Top Secret Software
Product Info
Buy Now
1 SafeBit
2 ShyFile
Top Secret Software Marketplace

Home > Software > EncryptionInvisible Secrets

Invisible Secrets
Invisible Secrets not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would realize that your important papers or letters are stored in your last holiday pictures, or that you use your personal web page to exchange messages or secret documents. With Invisible Secrets 4 you may encrypt and hide files directly from Windows Explorer, and then automatically transfer them by e-mail or via the Internet.


Invisible Secrets is an easy-to-use yet a powerful wizard interfaced file encryption and steganography software, your best choice for computer security

Five Carriers: hide files in JPG, PNG, HTML (without any data length restriction), BMP and WAV (source data proportional with the size of the image/sound).

Strong cryptography: file encryption using AES-Rijndael, Blowfish, Twofish, RC4(TM), Cast128, GOST, Diamond 2, Sapphire II.

Email Encryption: create self-decrypting packages

It includes a shredder which conforms to the norm of the US Department of Defense DoD 5220.22-M

Wipes out internet traces

It includes a Password Manager

Direct IP-to-IP password transfer

Shell integration (The "Invisible Secrets" submenu appears in the system context menu)

Functions available through the Tray Icon

Cryptboard & Application Locker

Invisible Secrets is also very flexible: The user can develop his own algorithms or carriers and integrate them very easy in the program

Data compression before the encrypt/hide process

Mail the resulted carrier after the process or place it somewhere on the Internet through a FTP Connection.

A very well organized FTP Servers Library

Secured algorithms and carriers libraries through activation keys

Fake messages generator

Perfect local security: all the temporary files used in the process are wiped out

The possibility to wipe the source data or the original carrier after the process

Invisible Secrets uses a complex shredding method (DoD compliant): seven pass wiping with randomly generated patterns which makes hardware recovery impossible.


Order with SafeBit for $59.95

What is SafeBit?




Invisible Secrets
Download or CD
Windows O/S
Web Site:
Money Back:
30 Days

ORDER NOW $39.95

1 License

Order with SafeBit for $59.95

What is SafeBit?

Back To Top | Policies | Contact Us
Copyright © 2013 Co. All Rights Reserved.