Product Listings

NEWS

VeraCrypt Releases Update

Law Enforcement Can Now Use Cellebrite Software In-House

Many PDF Encryption Apps Vulnerable

US Messaging Apps Must Now Give Encryption Access to UK

Spyware Targets Telegram

fallback-no-image-384

ZedMail

Corporate email. The Zed! product was awarded EAL3+ certification and Standard Qualification by the ANSSI (French Network and Information Security Agency).
fallback-no-image-189

Cypherix LE

Multi-purpose. Encrypt individual files and encrypted drives for PC’s or create an encrypted USB drive.
fallback-no-image-2591

ZeroNet

Open source peer-to-peer network which uses bitcoin cryptography and the BitTorrent network. Can use the Tor network to hide IP address.
fallback-no-image-1538

TotalVPN

VPN provider. No traffic logs. OpenVPN. 3 simultaneous connections. 61 servers in 27 countries. For important information on choosing a VPN see our Resources page.
fallback-no-image-2233

Dropbear SSH

An open source SSH server and client.
fallback-no-image-1385

Kepard

VPN provider. OpenVPN. 2 simultaneous connections. 9 countries. For important information on choosing a VPN see our Resources page.
fallback-no-image-1760

Endian UTM

Network security. Allows business to securely communicate with equipment and IoT devices. Available as hardware or software.
fallback-no-image-2028

Armour Mobile

Encrypted mobile app for voice, video and messaging. Intended for business, enterprise and governments.
fallback-no-image-2438

Popup OpenVPN

Method and instructions on how to setup your own OpenVPN server in 15 minutes, according to the site.
fallback-no-image-381

EndCryptor

Email client for Windows. End to end encryption using 256 bit key size ChaCha20. Claims backward security against email decryption in case of attack. Encryptor can be used on an air-gaped PC which is
fallback-no-image-764

InfoEncrypt

Free service to encrypt and decrypt your text message, using AES encryption (with PBKDF2, CBC block and random IV). Implemented in Javascript, works in your browser, use without sending your sensitive
fallback-no-image-378

GoodCrypto

Using GPG and Tor it encrypts metadata and keys. Installs on your server that you control. Not their server. Nothing to install on client devices. Enterprise level. Subscription based.