encryption

This is a short guide intended for CISOs, CIOs, or CMOs who are not programmers, but want to quickly improve security AND SEO...

Let's talk about encryption at SX. Vote for our panels.

Encryption was a consistent conversation at SXSW 2016. Let's keep the conversation going. Please vote for our encryption and privacy panels.

Status Report, August 2016

Status Report, August 2016

Privacy over the years: 1917 - Present

Tracking technologies, security flaws, and key figures shaping the future of privacy. This timeline highlights several privacy moments from

Proposed Rule 41 Changes: What it is and how to stop it

We’re asking for your support and a few minutes of your time. Join us and the EFF to help raise awareness of this issue.

Living in a Post-Snowden world: online searches and self-censorship on the rise

All of us know, without doubt, that we’re being watched online. Is it altering our behavior at all?

Facebook shadow profiles: a profile of you that you never created.

You never created it -- but it holds more information about you than you'd care to share.

10 privacy tools to help you dodge data mining and more

Sometimes, data mining can get a little bit out of hand. Here are a few tools that will help you avoid intrusive ads, trackers, and more.

"Hundreds of Eyes": Today’s Pantopicon

Privacy and surveillance may seem like a trending topic today, but these events were present centuries ago.

Special Offer for SpiderOakers – 25% off Golden Frog’s VyprVPN

We are excited to announce VyprVPN Server, a new product in beta offered by our partner Golden Frog!

Celebrating 10 Years of Privacy at SpiderOak

We built SpiderOak with privacy from day one.

Why don't other major corporations build Zero Knowledge systems?

It's often unprofitable or impractical, and otherwise it's a bunch of extra work.

Apple follows lead of secure cloud services like that of SpiderOak.

Offering Zero Knowledge to online users is becoming a no-brainer for Apple.

Shocking privacy stats your CIO wish you knew

Every day is a potential cybersecurity threat to your company, your coworkers, and you.

Status Report, February 2016

Status Report, February 2016

You Deserve Better. Love, Semaphor - Your Secret Admirer

I know this may seem out of the blue, but I heard about you from some of the other Collaboration Tools...

What do ice-pick lobotomies, tobacco, and your data have in common?

Today, on Data Privacy Day, I can't help but wonder what we will think when we look back on this time in history....

Did you notice? The Internet shifted from files, folders, to timelines

We now work and collaborate faster when using timelines instead of files and folders.

Policy Update: Enforcing Trials

As the company continues to grow and decides how to best serve our supporters, we decided to make some changes to our trial policy.

Special Holiday Discount for SpiderOakers – 40% off Golden Frog’s VyprVPN

We’re proud to announce that our partner, Golden Frog, is offering SpiderOak customers an exclusive holiday special.