Archive for October, 2012

Business Plan – SoftKrypt

October 22nd, 2012 No comments

Contact Information

Dr. Jon Haass, Chief Executive Officer

Dr. Paul M. Hriljac, Chief Technical Officer, Chief Scientist

(928) 717-9800

3029 Dollar Mark Way, Suite A
Prescott AZ 86305

SoftKrypt At-a-Glance

• SoftKrypt is a security research and development company focused on encryption, application security and related technologies. We have applied for four patents and expect to file additional applications in 2013.

• The company was founded by two MIT mathematics PhDs who have gathered a talented team of developers, marketing professionals and advisors.

• The company’s mission is to protect data, applications and communications from theft, piracy and misuse.

• Today, global losses due to software piracy are more than $100 billion annually. Online commerce losses caused by breaches of transaction security estimates range from $25 to $100 billion annually, but those estimates seem very low and many losses go unreported.

• SoftKrypt’s primary focus is CodeBlackening™ a breakthrough digital security technology with the potential to end software piracy, protecting games, entertainment content and other applications. With CodeBlackening, hardware dongles are no longer needed to protect high-value applications.

• SoftKrypt’s competitive advantage is that Blackening is a much more rigorous method of protecting source code than others currently in use. Blackening prevents static analysis, which is the standard method of analyzing source code. Blackening is obfuscation, not encryption. We can demonstrate that Blackening works, but additional development is necessary to prove its potential and create implementations for specialized markets.

• Used with CodeBlackening, our implementation of Fully Homomorphic Encryption (FHE) can secure online transactions and mobile applications (at least). The goal: Fully encrypted transactions using programs and data that are never decrypted.

• CodeBlackening and FHE are potential game-changers and could create a $50 million to $100 million business if the ability of prevent piracy is valued against the losses now being sustained. The size of the potential market and service to the industry is much larger. The timing of this revenue is, however, difficult to estimate because of the disruptive nature of these technologies.

• Our desktop compliance and encryption application, EasyKrypt™ was created to generate revenue to support the development of Blackening and FHE. We have not had the resources to fully develop and market EasyKrypt and the current demonstration only hints at capabilities for which code is already complete.

• CodeBlackening/FHE revenue will come from development services, licensing, technology partnerships and government contracts. EasyKrypt revenue is based on product sales (subscription license on a per seat basis).

• Given funding, we would use the EasyKrypt foundation to follow the original vision of building multi-user and enterprise applications for regulated industries and government. Alternately, EasyKrypt could be sold or spun-off.

Table of Contents
SoftKrypt At-a-Glance 2
Introduction 5
The Problem 5
Market and Industry Analysis 6
SoftKrypt Solutions 7
Blackening and Fully Homomorphic Encryption 8
Target Market and Strategy Summary 9
Market Validation 10
Blackening Competitors 11
Blackening/FHE Competitive Advantage 11
Blackening/FHE Go-to-Market Plan 12
EasyKrypt 13
Intellectual Property 14
Management Team 15
Paul Hriljac, Ph.D., Founder and Chief Technology Officer 15
Jon Haass, Ph. D., President and Chief Executive Officer 16
Ira Kharasch, Director, Investor Representative 17
Other Management and Staff 17
Corporate Advisor 19
Corporate Videos 19
Addenda 20


SoftKrypt’s mission is to create a world where every credit card transaction is guaranteed safe, where software piracy is no longer possible, and where data is intelligent enough to request authorization before it is used. The company’s patent-pending technologies make this possible.

Founded by two MIT mathematics Ph.D.’s, SoftKrypt has invented technology that can stop software piracy and end a large percentage of today’s cybercrime, without requiring significant changes to the Internet or software development techniques.

The company can today demonstrate these patent-pending technologies and has published technical descriptions of how they work. The US Air Force and other strategic partners have validated SoftKrypt technology.

We are seeking funding necessary to commercialize our inventions, create new ones, and take these technologies to market.
The Problem

Information is at risk of being stolen, applications and games are being pirated, revenue is being lost and people and companies are damaged, sometimes beyond repair.

General Keith Alexander, Head of Cyber Command and Director of the National Security Agency (NSA) calls this the “greatest theft in history” with a price tag approaching $1 trillion per year globally. Information Security has become National Security. The economies of the world are at risk in cyber space.

SoftKrypt fights crime and protects sensitive data. Our primary mission is stopping software piracy, protecting confidential information, and securing online transactions. We believe our technology can achieve these goals.

Everyone who creates or uses packaged or custom-developed software is a potential user of our CodeBlackening™ technology. Likewise, everyone who does business or runs applications online is a potential user of our implementation of Fully Homomorphic Encryption (FHE). Companies and individuals with privacy concerns or compliance requirements can turn to our EasyKrypt™ application to protect sensitive information.

We estimate the total global losses due to software piracy that can be addressed with CodeBlackening technology to be more than $100 billion annually. $59 billion in software was illegally used in 2010 with the average revenue from software per use continuing to slide. (Source: Forrester Research)

Fully Homomorphic Encryption (FHE) can be used alone or in concert with Blackening to provide end-to-end security for online transactions. Estimates for global losses in online commerce due to breaches of transaction security range from $25 to more than $100 billion annually. SoftKrypt technologies can be used to minimize these losses and in many cases eliminate them.
Credit and debit card fraud is the No. 1 fear of Americans in the midst of the global financial crisis. Concern about fraud supersedes that of terrorism, computer and health viruses and personal safety. (Source: Unisys Security Index: United States, March 2009)
The explosive growth of e-commerce has given rise to security concerns from every part of the payment transaction. Cardholders worry about the safety of online transactions and the privacy of their personal information.

Card issuers are concerned about the risks of payment fraud and the high-cost of managing payments.

U.S. online shopping is set to grow 10 percent each year to reach 8 percent of total retail sales by 2014. European e-commerce will grow about 11 percent during the same time period (Source: Forrester Research)
The size of the potential market for SoftKrypt technologies is difficult to estimate but is certainly very large and global in scale.
Market and Industry Analysis

Global losses due to software piracy are today more than $100 billion annually. Estimates of online commerce losses caused by breaches of transaction security range from $25 to $100 billion annually. Application software and data protection is a global problem representing an approximate $63.4 billion annual loss to software publishers in 2011 alone.

The global theft rate for PC software hovers at 42 percent, while PC gaming has a 93-95 percent loss rate, according to Ubisoft CEO Yves Guillemot. The online and mobile social gaming industry segments are experiencing double-digit growth year-over-year. Combined they are projected to reach $28 billion by 2015, while the entire game market is projected to top $74 billion in 2012. (Source: Gartner.) The total global losses due to software piracy that can be addressed with CodeBlackening technology exceed $100 billion annually

SoftKrypt Solutions

Our patent-pending CodeBlackening process will end piracy by securing application code against theft, tampering and reverse engineering, while our patent-pending implementation of Fully Homomorphic Encryption (FHE) provides end-to-end protection for mobile applications and online transactions

SoftKrypt has also created EasyKrypt the easiest way to secure and encrypt confidential information on the desktop, server, in the cloud or in email. Scalable from personal to enterprise customers, EasyKrypt is an information protection and security tool primarily intended for businesses needing to securely share confidential information and meet privacy compliance requirements. It also supports email distribution of private information to clients.

One of the company’s challenges has been managing two businesses that seem related to the team but appear unrelated on the outside. EasyKrypt began life as a testbed for Blackening-related technologies but was quickly realized as a commercial opportunity as well.

The original vision for EasyKrypt as a product was for a compliance and encryption tool allowing groups and enterprises to easily share encrypted files. Cloud features and automatic backup were later added to the design.

Regulations (HIPAA, FINRA, SOX, et al) will soon require encryption for sensitive files growing the ready market for endpoint data protection. Gartner says the growth of this market segment is faster than the 13 percent growth for the $38 billion cyber security market as a whole. The company initially focuses on the underserved $2 billion+ SMB market of legal, accounting, medical and others. With the mobile and cloud offerings, this could become viral and open an untapped consumer market (over $2 billion) for privacy and protection in 2014 and beyond.

Blackening and Fully Homomorphic Encryption

CodeBlackening is a powerful new form of software application security that prevents analysis of computer programs and provides protection against tampering, piracy, and reverse engineering. Provisional patents have been filed for two other innovative technologies.

The diagram above describes the process of Blackening application code.

Blackening is a mathematical algorithm that rewrites the source code of a computer program in a way that intertwines all of the variables of the program in a way that prevents reverse engineering or analysis. It also prevents the alteration or removal of a variable.

Variables can be added to the program, which enforce the situations allowing their use. For example, one of the variables that can be added to a program prior to Blackening is a call to an auxiliary function that calculates a check sum or hash value of the programs executable.

If the check sum is incorrect, the program will not run properly. Blackening prevents the program from functioning correctly if the program has been modified in any way.

SoftKrypt has two patents pending on its CodeBlackening technology and several trade secrets that are unique to its application.

We are in the process of selecting partners for our first Blackening of third-party commercial software, necessary to prove the usability and value of our solution. Once these projects are complete, we intend to offer Blackening as a service and eventually, as a toolkit for software developers.

Pending funding, we will have the first partner projects completed in early 2013, expect to begin offering Blackening as a service in mid-2013 and complete the toolkit in 2014.

Fully Homomorphic Encryption (FHE) technology supports processing data without the need to decrypt the data. This enables secure cloud computing. SoftKrypt has developed a practical scheme, faster than any other, to implement FHE, sometimes considered the “Holy Grail” of encryption technology.

FHE allows a CodeBlackened application to use encrypted data without the need for decryption at any stage in its execution. FHE can protect applications, data and communications to provide a secure computing environment for mobile, on-line or cloud centric transactions. Our implementation is many times faster than others that exist in labs today.

SoftKryptFHE™ will be productized for enterprise, commercial, government and military use in early 2014.

Technology validation is evidenced by the selection of CodeBlackening in winning a competitive contract from the United States Air Force Office of Scientific Research (AFOSR). Companies writing letters of endorsement included Smartronix and General Dynamics. Companies evaluating the technology include Intel, Johns Hopkins Applied Physics Lab and L3-Stratis.
Target Market and Strategy Summary

SoftKrypt’s target market includes companies worldwide that are suffering losses due to software piracy and online transaction-related theft. The NSA estimates cybercrime costs more than $1 trillion annually.

Piracy alone is a global problem representing an approximate $63.4 billion annual loss to software publishers alone in 2011.The global piracy rate for PC software hovers at 42 percent, while PC gaming has a 93-95 percent piracy rate.

Research shows that more Americans than ever – 72 percent of U.S. households – play computer or video games. The online and mobile social gaming industry segments are growing double digits year-over-year, combined they are projected to be $28 billion by 2015 while the entire game market is projected to top $74 billion in 2012. (Source: Gartner.)

“Online piracy is inhibiting the video game industry’s innovation and throttling its job creation capability in the U.S. Export sales are critically important to U.S. video game publishers, but are disrupted in markets that are already flooded with unauthorized copies,” said Michael D. Gallagher, CEO of the Entertainment Software Association (ESA), which represents U.S. computer and video game publishers.

Anything that can turn pirates into paying customers will dramatically improve profits for gaming companies, who are forced to frequently update their products solely to stay ahead of piracy. If piracy could be lessened, release cycles could be lengthened, giving versions longer lives and reducing development costs.

Business applications are also subject to piracy, including high-dollar industry specific programs and software.

Market Validation

SoftKrypt technologies have been chosen by the United States Air Force as a valid and effective response to the nation’s growing cybersecurity threat.

The company was selected, through a competitive bidding process, to develop prototype solutions to protect applications deployed in “AppStore” type distribution environments.

SoftKrypt’s technologies have already been reviewed by the Air Force Office of Scientific Research (AFOSR) after the company submitted its Phase I Small Business Technology Transfer Research (STTR) Final Report, which was accepted without the need for revisions. This program funds the transfer of concepts, technology from academia into commercial world with the objective to benefit the DOD.

The Blackening technology and in particular the prototype for the Blackening toolkit was outlined and submitted in response to a second contract request. It is anticipated that these solutions will be widely adopted for future military, government and commercial computer; cloud and mobile software/data secure delivery.

In our subsequent proposals to the government for additional funding, we received letters of endorsements that anticipate the testing, use and fielding of a pilot version of the CodeBlackening toolkit.

Companies writing letters of recommendation included Smartronix, General Dynamics. In addition, the CTO of L3 Stratis, a major defense technology contractor, has reviewed and endorsed our technologies.

An overview of Blackening was presented at the conference “New Aspects of Mathematics,” organized by Embry-Riddle Aeronautical University and Mary Washington University.

Blackening Competitors

In the CodeBlackening arena, the company has identified two primary competitors; others may also exist though we have not met them in bids or deals.

Semantic Design offers program obfuscation. This is a technique which makes programs harder to reverse engineer, it can include methods such as removing comments, renaming variables, encoding constants in hard to read form, etc. Their approach can still be exploited using static analysis.

Arxan offers tamper resistance based on the introduction of silent guards throughout a piece of source code. These guards calculate checksums on code blocks and interfere with the normal course of the code if the checksums are incorrect. However, the guards themselves are ultimately only protected by simple obfuscation techniques.

SoftKrypt’s Fully Homomorphic Encryption has no competitors other than companies and research institutions who also are attempting to develop this capability to secure online transactions. In the news recently are researchers at Stanford University and IBM Research with lab solutions that they report are able to perform millions of times too slow for practical use today.

Blackening is a much more rigorous method of protecting source code. For example the nature of Blackening prevents static analysis, which is the standard method of analyzing source code that has been obfuscated.

Arxan offers tamper resistance based on the introduction of silent guards throughout a piece of source code. These guards calculate checksums on code blocks and interfere with the normal course of the code if the checksums are incorrect. However, the guards themselves are ultimately only protected by simple obfuscation techniques. Thus the system can be attacked by methods that perform deobfuscation. Blackening is a much more powerful method that resists such techniques.

Blackening/FHE Competitive Advantage

SoftKrypt’s competitive advantage is that Blackening is a much more rigorous method of protecting source code than others currently in use. Blackening prevents static analysis,
which is the standard method of analyzing source code. Blackening is obfuscation, not encryption. We can demonstrate that Blackening works, but additional development is necessary to prove its potential and create implementations for specialized markets.

Used with CodeBlackening, our implementation of Fully Homomorphic Encryption (FHE) can secure online transactions and mobile applications (at least). The goal: Fully encrypted transactions using programs and data that are never decrypted.

CodeBlackening and FHE are potential game-changers and could create a business $50-$100 million that could grow if the technology is valued based upon the piracy it prevents. The timing of this revenue is, however, difficult to estimate because of the disruptive nature of these technologies.
Blackening/FHE Go-to-Market Plan

The company is now demonstrating the feasibility and ROI of CodeBlackening and FHE technologies through pilot and outside analysis of our techniques. In early 2013, we will work with several reference client/partners to Blacken their applications and gain key customer testimonials.

In late 2013, we will be offering CodeBlackening as a service to large customers and commercialize FHE to protect mobile applications and transactions. CodeBlackening and FHE will be licensed to software developers, system integrators, and large commercial organizations, both as a service and an SDK (Software Developers Toolkit). Hosted CodeBlackening/FHE could also be offered, especially for mobile applications and those requiring tight end-to-end security.

The market potential for CodeBlackening and FHE is huge and the challenge will be to identify and focus on the segments that need and value the security offered by these two novel approaches to security. 


EasyKrypt is the company’s proof-of-concept product, which implements both Blackening another of the patent pending technologies (Cloud Based Key Management). EasyKrypt provides affordable, easy-to-use data protection for the small to medium-sized businesses, focused on medical, legal, accounting, financial, insurance and other industries that must meet regulatory compliance standards.

EasyKrypt secures sensitive, valuable information stored on laptops, desktops, network storage or in the cloud.

EasyKrypt delivers protection against all forms of data theft with advanced features including secure data sharing, notifications and geo-fencing, which protects against malicious access from unauthorized locations, while providing robust audit functionality.

Upon release in 2014, EasyKrypt Enterprise™ will support more than 40,000 users and provides transparent encryption for customers with advanced cloud-based key management features.

Mac and Mobile products are planned as well.

EasyKrypt was imagined as a multi-user, cloud-enabled compliance and encryption/privacy application for business and government. Much of the foundation has been completed. The current product demonstration is a single-user encryption product with an improved user interface developed for the Freemium/paid-upgrade market, but never released. With additional funding, we plan to release this version and resume development of multi-user, Mac, mobile and enterprise products based on the existing EasyKrypt foundation.

Intellectual Property

Patent pending for CodeBlackening. CodeBlackening is a mathematical algorithm that rewrites computer source code in such a way that it makes it impossible to analyze or reverse engineer. The algorithm performs nonlinear algebraic transformations to the instructions of a computer program resulting in new source code with all the variables interrelated in a way that prevents any of them from being isolated. This eliminates the possibility of static analysis or any other method of deconstruction. The patent was applied for late 2010.

Patent pending for Fully Homomorphic Encryption (FHE). Based on CodeBlackening Technology, SoftKrypt has applied for a patent that implements Fully Homomorphic Encryption. This technology allows for the alteration of data and programs that process that data so as to make them cryptographically secure. The result is that the data is encrypted and the altered program can process that data without the need to ever decrypt the data. The result would be the creation of data processing facilities that take full advantage of cloud-based methods, which are very economical, without sacrificing any security considerations.

Patent pending for Data Base Key Management. SoftKrypt has developed an innovative way to perform key sharing and management. This system is based on a new type of data base design that facilitates user authentication and file sharing. This design facilitates cloud based security protocols.

Patent application in process for software tamper proofing. Based on its CodeBlackening, SoftKrypt has devised a new algorithm that makes software impervious to tampering by unauthorized third parties. This process makes programs that run in application space as difficult to hack as kernel level programs.

Patent application in process for a web based key sharing protocol. This new system of key sharing performs novel identity management capabilities and is based on our key data base architecture. Additional patent applications in preparation.

Management Team

Paul Hriljac, Ph.D., Founder and Chief Technology Officer

Professor Hriljac is a mathematician and inventor of SoftKrypt’s patent-pending CodeBlackening™ and Fully Homomorphic Encryption (FHE) technologies.

As Chief Technology Officer, Dr. Hriljac (pronounced “rill-jack”) is responsible for all SoftKrypt research and development activities.

Dr. Hriljac is an MIT-trained mathematician with a special interest in the mathematical aspects of computation, number theory, encryption, cybersecurity and algorithm development.

Since 2009, he has been a Professor and Chairman of the Department of Mathematics and Computer Science at Embry-Riddle Aeronautical University (ERAU) in Prescott, AZ. Dr. Hriljac joined the university in 1995.

For the past 12 years, U.S. News & World Report has ranked ERAU as America’s top college for aviation and aerospace education.

Earlier, Dr. Hriljac was a scientist at MITRE Corporation, creating signal-processing solutions for data algorithms and information systems. He was also previously lead mathematics analyst at Pacific-Sierra Research Services, Inc.

He has also been an Assistant Professor of Mathematics Columbia University and at New Mexico State University.

The author of more than twenty published research papers, he received a B.S. in Mathematics from the University of Illinois, and a Ph.D. in Mathematics from MIT. His dissertation was titled: “The Neron-Tate Height and Intersection Theory on an Arithmetic Surface.”

Jon Haass, Ph. D., President and Chief Executive Officer

Dr. Haass is in charge of overall operations for SoftKrypt with responsibility for the day-to-day operations driving funding, partnerships and contracts with government and corporate organizations.

His role is key to the company’s mission of delivering value and opportunity in digital rights management and private property control in the next generation of Internet commerce and communications.

Immediately prior to joining SoftKrypt, Dr. Haass worked as a consultant, providing strategies, executive and team management, and coaching to major technology companies including Accept Software, Siebel Systems, Silicon Image, Intel, Big Band Networks and Sun Microsystems.

In 1998, as a founding member of Sendmail Inc., the Internet’s leading email server software, Dr. Haass was vice president of business development and secured more than $30M in funding/revenue from Intel, IBM, Red Hat, Adobe and others. The Sendmail utility continues to ship with every Linux / UNIX operating system under Open Source license.

He was also vice president of marketing and product management at Open TV, Inc., a leader in the digital television industry and led multimedia product development at Sun Microsystems, Inc.

In 1984, Dr. Haass also co-founded a company to create an innovative navigational product based on CD-ROM and geographical information system (GIS) technology. Initial market was large marine vessels.

The holder of three patents and more than 396 forward patent citations since 1996, Dr. Haass received his BS in mathematics and a BS in physics from the University of Wyoming and a Ph.D. in mathematics from MIT, where he was the CLE Moore Instructor and Senior Lecturer.

Ira Kharasch, Director, Investor Representative

Mr. Kharasch is a senior partner at Pachulski, Stang, Ziehl & Jones, a prominent national business and workout law firm.
He has negotiated and spearheaded business reorganizations and workouts of many significant companies including Pacific Energy Resources, Plainwell and Telogy.

Mr. Kharasch is a graduate of the University of Illinois and received his J.D. from UCLA. He holds an AV Preeminent Peer Rating, Martindale-Hubbell’s highest recognition for ethical standards and legal ability, and has been named a “Super Lawyer” in the field of Bankruptcy and Creditor/Debtor Rights in a peer survey conducted by Law & Politics and the publisher of Los Angeles Magazine.

He is admitted to practice in California, New York and Alaska and is a resident of Los Angeles.
Other Management and Staff

Tim Lewis, Director, Product Development
Mr. Lewis is responsible for product management and development. He has 11 years of experience as a technologist for Microsoft combined with another nine years of running his own private technology company, providing him with the product knowledge and customer insight to design and productize very complex technology to businesses and consumers so that it is comprehensible and intuitive.

Besides paid staff (executives and developers), SoftKrypt has assembled a team of contractors who provide their expertise to the company on an as-needed basis.

Kristin Gabriel, Senior Vice President Marketing – Ms. Gabriel is charged with marketing, search, advertising and public relations, with her primary efforts directed to branding the company and driving sales and revenues. During her career, Gabriel has managed national corporate communications campaigns for global clients such as Applied DNA Sciences, CyberMedia Corporation, Honda Motorcycles, Panda U.S., Symantec, Trend Micro Incorporated, and Union Carbide’s Eveready Batteries. Her specialty is early stage technology and security companies managing the investor relations and marketing process towards an IPO.

Mike Coop, Vice President, Government Affairs
Mr. Coop is responsible for business development and marketing in the government sector and has been responsible for the success in establishing credibility, gaining access to decision makers and influencers in various branches of the government. Mike was instrumental in obtaining Booz Allen endorsements for the Air Force OSR STTR contract. He is also working to establish with DISA, a STIG for application security, and using concepts from SoftKrypt’s Blackening approach. He has worked with Cranite Systems, Microsoft, Cisco, Smartronix, and General Dynamics.

Elizabeth Magliana, Vice President of Sales – Offers extensive experience in business development and operations, both domestically and internationally. She has demonstrated the ability lead a highly effective sales and marketing team in startup and expansion company environments for companies such as Peter Norton Computing, and Symantec Corporation.

David Coursey, Technology Strategist – Mr. Coursey helps develop marketing strategy, works with the development team on product and user experience issues, hosts corporate events and is part of the corporate editorial team. A 25-year technology veteran, he is a blogger for and other industry publications. Coursey has previously written for PC World, InfoWorld, ZDNet, Computerworld, and many other publications. The author of two books published by Peachpit Press, he is also a former CNET Radio and television commentator and radio talk show host.

Mike Keesling, Director of Online Marketing Strategy — Mr. Keesling handles the online marketing strategies in support of the overall the marketing and advertising efforts for SoftKrypt. He has been doing search engine optimization (SEO) and marketing since 1996, and prior worked at Chiat\Day, a Los Angeles-based advertising agency. He has spent most of his career launching, branding and marketing small business and startup ventures with occasional forays into the corporate world.

Robert La Folette, Creative Director – Mr. La Follette is responsible for directing creative work including audience promotions and advertising, overseeing print production, graphic art, web and social media design, software design and development, user interface, and corporate identification. La Follette has worked for Apple Computer Corporation, and he spent seven years as creative director at Sunbelt Software.

Harry Magnan, Director of Technology Communications – Mr. Magnan facilitates business process writing, technology and marketing communications. He has extensive experience in enterprise level applications and developing and implementing processes and procedures for business, manufacturing, engineering, development, quality assurance and human resources environments. He has worked for companies including Nexant, Cisco, Amgen, Blue Shield of California, Oracle, Medtronics, IBM, CyberDefender, Siebel, Acta Technology, Quintus Corporation, Symantec Corporation, and MetaCreations Software.

(Ms. Gabriel and Messrs. Coursey, Keesling, La Follette and Magnan are part of MarCom New Media, Inc., a West Hollywood, CA-based digital marketing and corporate communications firm).

Corporate Advisor

Ronald S. Posner – has been a leader in the consolidation of the high technology, Internet and software industries for more than 30 years. His record of accomplishment as a CEO, investor and board member shows improved market values and liquidity results for companies in record time frames.
Corporate Videos

About SoftKrypt Investor Video (
Blackening Technology (
Paul Hriljac on Blackening (

SoftKrypt™, EasyKrypt™, SmartKrypt™ and Blackening™ are trademarks of Advanced Cryptographic Methods and Engineering (ACM\E).


These additional documents are provided to expand on topics discussed here.

CodeBlackening White Paper

EasyKrypt Datasheet

Local newspaper story about SoftKrypt

Ponemon Institute, March 2012: 2011 Global Cost of Data Breach Study

SHADOW MARKET: 2011 Business Software Alliance study of global software piracy

Post to Twitter Tweet This Post

Categories: Business Plans Tags:

EasyKrypt Data Sheet

October 16th, 2012 No comments

EasyKrypt is affordable, easy-to-use data protection software. Review the EasyKrypt product data sheet.

Post to Twitter Tweet This Post