In 2013, the people of the world learned that our privacy was being violated. (Washington Post, The Guardian, ZDnet) This 'program' is known as PRISM, and involves the United States Federal Government and many multinational corporations. In the wake of this, there has been a great backlash. (Startpage, WNYC, Prism-Break) With the increasing need for security and privacy, the base standards for encryption need to be increased. 128-bit encryption isn't enough anymore.



     Krypta uses three layers of multiple encryption. Each file or volume is encrypted with one layer of 256-bit AES, one layer of 256-bit Twofish, and one layer of 256-bit Serpent ciphers. Each layer of encryption uses an independent SALT (Random hash), an independent password (If the user permits so by checking "Use three passwords") and independent hashing functions.

These independent variables help to keep each layer as separate and independent from each other as possible. This maximizes and utilizes the benefit of multiple encryption. After all what is more secure: a house with the doors locked, or a house with the doors locked, security cameras on the house, and an attack dog waiting inside the house?

        A keyfile may also be used to fully maximize security. The keyfile may be any file the user wishes from a picture file to a video file, just make sure to store the keyfile in a safe place as the file cannot be decrypted without it.

        The keyfile works by supplying separate amount data to the algorithm that isn't accessible from the Salt or password. A cracker could discover your password(s) and still wouldn't be able to properly decrypt your file because they don't have that other data supplied by the keyfile.

        What makes Krypta different from other encryption software such as VeraCrypt? Krypta and VeraCrypt have much in common, but differ on approach. Both Krypta and VeraCrypt allow the free acquisition of their source code, Krypta uses the GNU GPL3 license, while VeraCrypt uses the Apache 2.0 License. VeraCrypt's encryption algorithms are the same as Krypta's (AES-Twofish-Serpent), however VeraCrypt uses only one single password for the entire encryption process. All a cracker needs to do is crack one password and they have full access to the file/volume. Krypta allows the use of 3 separate passwords for the entire encryption process. This makes a cracker's life more difficult because they have to crack 3 independent passwords and have to start over with each one.      



         Both Krypta and VeraCrypt offer cross-platform support. This means that if you encrypt a file/volume on Windows 10, you will be able to decrypt it on OSX, or Ubuntu.

        VeraCrypt's method of volume creation also differs from Krypta's. VeraCrypt creates an entire disk partition which may take up as much space as the user designates. This isn't the best approach if you are limited on your disk space. Why create a 100GB
volume if you're only ever going to use 3GB? This just wastes space on your hard disk. This method also isn't very mobile; meaning that you can't copy it to a 8GB flash drive if your volume is 50GB. Most VeraCrypt volumes reside on the host drive, which isn't safe especially if your disk crashes or gets removed or your laptop gets stolen.

        Krypta's volume creation method is dynamically allocated, similar to a dynamically allocated virtual machine. Krypta's volume algorithm places your files into a separate folder and acts as a protected layer over that folder. The volume only consumes as much space as the files in the folder do. Therefore, if the files you
want to encrypt in a volume only use a total of 500MB, the volume will only consume 500MB and no more. This is much more mobile and could easily be copied
to a safe flash drive or to a secure cloud storage for safe keeping.



     The program, naturally is GNU free software, however this app is not free as in 'free food,' it is free as in free speech. Unsandboxed versions are available for Linux (amd64), Windows, and Mac. I intend to charge $2 for the unsandboxed versions, this is for a few reasons; unsandboxed versions are not contained and have access to the full system, therefore it is sort of a 'use at your own risk'; the site that hosts the software also takes a percentage out so in order to make a profit, it must be $2.



     If you wish to pay in cryptocurrencies, send me an email, with the subject being what kind of purchase you are making, telling me which platform you want to purchase, which currency you want to use, and the address you will be sending it from.


     So for instance is you want to make a bitcoin purchase of the Windows version, the subject line will say, "Bitcoin purchase" and the body of the email will state that you want to purchase the Windows version of Krypta, and your bitcoin address, so I can verify where the money is coming from and when I receive payment. Once I receive payment, I will reply to your email, sending you the app. Please allow, at most 72 hours for me to receive payment, and send you the app. I know these cryptocurrency transactions are faster than that, but I may not be able to respond right away.


Send your currency equivalent of $2.00USD to one of the addresses below:

Bitcoin: 14WsDizzpttYQ2RXu2op5qLhQ23e9PzNVH         

BitSwift: bHmzhzX1H3VSqmVVVSMx2rxpokiWa4dA9c

Dogecoin: DL2TB9vQh2CxdntieXNJz984YkympDg9HR

BitcoinDark: REctmRZE9ZaufATHqyGcSiTZkXqhyyzVvp

Blackcoin: BRmmgQZa2VMGcNApmKMW22m9RqZym4UcwU

Checkcoin: CKWWgAUAaHKsRFqp97nnqtiL3L4kbP8wFG

Darkcoin: XdfcVgnAfqWob18f4HzsBcZpGErLX3SKq9

DogecoinDark: D9bkxQHT2yX5jUMdfNj9BAe7HeoCcx2beJ

Fedoracoin: Efmd8WT1tfZvx5KQnkz6CToRf63wr5qvNx

Karmacoin: KJmuQyDTPxVfrBsY4C6HMNP1DN8s5zZ7Vz

Litecoin: LUETvFhfz3H9WcWYuk1A5askPwGgPXJuAB

Maxcoin: mR99JosVY9jLcxKsXVX9qFtwuZceCtwRBz

Namecoin:  N6WUjzMxsuApPPob9ah2mgsY7ef2mkdk73

Paycoin: PWWjWPsEs1Xx2DRymWanjnr8pxEvz7UDx8

Peercoin: PKLdiBDoCBvi5h2vxQeQZdsLy2nNGcXLij

Worldcoin: WZ15v9zAanBMB8Xg8mszDsAiD2suLBc2VN

Ziftercoin: ZKRBS5JS8T1tB1bZbfg4AkW83B21JKrQCE


     Krypta does NOT have any back doors for the NSA. I respect and support privacy and security and therefore will never add backdoors. You may look at the source code and see for yourself.

     Krypta is a TrueCrypt/VeraCrypt alternative. Repeat, Krypta is a TrueCrypt/VeraCrypt alternative, not a replica. It does not have all of the exact same features as TrueCrypt or VeraCrypt, but it does supply the basic features such as file and volume encryption. Krypta will never be an exact replica of either TrueCrypt nor VeraCrypt, just a helpful alternative. New tutorials can be found for Krypta here and here. New tutorials can be found for Krypta here and here.


The source code for Krypta can be found here.


 For more information about online privacy you can click here, for an overview of VPNs and proxys.


Member of The Internet Defense League
Follow Me on Pinterest