Home page
Cryptography and data security
is a set of instruments, tools and solutions delivering privacy and digital data integrity. Applied appropriately within our solutions, it ensures actual information confidentiality accessible only with strict access permissions.- Cryptography and data security solutions
- Compliance
- Data storage
- Network privacy
- Information privacy
Operational compliance with cybersecurity norms
Engineering and development of solutions by default compliant with current cybersecurity norms
Compliance with Polish and European policy- The General Data Protection Regulation (GDPR), EU Regulation 2016/679
- The Network Information and Security (NIS2), EU Directive 2022/2557, with the novelization of the Act on the National Cybersecurity System, a preview published on 23 april 2024, implementing NIS2 requirements
- The Act on the National Cybersecurity System, published on 5 june 2018.
- Norm ISO/IEC 27001:2022 — an outline norm on Information Security Management Systems, with key extensions
- Norm ISO/IEC 27002:2022 — Information security
- Norm ISO/IEC 27701:2019 — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management
- Norm ISO/IEC 27017:2015 — Information security for cloud services
- Norm ISO/IEC 27018:2019 — Protection of personal data in public clouds
- Norms ISO/IEC 27033-1|2|3|4|5|6|7 — Network security
- Norms ISO/IEC 27034-1|2|3|5|5-1 — Application security
- Norm ISO/IEC 27040:2024 — Storage security
- Norm ISO/IEC 27100:2020 — Cybersecurity
Virtual Private Networks and secure data transport systems
Solutions ensuring secure communication between secure severs systems and networks
High performance secure IPSec links- IPSec for Linux/Unix systems and specialised networking hardware
- IPSec deployments along other encapsulation and tunneling protocols
- Solutions for advanced computer networks, secure server systems, virtualisation of systems and services as well as isolation of services and processes
- Optimisation, configuration and multiplex operation of access servers
- Wireguard links for secure networks and mobile clients
- Asymmetric cryptography based anonymous (or blind) wireguard links
- Special purpose wireguard solutions for secure servers systems
- Solutions preventing wireguard protocol blacklisting
- Solutions for advanced computer networks and privacy of personal and business communication
- Virtualisation and ssh deployment as special purpose VPNs
- Secure data transport for server systems and specialised networking hardware
- Ssh as a secure authentication system for network resources
- OpenVPN based virtual private networks and links
- Cisco AnyConnect based virtual private networks and links
Privacy of personal and business communication
Solutions ensuring privacy of digital communication — from authenticated electronic mail to deniable videoconferencing
Secure communication for computer and mobile systems- Encrypted and authenticated electronic mail
- Encrypted and authenticated textual communicators
- Encrypted and authenticated audio and video communication
- Solutions for secure work environments, advanced computer networks, Virtual Private Networks and secure data transport systems as well as security and data encryption
- Closed loop text, audio and video communication
- Communication completely private and plausibly deniable
- Communication scenarios with one-time or hidden sources
- Communication over anonymous networks — solutions for engineering of non-public and anonymous networks
- Solutions for secure work environments, advanced computer networks as well as Virtual Private Networks and secure data transport systems
Engineering of non-public and anonymous networks
Engineering, deployment, security and optimisation of services for the non-public Internet (deep web) and the hidden Internet (darkweb)
Deep web networks- Engineering of server systems and work environments for deep web operations — solutions for secure work environments, advanced computer networks, secure server systems as well as Virtual Private Networks and secure data transport systems
- Engineering of specialised deep web services — solutions for production services and key server processes, private and public clouds and secure online data sharing, virtualisation of systems and services, isolation of services and processes, Virtual Private Networks and secure data transport systems, privacy of personal and business communication, security and data encryption as well as modern filesystems and advanced data storage
- Engineering, cryptography and management of The Onion Router (TOR) anonymous network
- Engineering, cryptography and management of The Invisible Internet Project (I2P) anonymous network
- Deployment and optimisation of servers systems for anonymous network operations — solutions for secure server systems, virtualisation of systems and services, isolation of services and processes, production services and key server processes, security and data encryption as well as WebOps
- Deployment and optimisation of secure work environments for anonymous networks operations — solutions for secure server systems, virtualisation of systems and services as well as Virtual Private Networks and secure data transport systems
- Deployment and optimisation of secure anonymous network dedicated services — solutions for PHP programming services, Go programming services, Code operations security, code data security, WebOps, secure server systems, production services and key server processes, virtualisation of systems and services, isolation of services and processes, security and privacy of blockchain architectures as well as programming solutions for blockchain architecture and cryptocurrencies
Modern filesystems and advanced data storage
Management of storage systems on BSD Unix, Oracle Solaris, Linux and MacOS operating systems
Modern copy-on-write ZFS and Btrfs filesystems- ZFS secure boot environments
- ZFS native cryptography
- ZFS and Btrfs data management — export, replication and recovery of pools and volumes
- ZFS and Btrfs data integrity — redundant, ZRAID, mirroring and self-healing pools and volumes
- ZFS nad Btrfs specialised applications — one-time pools and volumes
- Hardware optimisation for ZFS and Btrfs filesystems
- Environment optimisation for ZFS and Btrfs filesystems storing MySQL/PostgreSQL (and other) databases
- Advanced management of APFS properties and volumes
- APF native cryptography
- Applied cryptography for the ext4, UFS, NTFS i (Ex)FAT(32) filesystems
Security and data encryption
Encryption and security of confidential and volatile digital data
Personal and business data security- Solutions for secure work environments, advanced computer networks, secure server systems, production services and key server processes, virtualisation of systems and services as well as isolation of services and processes
- Full disk encryption schemes and scenarios
- Automatic encryption with self-encrypting disks and pools
- Advanced database encryption schemes
- Encryption of personal data
- Encryption of data within specialised work environments
- Encryption of data for critical server systems
- One-time and temporary encryption
- Active software and hardware protection systems of encrypted volumes preventing third party intrusion and seizure
- Secure erasure of disks and volumes
- Secure erasure of self-encrypting drives
Private and public clouds and secure online data sharing
Engineering, deployment and management of private and public cloud services
Private clouds- Resource readiness for private clouds — solutions for advanced computer networks, secure server systems, production services and key server processes, virtualisation of systems and services, isolation of services and processes, Virtual Private Networks and secure data transport systems as well as modern filesystems and advanced data storage
- Solutions for private clouds and data sharing within organisations — solutions for advanced computer networks, Virtual Private Networks and secure data transport systems as well as security and data encryption
- Secure private clouds — solutions for Virtual Private Networks and secure data transport systems as well as privacy of personal and business communication
- Non-public and deep web secure private clouds — solutions for engineering of non-public and anonymous networks
- Programming services for private clouds infrastructure — solutions for PHP programming services and Go programming services
- Resource readiness for public clouds — solutions for secure work environments, secure server systems, production services and key server processes, virtualisation of systems and services, isolation of services and processes, Virtual Private Networks and secure data transport systems as well as modern filesystems and advanced data storage
- High performance clouds and public access to high volumes of data — solutions for advanced computer networks and modern filesystems and advanced data storage
- Programming solutions for public clouds — solutions for PHP programming services and Go programming services
- Solutions for GitOps and WebOps
Security and privacy of blockchain architectures
Solutions for blockchain architectures in programming and work environments
Blockchain architecture engineering basics- The blockchain concept as effective information storage
- Dependency of the blockchain architecture on Internet and information exchange networks
- Dependency of the blockchain architecture on processing power and hardware resources
- Blockchain architectures as concept of information certainty
- Privacy of blockchain transactions
- Applicability of public and transparent blockchains
- Applicability of blockchains completely private
- Applied cryptography of existing blockchains
- Blockchains as core architectures of cryptocurrency engineering
- Cryptography of particular cryptocurrencies
- Analysis of cryptocurrency transactions
- Blockchain architectures as distributed database
- Blockchain architectures as distributed registry or event ledger
- Engineering of systems based on blockchain architectures
- Programming services involving blockchain technology — solutions for programming solutions for blockchain architecture and cryptocurrencies, PHP programming services, Go programming services, Code operations security as well as code data security
- Programming services introducing programmatic support for cryptocurrencies — solutions for programming solutions for blockchain architecture and cryptocurrencies
Operational compliance with cybersecurity norms
Engineering and development of solutions by default compliant with current cybersecurity norms
Compliance with Polish and European policy- The General Data Protection Regulation (GDPR), EU Regulation 2016/679
- The Network Information and Security (NIS2), EU Directive 2022/2557, with the novelization of the Act on the National Cybersecurity System, a preview published on 23 april 2024, implementing NIS2 requirements
- The Act on the National Cybersecurity System, published on 5 june 2018.
- Norm ISO/IEC 27001:2022 — an outline norm on Information Security Management Systems, with key extensions
- Norm ISO/IEC 27002:2022 — Information security
- Norm ISO/IEC 27701:2019 — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management
- Norm ISO/IEC 27017:2015 — Information security for cloud services
- Norm ISO/IEC 27018:2019 — Protection of personal data in public clouds
- Norms ISO/IEC 27033-1|2|3|4|5|6|7 — Network security
- Norms ISO/IEC 27034-1|2|3|5|5-1 — Application security
- Norm ISO/IEC 27040:2024 — Storage security
- Norm ISO/IEC 27100:2020 — Cybersecurity
Private and public clouds and secure online data sharing
Engineering, deployment and management of private and public cloud services
Private clouds- Resource readiness for private clouds — solutions for advanced computer networks, secure server systems, production services and key server processes, virtualisation of systems and services, isolation of services and processes, Virtual Private Networks and secure data transport systems as well as modern filesystems and advanced data storage
- Solutions for private clouds and data sharing within organisations — solutions for advanced computer networks, Virtual Private Networks and secure data transport systems as well as security and data encryption
- Secure private clouds — solutions for Virtual Private Networks and secure data transport systems as well as privacy of personal and business communication
- Non-public and deep web secure private clouds — solutions for engineering of non-public and anonymous networks
- Programming services for private clouds infrastructure — solutions for PHP programming services and Go programming services
- Resource readiness for public clouds — solutions for secure work environments, secure server systems, production services and key server processes, virtualisation of systems and services, isolation of services and processes, Virtual Private Networks and secure data transport systems as well as modern filesystems and advanced data storage
- High performance clouds and public access to high volumes of data — solutions for advanced computer networks and modern filesystems and advanced data storage
- Programming solutions for public clouds — solutions for PHP programming services and Go programming services
- Solutions for GitOps and WebOps
Modern filesystems and advanced data storage
Management of storage systems on BSD Unix, Oracle Solaris, Linux and MacOS operating systems
Modern copy-on-write ZFS and Btrfs filesystems- ZFS secure boot environments
- ZFS native cryptography
- ZFS and Btrfs data management — export, replication and recovery of pools and volumes
- ZFS and Btrfs data integrity — redundant, ZRAID, mirroring and self-healing pools and volumes
- ZFS nad Btrfs specialised applications — one-time pools and volumes
- Hardware optimisation for ZFS and Btrfs filesystems
- Environment optimisation for ZFS and Btrfs filesystems storing MySQL/PostgreSQL (and other) databases
- Advanced management of APFS properties and volumes
- APF native cryptography
- Applied cryptography for the ext4, UFS, NTFS i (Ex)FAT(32) filesystems
Virtual Private Networks and secure data transport systems
Solutions ensuring secure communication between secure severs systems and networks
High performance secure IPSec links- IPSec for Linux/Unix systems and specialised networking hardware
- IPSec deployments along other encapsulation and tunneling protocols
- Solutions for advanced computer networks, secure server systems, virtualisation of systems and services as well as isolation of services and processes
- Optimisation, configuration and multiplex operation of access servers
- Wireguard links for secure networks and mobile clients
- Asymmetric cryptography based anonymous (or blind) wireguard links
- Special purpose wireguard solutions for secure servers systems
- Solutions preventing wireguard protocol blacklisting
- Solutions for advanced computer networks and privacy of personal and business communication
- Virtualisation and ssh deployment as special purpose VPNs
- Secure data transport for server systems and specialised networking hardware
- Ssh as a secure authentication system for network resources
- OpenVPN based virtual private networks and links
- Cisco AnyConnect based virtual private networks and links
Security and privacy of blockchain architectures
Solutions for blockchain architectures in programming and work environments
Blockchain architecture engineering basics- The blockchain concept as effective information storage
- Dependency of the blockchain architecture on Internet and information exchange networks
- Dependency of the blockchain architecture on processing power and hardware resources
- Blockchain architectures as concept of information certainty
- Privacy of blockchain transactions
- Applicability of public and transparent blockchains
- Applicability of blockchains completely private
- Applied cryptography of existing blockchains
- Blockchains as core architectures of cryptocurrency engineering
- Cryptography of particular cryptocurrencies
- Analysis of cryptocurrency transactions
- Blockchain architectures as distributed database
- Blockchain architectures as distributed registry or event ledger
- Engineering of systems based on blockchain architectures
- Programming services involving blockchain technology — solutions for programming solutions for blockchain architecture and cryptocurrencies, PHP programming services, Go programming services, Code operations security as well as code data security
- Programming services introducing programmatic support for cryptocurrencies — solutions for programming solutions for blockchain architecture and cryptocurrencies
Security and data encryption
Encryption and security of confidential and volatile digital data
Personal and business data security- Solutions for secure work environments, advanced computer networks, secure server systems, production services and key server processes, virtualisation of systems and services as well as isolation of services and processes
- Full disk encryption schemes and scenarios
- Automatic encryption with self-encrypting disks and pools
- Advanced database encryption schemes
- Encryption of personal data
- Encryption of data within specialised work environments
- Encryption of data for critical server systems
- One-time and temporary encryption
- Active software and hardware protection systems of encrypted volumes preventing third party intrusion and seizure
- Secure erasure of disks and volumes
- Secure erasure of self-encrypting drives
Privacy of personal and business communication
Solutions ensuring privacy of digital communication — from authenticated electronic mail to deniable videoconferencing
Secure communication for computer and mobile systems- Encrypted and authenticated electronic mail
- Encrypted and authenticated textual communicators
- Encrypted and authenticated audio and video communication
- Solutions for secure work environments, advanced computer networks, Virtual Private Networks and secure data transport systems as well as security and data encryption
- Closed loop text, audio and video communication
- Communication completely private and plausibly deniable
- Communication scenarios with one-time or hidden sources
- Communication over anonymous networks — solutions for engineering of non-public and anonymous networks
- Solutions for secure work environments, advanced computer networks as well as Virtual Private Networks and secure data transport systems
Engineering of non-public and anonymous networks
Engineering, deployment, security and optimisation of services for the non-public Internet (deep web) and the hidden Internet (darkweb)
Deep web networks- Engineering of server systems and work environments for deep web operations — solutions for secure work environments, advanced computer networks, secure server systems as well as Virtual Private Networks and secure data transport systems
- Engineering of specialised deep web services — solutions for production services and key server processes, private and public clouds and secure online data sharing, virtualisation of systems and services, isolation of services and processes, Virtual Private Networks and secure data transport systems, privacy of personal and business communication, security and data encryption as well as modern filesystems and advanced data storage
- Engineering, cryptography and management of The Onion Router (TOR) anonymous network
- Engineering, cryptography and management of The Invisible Internet Project (I2P) anonymous network
- Deployment and optimisation of servers systems for anonymous network operations — solutions for secure server systems, virtualisation of systems and services, isolation of services and processes, production services and key server processes, security and data encryption as well as WebOps
- Deployment and optimisation of secure work environments for anonymous networks operations — solutions for secure server systems, virtualisation of systems and services as well as Virtual Private Networks and secure data transport systems
- Deployment and optimisation of secure anonymous network dedicated services — solutions for PHP programming services, Go programming services, Code operations security, code data security, WebOps, secure server systems, production services and key server processes, virtualisation of systems and services, isolation of services and processes, security and privacy of blockchain architectures as well as programming solutions for blockchain architecture and cryptocurrencies