We assume that you already know the answer to that since you are in this website 🙂. Open source technologies respect the freedoms of you, the user, which is something we take seriously here at Cloud68.co.
At the moment we are prepared to offer qualitative services in EU countries and countries in South Eastern Europe, otherwise known as the Balkan region. Time difference, complication on accepting payments from residents or legal entities in countries other than the one mentioned above and also other legal issues from countries that have policies not friendly towards internet freedom are some of the main reasons for this decision. Our goal is to offer our services worldwide, but this seems more complicated as we had initially estimated. In a few words, avoid applying for instances if you are are not based in one of these countries, but if you really like us and you still want to apply, we will do our best to support you.
The servers used to provide your services are hosted at facilities using green energy. We will post more update about this soon.
If your instance is open source we will probably be able to offer it to you, but keep in mind that it will take more time for us to make sure that everything will run smoothly. Which brings us to the next question...
We get this question a lot 🙂. Once you have processed with the payment you will receive an email with all the log ind details and instructions in less than 24 hours. We are working to reduce this to 12 hours. Requests during Saturdays or Sundays will be processed Monday.
For the moment we only accept Payments through Paypal, but we are planning to offer more ways for people to pay for the services we offer. This is due to limitation of banks in Tirana, the city where Collective68, our parent company, is based at the moment. We are really working hard to also add additional payment methods.
We haven't had any requests yet for payments through cryptocurrencies and to be honest we have not been prioritizing this kind of payments at the moment. If you are interested in paying with a specific cryptocurrency please contact us and we will do our best to find a solution.
We take transparency for the way we handle your data seriously and we try to reflect this also in the Terms of Service document that you can find in our website
In order to remove your personal data from our servers you will need to ask us to close your account. While we’d be very sad to see you go, if you no longer want to use our Services ☹️, you can ask us to close your account and remove your data from our database. You can do this by contacting our support team through our website: support.cloud68.co
For 'Starter' and 'Medium+' packages our servers are located in Germany as we are using a hosting service provided by Hetzner Online GmbH. Make sure to read their data policy in case you are hosting sensitive data: https://www.hetzner.com/rechtliches/datenschutz. For 'On demand packages' we might have on premise hosting or another hosting service provider as imposed by the contractual obligations we have with our partners and clients on a case by case situation.
Our main communication channel for support is support.cloud68.co. You can also contact our team by using email: email@example.com, which will open automagically a support ticket for you.
Our friendly tech support team is available from Monday to Sunday 9.00 - 17.00 CET time.
Yes, but only for our enterprise clients. We use Jitsi for these video calls, which of course is open source software.
Sometimes we also answer questions on our social media channels, but it’s is not guaranteed that we will answer there as quickly as if you contacted us at our primary support channels. Just FYI our Twitter account is @Cloud68_co
Phishing is defined as the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication (source here). In our case this means that someone will try to present himself/herself as a member of Cloud68 team and ask for your sensitive information. One of the ways to understand easily that someone is sending you a phishing email is that we at Cloud68 will NEVER ask you for your password in an email. If you don’t trust a link in an email sent from us, go directly to our contact us page and inform us about the suspicious activity.
2FA is an extra layer of security used to make sure that people trying to gain access to an online account are who they say they are. First, a user will enter their username and a password. Then, instead of immediately gaining access, they will be required to provide another piece of information.
This second factor could come from one of the following categories:
- Something you know: This could be a personal identification number (PIN), a password, answers to “secret questions” or a specific keystroke pattern;
- Something you have: Typically, a user would have something in their possession, like a credit card, a smartphone, or a small hardware token;
- Something you are: This category is a little more advanced, and might include biometric pattern of a fingerprint, an iris scan, or a voice print;
- Hardware Tokens
- SMS Text-Message and Voice-based 2FA
- Software Tokens (this being the most popular form)
- Push Notification for 2FA
- Other Forms (Biometric 2FA)