{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreigme7y6p22k7vdf3wznxlxsjjzcaoghd6pkrcbqjgykjtsaoikkby",
    "uri": "at://did:plc:haakkg7y3xdghcdmprxeexso/app.bsky.feed.post/3mmiewwrewv72"
  },
  "path": "/t/recommending-an-encryption-software-by-paranoia-works/38091#post_1",
  "publishedAt": "2026-05-23T02:05:38.000Z",
  "site": "https://discuss.privacyguides.net",
  "tags": [
    "paranoiaworks.mobi",
    "Paranoia Works Encryption Software",
    "Threefish - Schneier on Security",
    "Paranoia Works Encryption Tools 🛡️ | Downloads",
    "https://linkenc.net/",
    "Reddit - Please wait for verification"
  ],
  "textContent": "### Website\n\nparanoiaworks.mobi\n\n### Paranoia Works Encryption Software\n\nHome page of the Secret Space Encryptor for Android, Paranoia Text Encryption for iOS (iPhone/iPad/iPod), Paranoia Text Encryption for PC, S.S.E. File Encryptor for PC.\n\n### Short description\n\nEncrypts file and text using state-of-the-art cryptographic algorithms. Also has a quantum-secure KEM key exchanger and steganography tool.\n\n### Why I think this tool should be added\n\nI got to know this software a few days ago while searching for encryption algorithms that has a key size greater than 256 bit. Cryptographer Bruce Schneier’s blogpost( Threefish - Schneier on Security ) about Threefish contained a link to this product(not any sort of an affiliation, just to show a real-world implementation of the Threefish algorithm).\n\nThis software satisfies the following criteria for encryption software:\n\n  1. It is cross platform and open source. Source code can be found at Paranoia Works Encryption Tools 🛡️ | Downloads\n  2. File encryption app support encryption/decryption on Windows, MacOS, Linux, Android, and iOS\n\n\n\n*It does not have disk encryption functionality, so the relevant criteria do not apply to this software.\n\nAlthough I’ve never heard of this before, it seems to have been around since 2011(at least, that’s what I can find on the Google Play Store history). And although I didn’t know about Paranoia Works itself, the online link encryption tool(https://linkenc.net/) I’ve been using for many years was also made by them. They also provide other security tools(password generator, URL has generator, file/text encryption) that fully functions offline inside the browser.\n\nTo mention a few drawbacks,\n\n  1. The UI is quite old. It’s simple but surely not modern.\n  2. It lacks any external audit\n\n\n\nOther than that, I can’t find any specific reason to NOT recommend this software. And I also couldn’t find any notable reviews of this software on Google either. I did stumble upon this reddit post( Reddit - Please wait for verification ), which says that the steganograpy tool leaves a copyright signature, but when I checked it myself, it didn’t leave any JPEG comments.\n\nThe only other issue I found is that the Paranoia C4 algorithm, which is a cascade of Threefish–Serpent–AES–SHACAL2, is shown in the program to have a 2048-bit of security, while strictly speaking, it doesn’t. I sent an email about this and below is the reply I received from the devs(which to me, sounds quite reasonable).\n\n“Paranoia C4\nThe number simply represents the key length. This is commonly used for cascades — I haven’t seen VeryCrypt in a long time, but its predecessor TrueCrypt used 768-bit for a cascade of three 256-bit ciphers (just like double DES used 112-bit). And it has to be labeled somehow. If I wrote some number between 256 and 1024, I’d have to explain MitM attacks to someone every other day and why it’s not 2048, and every third day I’d end up in academic debates with people who know what it means but still think that from perspective X, assuming attack Y, it should really be number Z instead. These discussions are a complete waste of time anyway, because attacking such a cascade would require 10^231 bytes of storage, so even if we managed to store one byte in every atom of the observable universe, you’d still need 10^151 universes’ worth of storage — damn, here comes the academic debate again :).”\n\nAnd for the external audit, devs replied:\n“External audit:\nThe application will never make enough money to pay for a real external audit — not even in a thousand years.”\n\nFYI, the software supports the following algorithms for file and text encryption: AES(256), RC6(256), Serpent(256), Twofish(256), GOST28147(256), Blowfish(448), Threefish(1024), SHACAL-2(512). And it supports ML-KEM-512, 768, 1024 for KEM key exchange. Steganography algorithm can be chosen from F5 or J-UNIWARD.\n\n### Section on Privacy Guides\n\nEncryption Software",
  "title": "Recommending an encryption software by Paranoia Works"
}