Worry About Your Privacy !?
Here's Great Wall of Secrecy.

More info

Secure email attachment transmission

More info

Securely archive files and folders

More info

Hardware restriction capability

More info

Secured files temporal decoding limit

More info

Quantum computers resistant solution

Scroll Down

products

Alph@TaV Vault

The Ultimate Protection of Digital Data

Alph@TaV Vault This software protects your data by allowing you to encrypt all types of files and folders, offering you absolute protection against unauthorized access.Read full description

Alph@TaV Vault is intended for everyone and is, by design, independent of any external control.

Digital safety and identity theft are serious risks for anyone using a computer to store data.

Key features

  • Protect your data with a maximum key size of 27'000 bits.
  • Decide on which computer or hardware your data can be decrypted.
  • Decide when your files can be deciphered by adding a time limit for decryption.
  • In the case of an unauthorized decryption attempt, decide whether your data should be destroyed.
  • Send secure attachments on non-secured lines.
- (Supported OS : Windows 7+) - Release notes
Certified SSL EV Code Signed Application

FREEMIUM

0 CHF

Free to use forever, but with limited features.

Duration : Forever

Popular

PERSONAL

48 CHF

Contains all the features for day to day private use.

Duration : 3 months

Best Value

PROFESSIONAL

252 CHF

Contains all the features to ensure the highest level of data protection.

Duration : 1 year

Every subscription for an Alph@TaV Vault License contains the following Build-in options

Ciphering Key Length
3'000 / 9'000 / 27'000 Bits
Transmission by email
Protected data can be sent by email
Hardware-Lock
Main-Protected + Keys-Files can be Hardware-Locked
Authorized Machines
Restrict physical machines by Ex0-UiD's to be authorized to decode files
File shredding
Apply any shredding scenario (Sources/Protected/Both) up to 51-passes
Destruction-On-Fail
Protected data can be set to be deleted in case of bad decoding parameters
Decoding files Validity
You can set protected files to be able to be decoded only during a defined period
  • The Alph@TaV Vault software must be installed on a physical computer, configured with a compatible and up-to-date Microsoft Windows (7+) operating system.
  • The user will be able to use one of our integrated software licenses or activate an online license.
  • The Alph@TaV Vault software is not intended to be installed or used on virtual machines, nor to be used through remote access protocols on physical machines.
  • To activate an online license, the user must use a valid e-mail address.
  • Temporary e-mail addresses or TrashMail or any such other system are not allowed and will prevent you from activating a license.
Scroll Down

What We Do

We are providing data security related products and applications with an innovative approach.

Ex0-SyS is specialized in the creation of technological solutions exclusively by re-mastering the initial conditions underpinning all information systems known to date.

Alph@TaV Systems

Alph@TaV Systems is a suite of software and hardware projects that are all based on our cutting edge algorithm « Alph@TaV Data-Fragmentation ».

Alph@TaV Vault

Alph@TaV Vault uses a cutting edge algorithm to protect your data to archive or transmit them by e-mail.

  • 100%
    Status : completed
Go to download page

Alph@TaV Data-Streamer

Developer tool that allow to make any data stream seekable even if it was not ready for that.

  • 90%
    Status : packaging

Alph@TaV Network

Secured P2P transmissions over NON secured networks. (A@T Data-Frag. / Prime Numbers / Blockchain Tech)

  • Status : planned

Alph@TaV Intercom

Next generation secure comm application allowing management of transmitted information.

  • Status : planned

Alph@TaV Data-Fingerprint

Unique fingerprint extraction tools for digital data without the need for a complete reading of files.

  • 70%
    Status : in progress

Alph@TaV Data-Slimmer

Data size reduction and very high level compression software.

  • Status : proof of concept

Alph@TaV Cloud

Personal clouds (online service or personal hdd) for data securisation and very high size reduction.

  • Status : planned

Alph@TaV Filesystem

Secure hive filesystem for high data density with high availibility.

  • Status : planned

Alph@TaV Pod

All-in-One Alph@TaV Systems tools bundled inside an hardware portable embedded solution.

  • Status : planned

Ex0-Tools Softwares & Services

All other applications and services developed by Ex0-SyS outside of the Alph@TaV Systems project .. ... .....

Ex0-UiD (Unique Identifier)

Secure any transaction using one-way unique hardware identification.

  • 90%
    Status : packaging

Ex0-License-Manager

Next generation software license hardware protection against hacking.

  • 90%
    Status : packaging

Ex0-Prime-Toolbar

Algorithmically live generation and checking of prime numbers up to 256 digits for free.

  • 100%
    Status : completed
Go to website

Ex0-Prime-Advanced-Tool

Algorithmically generate list and check of primes without size limit.

  • Status : planned

Ex0-Pi-Phi-Cubit-Calc

Solve integers from irrational numbers such as Pi, Phi and the Cubit number.

  • 80%
    Status : in progress
Scroll Down

collaborate

Link talents to increase creativity

If you think your goals are in line with ours and our values are compatible with yours, do not hesitate to send us your resume and a message explaining your motivation.

We may have the opportunity to collaborate within one of our Conceptualization, Research and Development teams.

We will take the time to answer you!

Message
Details
We don't, and will never, send spam
Upload document

Contact Us

Get in touch with us if you have any questions regarding our projects and/or our products.

Requestor category
Details
We don't, and will never, send spam
Message
Scroll Down

Who We Are

Ex0-SyS is a Swiss company exclusively focused on the creation of new technologies, including ethical processing and digital data security.

By going back to the beginning of known concepts and projecting one’s mind outside of the box (notion of scales), one will access what remains invisible to those who do not follow this fundamental principle.

That is how we create technological solutions based essentially on the reordering of the initial conditions forming the basis of all information systems known to date.

Anything is possible as long as one isn’t aware that it’s impossible.

The 10 unique methods for innovation

  • Learn, to acquire Knowledge and invent
  • Understand, to acquire Science and create
If reordering the information to its fundamental state allowed a definitive answer to certain known technical challenges, which method would one choose ?

Our objectives

Our objectives are the security and protection of data transmission systems and of the personal data of users. Our tools are designed to combat global electronic surveillance that interferes with our private and professional lives, everywhere, at any time and without our knowledge.

Our values

Our values can be summed up in two words: freedom and responsibility. Freedom to keep control of all our personal information. Responsibility to assume and account personally for our actions without being responsible for the injustices of others or produced by a power system we have not chosen, but which is unfortunately admitted by the silent majority. We oppose a public order based on a hierarchical system, which obliges individuals to submit to unlimited permanent control. Our IT tools are created to allow users to maintain control over individual freedoms which are specific to the right of everyone. Our mission: to prevent our countries’ governments from completely perverting and transforming the whole reality of digital information into a fully Huxley world.

Charter

As a high-tech company, especially one that is focused on security, we need to build a trustworthy, authentic and sustainable relationship with our customers.

Therefore Ex0-SyS is committed to the following five fundamental principles:

  • Trust
  • Transparency
  • Security
  • Utility
  • Swiss Quality
Five commitments for the best personal data protection policy for everyone.

Scroll Down