Destroy all meaningful patterns in data.
See also Technical notes on encrypted files
Resist brute force attacks -- plus Extreme Encryption for government.
Maximize efficiency of encryption and decryption.
Add research capability to encrypted content.
Achieve full scalability in the light of the quantum computing threat.
Social Impact and Responsibility
Privacy for Individuals
Privacy for Organizations
Privacy for Professionals and Their Clients
Privacy for Firms and Teams
Privacy for Government
How to Obtain and Use Product
The Two Technologies: Researching Private Archives
Embed Technology in Existing Software