
Open Source Encryption Software
"It's a simple spell, but quite unbreakable"
- Doctor Strange

Open Source
Podax source code is available for you to view, we have nothing to hide

Network Free
Purely offline application, no inbound/outbound network calls made

Phantom Keys
Keys are never stored and are unrecoverable after encryption
Data Privacy
Built For You
You shouldn't have to be a computer expert to protect your information in the cyber space.
Podax was built with individuals in mind. Everybody has a right to privacy, and its our mission to enable everybody to exercise it.
Whether its information you want shielded from hackers, the NSA or anyone else - use Podax to encrypt your files in a way that only you can decypher.
Encryption
Confidence
Podax has implemented best-in-class, open-source encryption - all for free for you to use.
The application currently uses AES 256 CTR encryption, an industry standard encryption that's used by government agencies to transmit Top-Secret/Classified information...
Don't believe us? You can view our source code by clicking the GitHub icon in the top right.n
Private
Key Handling
Podax doesn't save passwords, so you can be confident that you're encrypting data without a trace.
This application will also recommend strong encryption keys for you to use, though you are free to use any key you want.
The key generation method we use is similar to cryptocurrency wallets - our vocabulary list is the same one that Monero uses.