With uncertain technologies, overreaching establishments, and shifting loyalties persistently encroaching upon our lives and businesses, we of Cloak and Dagger believe it is imperative to command potent tools to defend personal liberty and empower free enterprise. In answer to this call, we provide easy tools for all ages to ensure confidential communications, safeguard valuable assets, and secure vulnerable operations. We are in no way affiliated with others outside of cloakanddagger.com with company and/or product names similar to our own and do not vouch for any approaches they take or claims they make. All tools we have directly developed and endorsements we have specifically made are exclusively to be found on cloakanddagger.com. We are just getting started, so check back regularly for further developments.
Your privacy is our policy. We do not share or retain any information provided through the use of this site.
This easy tool takes a block of text (the message), which might be a text message, email, account number, phone number, or rendezvous plan, and transforms (encrypts) it into two blocks of text (the ciphers) that appear to be complete garbage. When the process is reversed, the original text is revealed. No part of the original text can ever be obtained without having both complete ciphers. There is no "back door" and it is impossible to "guess" a missing cipher. Moreover, completely different ciphers are produced each time any particular message is encrypted. The unique encryption method developed by Cloak and Dagger exclusively for this tool does not use any existing approaches or libraries. This powerful tool can serve many different purposes when creatively applied. For instance, instead of sending the ciphers to someone, you could store them in separate locations. This method works wonderfully for storing secret formulas.