Best Crypto

Protect your private photos, voice and sound files, videos, confidential documents - just any kind of files on your UIQ3!


Every smartphone user stores sensitive data on his device. It could be private photos, confidential voice notes, business documents, etc. You don't want an unauthorized person to get access to your confidential or private data, do you?

Best Crypto application is designed for electronic data protection. It provides you with a user-friendly graphical interface for encrypting and decrypting your sensitive data. Behind easy to use interface, its powerful cryptography engine is using industry standard secure crypto algorithms (RC6 (ECB-Mode) ciphering with 256-bits keys and MD5 algorithm) to give you absolute, almost unbreakable security.


Features include:


  • Cryptography engine is using industry standard secure crypto algorithm (RC6 (ECB-Mode) ciphering with 256-bits keys and MD5 algorithm)
  • Handles files of any type and size
  • No back doors or escrow keys - Be careful not to forget your password
  • Built-in File Browser

Protect your private photos, voice and sound files, videos, confidential documents - just any kind of files on your UIQ3!

Every smartphone user stores sensitive data on his device. It could be private photos, confidential voice notes, business documents, etc. You don't want an unauthorized person to get access to your confidential or private data, do you? Protect your confidential and private data with Best Crypto now!

Best Crypto application is designed for electronic data protection. It provides you with a user-friendly graphical interface for encrypting and decrypting your sensitive data. Behind easy to use interface, its powerful cryptography engine is using industry standard secure crypto algorithms (RC6 (ECB-Mode) ciphering with 256-bits keys and MD5 algorithm) to give you absolute, almost unbreakable security.


Safe list


Add files you encrypt and decrypt very often to "Safe list". It's quite a handy option if you do not want to look for these files every time you need to encrypt/decrypt them.
"Safe list" detects the selected file state automatically and allows you to perform the needed action fast.

Current file is encrypted. Select "Decrypt" command and enter correct password to decrypt.

State of the current file is undefined or the file was moved/deleted from its original location. Select "File information" command to see the problem description.

All other files marked with icons describing their types are not encrypted and can be viewed by any file viewer/editor associated with this file type. You can view/start these files from Best Crypto as well - just double click on the item or select "Start file" command.

To protect these files use "Encrypt" command and specify a password you want to encrypt them with.

If you want you can mark several files and encrypt/decrypt them all at once. Also you can create some folders in your Best Crypto safe list in order to "categorize" files there.


Session options


For every file you encrypt you may assign different password. But we understand that in some situation users would like to use the same password to encrypt/decrypt several files. If so, select "Use session password" option in "Misc\Settings" menu. While the application is running it'll be typing last entered password automatically when you encrypt or decrypt files. So if you use the same password for all files you need to type it only once. After you close the application this password is reset and you will need to enter it again when you start the application.


Behind the screen


  • Reliable encryption of any kind of data by using the international industry standard system RC6 (ECB-Mode) and MD5 algorithms
  • High speed encryption and decryption process
  • Passwords are not stored on the device to increase the safety further. Password verification is performed by checking digital signs.

Please note: your password is not stored anywhere inside the application, encrypted files or in some place on your device in order to increase the safety. Password verification is performed by checking digital signs (digital signs say nothing about your password or encrypted data nature). It means that no person (including the application developers) can open and see your data without specifying correct password. Please don't forget your password as there's no way to access your data without it!


Please note: This software is discontinued.

You can download it FOR FREE and use it AS IS, but it is no longer supported.


[Version 1.01]

Compatible with:
- UIQ3

Download


Screenshots: