Encrypted volumes through command line
Solving the Satoshi Puzzle
file/stream encryption/decryption/CRC based on PI compute algorithm
Lightweight RAW and ZIP disk images reader and writer to USB or SD
FIDO strong authentication, encryption, digital signature engine
FIDO-enabled, cloud file encryption with centralized key management.
Secure mail + Tor gateway
Encryption addressing long-term data secrecy
Sending encrypted data through internet web applications.