Site Map


Home Page

Technological Achievements

Destroy all meaningful patterns in data.

Resist brute force attacks.

Blindfold the hacker.

Maximize efficiency of encryption and decryption.

Add research capability to encrypted content.

Achieve full scalability in the light of the quantum computing threat.

MarpX Privacy™

What is MarpX Privacy™?

How to make a copy of MarpX Privacy™

A guided tour of MarpX Privacy™

Best practices for high security

What encrypted content is like

Get MarpX Privacy™ flash drive

Extreme Encryption™

What is Extreme Encryption™?

How to make a copy of Extreme Encryption™

A guided tour of Extreme Encryption™

Best practices for even higher security

Purchase Extreme Encryption™

Search and Research

Distinctives -- MarpX Search-and-Filter Specifications

Sample, Small -- Hamlet

Sample, Larger -- Content Discovery for Publishers

Add Research Capability to Encrypted Content

Research-Capable Cloud-Based Backup


Elevator Speech

Marpex Inc. Technology Licenses

Collaborating as Full Partners

Collaboration in Selling to Government


MarpX Privacy