3.1.3
AVGVSTO fuses your password with the physical fingerprint of any USB drive. Without the exact hardware, decryption is mathematically impossible — even if the password is known. Anti‑bruteforce, duress mode, 100% offline. VeraCrypt, BitLocker, AxCrypt are obsolete.
serial + volumeID merged into key via PBKDF2. Any USB works, cloning fails.
Authenticated encryption, indistinguishable from random. Pro: choose algorithm.
After 3 failures, exponential backoff up to 1 month. Hard‑lock without reset USB.
Duress password reveals decoy files. Real data mathematically hidden. (Pro/Business)
Business: AES‑256 → ChaCha20, independent keys. Future‑proof.
Business: signed, immutable logs of every access attempt.
| Feature | AVGVSTO | VeraCrypt | BitLocker | AxCrypt |
|---|---|---|---|---|
| Hardware USB Binding (any drive) | Serial + volumeID | keyfiles only | TPM only | |
| Anti‑Bruteforce (exponential lockout) | up to 1 month | PIM delay only | TPM lock | |
| Plausible Deniability (duress) | Decoy password | hidden volumes | ||
| Cascade AES+ChaCha20 | Business version | (AES only) | ||
| 100% Offline / No Cloud | Air‑gap | Yes | MS account | cloud sync |
| Tamper‑Proof Audit Logs | Business | |||
| File‑Level Attempt Limit | Yes |












AES‑256, USB binding, anti‑bruteforce. Limited batches.
Unlimited files, ChaCha20, duress mode, CLI, portable.
Cascade encryption, audit logs, silent deploy.
Native compiled, self-contained, air‑gap ready. No runtime required.
📦 also available via `winget`, `brew`, `apt` (community)