PENTALPHA EIRL

Security Software

Site Under Construction

We are currently working to add cryptography with the ECC (Elliptic Curve) algorithm. This new technique requires both the encoder and the decoder to exchange the public key and use the private key to decrypt.

Since our policy has always been that our programs do not interact with networks or store keys internally, we are looking for a suitable and secure solution for key exchange.

Currently, our programs use AES, Blowfish, Rijndael, and Twofish algorithms. In our next versions, we will only use Blowfish, Twofish, and ECC to ensure compatibility between platforms.

We have considered adding a feature to send encrypted text but have discarded it to maintain our policy of not allowing interaction with the device. For now, the application will remain isolated, and users will be responsible for copying and pasting the text.

Our software can be customized for specific changes requested by a client, or we can design one based on specific requirements.

05:35:50

DressOfShadows: an application that we can customize to your specific requirements

Logo DressOfShadows Contact Us