Open Source Encryption Software

"It's a simple spell, but quite unbreakable" - Doctor Strange

Open Source

Podax source code is available for you to view, we have nothing to hide

Network Free

Purely offline application, no inbound/outbound network calls made

Phantom Keys

Keys are never stored and are unrecoverable after encryption

Data Privacy Built For You

You shouldn't have to be a computer expert to protect your information in the cyber space.

Podax was built with individuals in mind. Everybody has a right to privacy, and its our mission to enable everybody to exercise it. Whether its information you want shielded from hackers, the NSA or anyone else - use Podax to encrypt your files in a way that only you can decypher.

Encryption Confidence

Podax has implemented best-in-class, open-source encryption - all for free for you to use.

The application currently uses AES 256 CTR encryption, an industry standard encryption that's used by government agencies to transmit Top-Secret/Classified information... Don't believe us? You can view our source code by clicking the GitHub icon in the top right.n

Private Key Handling

Podax doesn't save passwords, so you can be confident that you're encrypting data without a trace.

This application will also recommend strong encryption keys for you to use, though you are free to use any key you want. The key generation method we use is similar to cryptocurrency wallets - our vocabulary list is the same one that Monero uses.

Download Windows

Download MacOS

Download Linux