Home page

Cryptography and data security

is a set of instruments, tools and solutions delivering privacy and digital data integrity. Applied appropriately within our solutions, it ensures actual information confidentiality accessible only with strict access permissions.
Miniature norms

Operational compliance with cybersecurity norms

Engineering and development of solutions by default compliant with current cybersecurity norms
Compliance with Polish and European policy
  • The General Data Protection Regulation (GDPR), EU Regulation 2016/679
  • The Network Information and Security (NIS2), EU Directive 2022/2557, with the novelization of the Act on the National Cybersecurity System, a preview published on 23 april 2024, implementing NIS2 requirements
  • The Act on the National Cybersecurity System, published on 5 june 2018.
Compliance with the ISO international standards on cybersecurity and data privacy
  • Norm ISO/IEC 27001:2022 — an outline norm on Information Security Management Systems, with key extensions
    • Norm ISO/IEC 27002:2022 — Information security
    • Norm ISO/IEC 27701:2019 — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management
  • Norm ISO/IEC 27017:2015 — Information security for cloud services
  • Norm ISO/IEC 27018:2019 — Protection of personal data in public clouds
  • Norms ISO/IEC 27033-1|2|3|4|5|6|7 — Network security
  • Norms ISO/IEC 27034-1|2|3|5|5-1 — Application security
  • Norm ISO/IEC 27040:2024 — Storage security
  • Norm ISO/IEC 27100:2020 — Cybersecurity
Miniature VPN

Virtual Private Networks and secure data transport systems

Solutions ensuring secure communication between secure severs systems and networks
High performance secure IPSec linksWireguard protocol based virtual private network
  • Optimisation, configuration and multiplex operation of access servers
  • Wireguard links for secure networks and mobile clients
  • Asymmetric cryptography based anonymous (or blind) wireguard links
  • Special purpose wireguard solutions for secure servers systems
  • Solutions preventing wireguard protocol blacklisting
  • Solutions for advanced computer networks and privacy of personal and business communication
Ssh (OpenSSH) protocol based virtual private network
  • Virtualisation and ssh deployment as special purpose VPNs
  • Secure data transport for server systems and specialised networking hardware
  • Ssh as a secure authentication system for network resources
Secondary VPN solutions
  • OpenVPN based virtual private networks and links
  • Cisco AnyConnect based virtual private networks and links
Miniature privacy

Privacy of personal and business communication

Solutions ensuring privacy of digital communication — from authenticated electronic mail to deniable videoconferencing
Secure communication for computer and mobile systemsSecure communication in environments with specialised security requirements
Miniature DeepWeb

Engineering of non-public and anonymous networks

Engineering, deployment, security and optimisation of services for the non-public Internet (deep web) and the hidden Internet (darkweb)
Deep web networksAnonymous networks
Miniature filesystems

Modern filesystems and advanced data storage

Management of storage systems on BSD Unix, Oracle Solaris, Linux and MacOS operating systems
Modern copy-on-write ZFS and Btrfs filesystems
  • ZFS secure boot environments
  • ZFS native cryptography
  • ZFS and Btrfs data management — export, replication and recovery of pools and volumes
  • ZFS and Btrfs data integrity — redundant, ZRAID, mirroring and self-healing pools and volumes
  • ZFS nad Btrfs specialised applications — one-time pools and volumes
  • Hardware optimisation for ZFS and Btrfs filesystems
  • Environment optimisation for ZFS and Btrfs filesystems storing MySQL/PostgreSQL (and other) databases
The APFS filesystems for MacOS
  • Advanced management of APFS properties and volumes
  • APF native cryptography
Standard and traditional filesystems
  • Applied cryptography for the ext4, UFS, NTFS i (Ex)FAT(32) filesystems
Miniature data encryption

Security and data encryption

Encryption and security of confidential and volatile digital data
Personal and business data securityData encryption and retention for work environments and server systems
  • Full disk encryption schemes and scenarios
  • Automatic encryption with self-encrypting disks and pools
  • Advanced database encryption schemes
Practically guaranteed data encryption
  • Encryption of personal data
  • Encryption of data within specialised work environments
  • Encryption of data for critical server systems
Active data security and failsafe protection solutions
  • One-time and temporary encryption
  • Active software and hardware protection systems of encrypted volumes preventing third party intrusion and seizure
Secure data retention
  • Secure erasure of disks and volumes
  • Secure erasure of self-encrypting drives
Miniature Cloud

Private and public clouds and secure online data sharing

Engineering, deployment and management of private and public cloud services
Private cloudsPublic clouds
Miniature blockchain

Security and privacy of blockchain architectures

Solutions for blockchain architectures in programming and work environments
Blockchain architecture engineering basics
  • The blockchain concept as effective information storage
  • Dependency of the blockchain architecture on Internet and information exchange networks
  • Dependency of the blockchain architecture on processing power and hardware resources
Privacy of blockchain architectures
  • Blockchain architectures as concept of information certainty
  • Privacy of blockchain transactions
  • Applicability of public and transparent blockchains
  • Applicability of blockchains completely private
Cryptography and advanced security of blockchain architectures
  • Applied cryptography of existing blockchains
  • Blockchains as core architectures of cryptocurrency engineering
    • Cryptography of particular cryptocurrencies
    • Analysis of cryptocurrency transactions
Blockchain structures in public amd commercial applications
  • Blockchain architectures as distributed database
  • Blockchain architectures as distributed registry or event ledger
  • Engineering of systems based on blockchain architectures
Programming solutions for blockchain architectures
Miniature norms

Operational compliance with cybersecurity norms

Engineering and development of solutions by default compliant with current cybersecurity norms
Compliance with Polish and European policy
  • The General Data Protection Regulation (GDPR), EU Regulation 2016/679
  • The Network Information and Security (NIS2), EU Directive 2022/2557, with the novelization of the Act on the National Cybersecurity System, a preview published on 23 april 2024, implementing NIS2 requirements
  • The Act on the National Cybersecurity System, published on 5 june 2018.
Compliance with the ISO international standards on cybersecurity and data privacy
  • Norm ISO/IEC 27001:2022 — an outline norm on Information Security Management Systems, with key extensions
    • Norm ISO/IEC 27002:2022 — Information security
    • Norm ISO/IEC 27701:2019 — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management
  • Norm ISO/IEC 27017:2015 — Information security for cloud services
  • Norm ISO/IEC 27018:2019 — Protection of personal data in public clouds
  • Norms ISO/IEC 27033-1|2|3|4|5|6|7 — Network security
  • Norms ISO/IEC 27034-1|2|3|5|5-1 — Application security
  • Norm ISO/IEC 27040:2024 — Storage security
  • Norm ISO/IEC 27100:2020 — Cybersecurity
Miniature Cloud

Private and public clouds and secure online data sharing

Engineering, deployment and management of private and public cloud services
Private cloudsPublic clouds
Miniature filesystems

Modern filesystems and advanced data storage

Management of storage systems on BSD Unix, Oracle Solaris, Linux and MacOS operating systems
Modern copy-on-write ZFS and Btrfs filesystems
  • ZFS secure boot environments
  • ZFS native cryptography
  • ZFS and Btrfs data management — export, replication and recovery of pools and volumes
  • ZFS and Btrfs data integrity — redundant, ZRAID, mirroring and self-healing pools and volumes
  • ZFS nad Btrfs specialised applications — one-time pools and volumes
  • Hardware optimisation for ZFS and Btrfs filesystems
  • Environment optimisation for ZFS and Btrfs filesystems storing MySQL/PostgreSQL (and other) databases
The APFS filesystems for MacOS
  • Advanced management of APFS properties and volumes
  • APF native cryptography
Standard and traditional filesystems
  • Applied cryptography for the ext4, UFS, NTFS i (Ex)FAT(32) filesystems
Miniature VPN

Virtual Private Networks and secure data transport systems

Solutions ensuring secure communication between secure severs systems and networks
High performance secure IPSec linksWireguard protocol based virtual private network
  • Optimisation, configuration and multiplex operation of access servers
  • Wireguard links for secure networks and mobile clients
  • Asymmetric cryptography based anonymous (or blind) wireguard links
  • Special purpose wireguard solutions for secure servers systems
  • Solutions preventing wireguard protocol blacklisting
  • Solutions for advanced computer networks and privacy of personal and business communication
Ssh (OpenSSH) protocol based virtual private network
  • Virtualisation and ssh deployment as special purpose VPNs
  • Secure data transport for server systems and specialised networking hardware
  • Ssh as a secure authentication system for network resources
Secondary VPN solutions
  • OpenVPN based virtual private networks and links
  • Cisco AnyConnect based virtual private networks and links
Miniature blockchain

Security and privacy of blockchain architectures

Solutions for blockchain architectures in programming and work environments
Blockchain architecture engineering basics
  • The blockchain concept as effective information storage
  • Dependency of the blockchain architecture on Internet and information exchange networks
  • Dependency of the blockchain architecture on processing power and hardware resources
Privacy of blockchain architectures
  • Blockchain architectures as concept of information certainty
  • Privacy of blockchain transactions
  • Applicability of public and transparent blockchains
  • Applicability of blockchains completely private
Cryptography and advanced security of blockchain architectures
  • Applied cryptography of existing blockchains
  • Blockchains as core architectures of cryptocurrency engineering
    • Cryptography of particular cryptocurrencies
    • Analysis of cryptocurrency transactions
Blockchain structures in public amd commercial applications
  • Blockchain architectures as distributed database
  • Blockchain architectures as distributed registry or event ledger
  • Engineering of systems based on blockchain architectures
Programming solutions for blockchain architectures
Miniature data encryption

Security and data encryption

Encryption and security of confidential and volatile digital data
Personal and business data securityData encryption and retention for work environments and server systems
  • Full disk encryption schemes and scenarios
  • Automatic encryption with self-encrypting disks and pools
  • Advanced database encryption schemes
Practically guaranteed data encryption
  • Encryption of personal data
  • Encryption of data within specialised work environments
  • Encryption of data for critical server systems
Active data security and failsafe protection solutions
  • One-time and temporary encryption
  • Active software and hardware protection systems of encrypted volumes preventing third party intrusion and seizure
Secure data retention
  • Secure erasure of disks and volumes
  • Secure erasure of self-encrypting drives
Miniature privacy

Privacy of personal and business communication

Solutions ensuring privacy of digital communication — from authenticated electronic mail to deniable videoconferencing
Secure communication for computer and mobile systemsSecure communication in environments with specialised security requirements
Miniature DeepWeb

Engineering of non-public and anonymous networks

Engineering, deployment, security and optimisation of services for the non-public Internet (deep web) and the hidden Internet (darkweb)
Deep web networksAnonymous networks