FULLY OPEN SOURCE · GPLv3 · HARDWARE-BOUND

HARDWARE-BOUND
FILE ENCRYPTION
OPEN SOURCE.

AVGVSTO fuses your password with the physical fingerprint of any USB drive. Without the exact hardware, decryption is impossible — even with the correct password. Anti‑bruteforce. Duress mode. Cascade ciphers. Zero telemetry. Zero cloud.

AVGVSTO v3.1.3 — AES-256-GCM · ChaCha20 · CASCADE
$ avgvsto encrypt ./classified_docs/ --usb /dev/sdb1
[✓] USB Hardware Fingerprint verified — ID: 3a8f2c...
[✓] PBKDF2 key derivation — 1,000,000 iterations
[✓] AES-256-GCM → ChaCha20-Poly1305 cascade applied
[✓] 47 file(s) encrypted. Originals shredded (3-pass DoD).
[✓] Audit log entry signed and appended.
 
$
0PBKDF2 Iterations
256/512Effective Key Bits
100%Open Source · Auditable
3Platforms: Win / Mac / Linux
Featured on Product Hunt

⬇ WE ARE ON PRODUCT HUNT ⬇

AVGVSTO USB 3.1.3 - Open source. Hardware locked. Military grade. | Product Hunt
CRYPTO CORE

Radical transparency,
military‑grade security

Every cryptographic decision is visible, auditable, and reproducible. No black boxes.

USB HARDWARE FINGERPRINT

serial + volumeID merged into key via PBKDF2. Any USB works, cloning fails.

  • 128-bit hardware salt
  • Clone / emulation resistant

AES-256-GCM / CHACHA20

Authenticated encryption, indistinguishable from random. Choose your cipher or cascade both.

  • AES-NI + AVX2 acceleration
  • Poly1305 MAC authentication

ANTI‑BRUTEFORCE ENGINE

Exponential backoff up to 1 month. Hardware‑bound lockout, no reset bypass.

  • Progressive delay: 5s → 1 month
  • Persistent across restarts

PLAUSIBLE DENIABILITY

Duress password reveals a decoy. Real data is mathematically hidden in the same container.

  • Two independent key trees
  • Forensically indistinguishable

CASCADE ENCRYPTION

AES‑256 → ChaCha20 with independent keys. Future-proof double-layer defense.

  • 512‑bit effective strength
  • Post‑quantum resilient design

TAMPER‑PROOF AUDIT

Immutable signed logs of every access event. HMAC-SHA256 per entry. No deletion possible.

  • Forensic integrity chain
  • Business: full audit trail

Everything included.
Forever free & open.

No paywalls. No feature gates. No artificial tiers. Full cryptographic power in your hands.

No artificial limits

Unlimited files, unlimited batches, unlimited users. The full suite is yours.

CLI + GUI duality

Full command-line automation for power users; polished GUI for everyone else.

Portable mode

Run directly from any USB stick. Zero installation, ideal for air-gapped systems.

Fully auditable source

Every primitive visible. Build deterministically. Verify with confidence. Fork freely.

Secure deletion

3-pass DoD-compliant shredding of temp files and original plaintext after encryption.

100% offline operation

No cloud, no telemetry, no activation servers. Your data never leaves your hardware.

AVGVSTO 3.1.3 — Official Cryptography Whitepaper

Download for your
platform.

Pre-compiled · GPLv3 · No registration · No telemetry

GPLv3 License — inspect, fork, modify, distribute freely
SHA256 & signatures available in the GitHub repository
100% offline · No telemetry · No accounts required

Built with open tools,
trusted by the community

GDSchool Roy Merlo

Frequently asked

01 What happens if I lose the USB?
Your files are irrecoverable — that's the design. Hardware binding guarantees security. For critical data, use the built‑in backup mechanism (local only, encrypted with separate hardware).
02 Can I use any USB drive?
Yes. Any brand, capacity, FAT/NTFS/exFAT. The hardware serial and volume ID are read — not just the label. Cloning the filesystem onto a different drive won't work.
03 Is there any backdoor or recovery?
Absolutely not. No cloud, no key escrow, no master password. Full source transparency guarantees it — audit every line yourself.
04 How does duress mode work?
Provide a special duress password under coercion; it unlocks a decoy file system. Real data remains mathematically hidden. Both containers are forensically identical.
05 What encryption algorithms are included?
AES-256-GCM, ChaCha20-Poly1305, and cascade (AES→ChaCha20) with independent keys — all in the open source version. No algorithm is paywalled.
06 Do I need admin rights?
Portable mode runs directly from USB without installation (standard user rights). Full install on Windows requires admin. Linux and macOS run as user.
07 How does the anti‑bruteforce lockout reset?
The lockout timer is persistent and hardware‑bound. It resets only after successful authentication with the correct USB + password. Each failure exponentially increases the delay, up to 1 month.
08 Is the source code auditable?
Full source on GitHub (GPLv3). All cryptographic primitives are standard libraries. Deterministic builds. Third‑party audits are welcome and encouraged.
09 Does cascade encryption impact performance?
Modern CPUs handle both ciphers with <8% overhead. AES‑NI + AVX2 acceleration is used where available. Even on low-end hardware the difference is negligible for typical file sizes.
10 Can I contribute?
Yes. The project lives on GitHub. Open issues, submit PRs, improve documentation, audit the crypto — everyone is welcome. Stars are appreciated.