AES-256-GCM · CHACHA20 · PBKDF2-1M

HARDWARE-BOUND
FILE ENCRYPTION
DESTROYS THE REST

AVGVSTO fuses your password with the physical fingerprint of any USB drive. Without the exact hardware, decryption is mathematically impossible — even if the password is known. Anti‑bruteforce, duress mode, 100% offline. VeraCrypt, BitLocker, AxCrypt are obsolete.

0PBKDF2 ITERATIONS
256AES KEY BITS
100%OFFLINE · AIR-GAP
3OS · WIN/MAC/LINUX
CRYPTO CORE

Built for total dominance

USB HARDWARE FINGERPRINT

serial + volumeID merged into key via PBKDF2. Any USB works, cloning fails.

  • 128-bit hardware salt
  • Emulation impossible

AES-256-GCM / CHACHA20

Authenticated encryption, indistinguishable from random. Pro: choose algorithm.

  • AES-NI acceleration
  • Poly1305 MAC

ANTI‑BRUTEFORCE ENGINE

After 3 failures, exponential backoff up to 1 month. Hard‑lock without reset USB.

  • 3 attempts → 1h lock
  • 6 attempts → 1 month

PLAUSIBLE DENIABILITY

Duress password reveals decoy files. Real data mathematically hidden. (Pro/Business)

  • Two separate key trees
  • Decoy FS

CASCADE ENCRYPTION

Business: AES‑256 → ChaCha20, independent keys. Future‑proof.

  • 512-bit effective
  • Post‑quantum resistant?

TAMPER‑PROOF AUDIT

Business: signed, immutable logs of every access attempt.

  • Ed25519 signatures
  • No deletion possible
OBLITERATION MATRIX

AVGVSTO vs pretenders

FeatureAVGVSTOVeraCryptBitLockerAxCrypt
Hardware USB Binding (any drive) Serial + volumeID keyfiles only TPM only
Anti‑Bruteforce (exponential lockout) up to 1 month PIM delay only TPM lock
Plausible Deniability (duress) Decoy password hidden volumes
Cascade AES+ChaCha20 Business version (AES only)
100% Offline / No Cloud Air‑gap Yes MS account cloud sync
Tamper‑Proof Audit Logs Business
File‑Level Attempt Limit Yes
LICENSING

Own your encryption

€0

AES‑256, USB binding, anti‑bruteforce. Limited batches.

  • AES-256-GCM encryption
  • USB hardware key binding
  • Brute-force protection
  • Secure delete (3-pass)
  • 5 files/batch · 250 files/day
  • No duress
  • No CLI access
  • No portable mode
Free download

in development

Unlimited files, ChaCha20, duress mode, CLI, portable.

  • Everything in Free
  • ChaCha20-Poly1305 cipher
  • Duress/decoy password
  • 100 files/batch · Unlimited/day
  • Full CLI access
  • Portable mode (USB config)
  • Duress / decoy password
  • Priority email support
in development

in development

Cascade encryption, audit logs, silent deploy.

  • Everything in Pro
  • Unlimited files/batch
  • Cascade cipher (AES + ChaCha20)
  • Full audit log
  • Silent deployment (JSON config)
  • Backup system (Local)
  • Dedicated support
  • Advanced USB Managementgold
in development

What we use and what we rely on

AVGVSTO 3.1.3

Native compiled, self-contained, air‑gap ready. No runtime required.

Download (all platforms) Source & checksums
SHA256 (Windows)
7E2D9F4A...C8B3
GPG Signature
0x3AFF...D717

📦 also available via `winget`, `brew`, `apt` (community)

INTEL

Frequently asked

01 What happens if I lose the USB?
Your files are irrecoverable. That’s the point. Business tier includes a separate backup mechanism.
02 Can I use any USB drive?
Yes. Any brand, any capacity, FAT/NTFS/exFAT. Hardware serial is read, not volume label.
03 Is there a backdoor for password recovery?
Absolutely not. No cloud, no key escrow, no recovery codes. We are not sorry.
04 How does duress mode work?
Provide a special password during coercion; it reveals a decoy file. Real files remain hidden.