Users can require one or more files to be present for decryption, providing a form of two-factor authentication.
For top-secret data, this mode uses a cascade of both XChaCha20 and Serpent ciphers, authenticated with HMAC-SHA3 instead of the default BLAKE2b.
Users can toggle features like file compression, recursive encryption for thousands of files, or specific chunk sizes before hitting the encrypt button. Project Status and Legacy
An optional mode that makes the encrypted volume indistinguishable from random bytes, hiding the very fact that the file is encrypted.
Picocrypt
Users can require one or more files to be present for decryption, providing a form of two-factor authentication.
For top-secret data, this mode uses a cascade of both XChaCha20 and Serpent ciphers, authenticated with HMAC-SHA3 instead of the default BLAKE2b. picocrypt
Users can toggle features like file compression, recursive encryption for thousands of files, or specific chunk sizes before hitting the encrypt button. Project Status and Legacy Users can require one or more files to
An optional mode that makes the encrypted volume indistinguishable from random bytes, hiding the very fact that the file is encrypted. recursive encryption for thousands of files