By continuing to use this site, you agree to our updated Privacy Policy and Terms of Use. ×

How Panwrypter Protects Files


Panwrypter ( is an app that you can use to protect your most important files and information from cyber attacks, and other unauthorized access.

Panwrypter uses a patent-pending method of protection, that processes your files in a way that allows them to be safely stored across two or more physical locations as protected volumes.

In addition, it provides the ability to transfer and collect these protected volumes to and from their designated storage sites.

This approach makes it markedly more difficult for an attacker to gain access to, and reverse engineer your information - especially over long periods of time in which your files and information may be neglected.


Panwrypter employs the concept of storage sites - places that you designate to safely store your protected volumes - as part of it's core approach to protecting your files. Panwrypter restructures your file data so it can be securely stored across these storage sites.

An example of a storage site might be

When you protect your files, you are given a choice of using from 2 to 8 storage sites to protect your files. Depending on how you want to protect your files, you can select physical sites, online file storage services, or a hybrid mixture of both.

Depending on the storage media and storage services used for site, you might have storage capacity limitations. To alleviate this problem, Panwrypter provides options for automatically sizing your protected volumes to make it easier to transfer them to the storage media and storage sites of your choice.

You can also select whether or not you want Panwrypter to automatically transfer the protected volumes to their storage sites after protection has completed.

If you choose not to use the automatic transfer option, your files are simply prepared into protected volumes and left on your Mac, for you to transfer to their storage sites at a later time.

Protecting Files - Overview

When you protect your files using Panwrypter, your files are processed, or depleted using a process called bitwise geospatial depletion - a process that breaks up your file data into non-linear chunks, called protected volumes.

These protected volumes are then transferred to their designated storage sites, and remain there until you need to access them again in the future.

If an attacker or malicious software gains access to any one site, or even multiple sites, it is extremely difficult to reverse engineer the original file data, since the data is not stored holistically at one location.

The data at any given site is in a depleted state.

Restoring Files - Overview

When you Restore your protected storage volumes, your files are collected back from their storage sites, and processed (undepleted) back into their original state.

Panwrypter is intended to work with your existing storage habits, and also allows you to enhance and adapt these habits to further increase the security of your protected files.

More information on selecting storage sites

Historical Approaches to Protecting Files

Let's look at some existing ways that you might be using to protect your files and personal information.


This is an example of a text file that contains sensitive or confidential information, and needs to be protected. In it's native state, it is readable by loading it up in a text editor or word processor.


If you encrypt this file, it is transformed into a non-readable form that requires some type of password or key to access the original information.

With most common forms of encryption, all of the files encrypted data is stored in one physical location. This means that if the encryption is broken, the attacker has full access to all of the original information.

The concept of Encryption was originated, and has evolved from a time that pre-dates the existence of computers, the Internet, and cloud-computing.

Encryption is flawed, in that it does not take into account the factors of time and effort, combined with the use of massive, distributed, and constantly evolving computing resources. It is thus possible for an attacker to eventually break most forms of encryption.

Encryption algorithms of yesteryear are now trivial by todays standards. If an attacker gets encrypted files, it is safe to say that over time, the original file information can eventually be accessed.


If you split this file into segments, and store each segment in a separate physical location, each segment still contains linear, sequential data.

If one site is compromised, it is still possible for an attacker to reverse engineer the data from this segment, access a portion of your sensitive information and infer additional details from this segment.

This approach is not an effective way to protect your files.


If you deplete this file using Panwrypter, and store each segment in a separate physical location, each depleted segment contains non-linear, non-sequential data.

If one site is compromised, it is not possible to reverse engineer the information from the segment, as the data is in a "depleted state". The attacker must first obtain all segments from all physical locations in order to make sense of any portion of the information.

This approach is an extremely effective way to protect your files.


Though this type of protection is an extremely effective way to protect your most sensitive files and information, you need to be aware of the following:

Panwrypter is ideal for

Panwrypter is not suitable for