Personal Privacy and Cyberian


With CYBERIAN™, each of seven digits in a key can be selected in ten different ways. 10 X 10 X 10 X 10 X 10 X 10 X 10 may not seem like much until you figure out that means ten million different keys to try. Is your personal information so important that someone would spend the effort to try every one of ten million keys to get at just one of your files or messages? Would it be worth anyone's time and effort? Unless you are doing something awfully interesting to someone out there, you are probably pretty secure using CYBERIAN™.


Notice, that's for just one of your files or messages. You may use different keys for each time you make some content secure.


Can the U.S. National Security Agency or a firm experienced in security software handle the challenge of ten million keys? Yes. Other folks aren't as likely to even begin to try.


We offer our less-than-heartfelt apologies to your email provider, as well as Facebook, pollsters, insurance companies, hackers, and anyone else who has been spying on your content.


Download of Windows version.

Friday, July 27, 2018: Release of CYBERIAN™ will follow later in August after we have tested our payment and program authentication systems, and analyzed feedback from people's use of the free trial CYBERIAN™ LYTE.

Cyberian Tiger