Avoid being a drive-by victim —stop convenient access to your data.

More than 15 years ago Motorola's Information Protection Chief called his forward to our book, Cryptography Decrypted, e Everything —writing about eEverything good along with eEverything bad. (Noticeably) more true now than then.

To help deter attack we developed


Click book for chapters


DoCrypt Crypto Tools

and DES (previous standard) for message, file & folder encryption –and

4 computerized preComputer methods for message encryption.

 Key Store (aka keychain, keyring)One (1) key protects many keys.

creation & storage under your control because anyone that...

makes or shares your keys→  can use your keys.

 Crypto fingerPrinter to authenticate your data

  Logon–Password Manager stores web logon & password data



videos chapters hands-on puzzles

Click Learning

Even though one can always add more security, encryption is the best and

most simple way to protect your and our society's data from bad actors.