Do not waste time.
Let's develop what has not been !
Unbreakable NON+Crypted Encoding System.
Alph@TaV Vault secures your data, allowing you to encode all types of files and folders, giving you absolute protection against all unauthorized third parties. Read full description
Alph@TaV Vault is intended for everyone and is, by design, independent from any outside control.
Digital safety and identity theft are serious risks for anyone using a computer to store data.
Need to secure your data or send securely by email for one-off projects in a short period.
Need to temporarily secure your data or sent it securely by email for medium duration projects.
Need to frequently store or send sensitive data by email for long-term projects or increase security needs.
In order to purchase a license, you need to DOWNLOAD the application, then click on "Request and Buy License" from the License Request screen.
Since the licenses are hardware locked, the application has to transmit your hardware unique identifier to the website.
Alternatively, you can copy and paste from the application by clicking here
Please note that for Encoder Limited Demo and Encoder Free Trial licenses, there is an imposed time restriction during which secure data can be decoded.
The imposed time restriction is limited to 10 days in the Encoder Limited Demo version and 30 days in the Encoder Free Trial version.
The limitation begins when the user starts the process of protecting data with the Alph@TaV Vault application.
The users may restrict the decoding validity period for secure data according to their needs or have the maximum time allowed in the version of the application in use.
After this delay, it will be definitively and irremediably impossible to decode the secure data: even our Ex0-SyS team will not be able to do anything about it.
This feature can also be used as an additional level of security to help the user maintain control over the validity of secure data, for example, when it is transmitted by email.
Thanks to Alph@TaV Vault, one can directly attach secure files to e-mails, indicating a shorter or longer decoding validity period, so that the transmitted data can only be decoded during a specific time interval.
In addition, for Encoder Limited Demo and Encoder Free Trial licenses, the optional settings for the lengths of the final encryption keys are limited to 3’000 bits for the Encoder Limited Demo version and 9’000 bits for the Encoder Free Trial version.
Only Encoder Full Subscriptions license versions have the highest level of final encryption keys up to 27’000 bits.
This option can still be unlocked during the promotional campaigns of the Alph@TaV Vault software in its Encoder Free Trial version.
Also related to Encoder Limited Demo and Encoder Free Trial licenses, there is as well a limitation on the maximum size of data that can be secured per encoding session.
The Encoder Limited Demo version does not require any activation, but it can only be used once per physical computer for a restricted period of 10 days, during which all the limitations mentioned above are applicable.
In addition to these limitations, in the Limited Demo Encoder version, hardware lock options are not available when one chooses to store secure data on external media (USB sticks or other).
However, the user will have access to these hardware restriction options by activating the free version of the Encoder Free Trial license, valid for a period of 30 days and renewable indefinitely for as long as the application is released under the SPECIAL OFFER Label.
All these conditions remain valid until the stopping of the Alph@TaV Vault software distribution under the SPECIAL OFFER Label !
Ex0-SyS is specialized in the creation of technological solutions exclusively by re-mastering the initial conditions underpinning all information systems known to date.
Alph@TaV Systems is a suite of software and hardware projects that are all based on our cutting edge algorithm « Alph@TaV Data-Fragmentation ».
Alph@Tav uses a cutting edge algorithm to protect your data.
Developer tool to redirect any data source to any destination. (e.g. RAM to Network to HDD)
Secured P2P transmissions over NON secured networks.
Next generation secure communication application allowing managmeent of transmitted information and files.
Unique fingerprint extraction tools for digital data without the need for a complete read of files.
Data size reduction and very high level compression software.
Online Data Securisation and High Level Size Reduction Service.
Secure hive filesystem for high data density with high availibility.
All-in-One Alph@TaV Systems bundled solution hardware embedded security tools for personal use.
Ex0-Tools Softwares & Services
All other applications and services developed by Ex0-SyS outside of the Alph@TaV Systems project .. ... .....
Securize any transaction using one-way unique hardware identification.
Next generation software license hardware protection against hacking.
Algorithmically live generation and checking of prime numbers up to 256 digits.
Algorithmically generate list and check of primes without size limit.
Solve integers from irrational numbers such as pi, phi and the cubit number.
We are a start-up company and we need all the help that we can get. If You share our values and if You think that our objectives are worthy of achieving, please donate!
If you share our goals and values, please help us maintain our independence. Although discretion and modesty are part of our DNA, do not hesitate to contact us, do not hesitate to ask to meet us. If you do not know our country yet, it could be an opportunity to discover a small country, but a world leader in the fields of technological innovation and more particularly the new information and communication technologies (NICT). This is certainly one of the reasons why the Internet was invented in Switzerland (EPFL / CERN).
Thank you in advance for your support and hope to have the opportunity to meet you in Switzerland.
By going back to the beginning of known concepts and projecting one’s mind outside of the box (notion of scales), one will access what remains invisible to those who do not follow this fundamental principle.
That is how we create technological solutions based essentially on the reordering of the initial conditions forming the basis of all information systems known to date.
Anything is possible as long as one isn’t aware that it’s impossible.
We may have the opportunity to collaborate within one of our Conceptualization, Research and Development teams.
We will take the time to answer you!