Quantum-Resistant
Built on NIST-approved post-quantum standards (FIPS 203, 204, 205). Not experimental. Production-ready encryption with AES-256-GCM. All tiers include hybrid ML-KEM + X25519 key encapsulation for quantum resistance.
Your files. Protected forever. Even when quantum computers break today's encryption.
qnsqy
.qs
Nation-state actors are harvesting encrypted data today, waiting for quantum computers to break it tomorrow.
This is called Harvest Now, Decrypt Later.
Medical records. Legal documents. Financial data. Trade secrets. Everything encrypted with RSA or ECDH today becomes readable once quantum computers arrive.
Your sensitive files need protection that lasts decades, not years.
Q-Day: The moment a cryptographically-relevant quantum computer becomes operational. Most estimates place it within the next 10-15 years.
Built on NIST-approved post-quantum standards (FIPS 203, 204, 205). Not experimental. Production-ready encryption with AES-256-GCM. All tiers include hybrid ML-KEM + X25519 key encapsulation for quantum resistance.
Zero network capability. Works completely offline. Your data never leaves your device. No cloud. No telemetry. No tracking.
No accounts. No registration. No cloud storage. We never see your passwords, your files, or your encryption keys. Everything happens locally.
Uses Argon2id (OWASP recommended) for password hashing. Brute-force attacks become computationally impractical.
AES-256-GCM ensures both confidentiality and integrity. Any tampering is detected immediately upon decryption.
Unique file keys for every encryption operation. Compromising one file doesn't compromise others.
Choose any file on your system. Documents, images, archives — any format works.
One command. Enter your password. QNSQY handles the rest with quantum-safe algorithms.
Your encrypted .qs file is safe from both classical and quantum attacks.
When you need access, decrypt with your password. Integrity verified automatically.
Client confidentiality with decades-long retention requirements
HIPAA compliance and patient record protection
Regulatory compliance and trade secret protection
Source protection and confidential communications
Intellectual property and grant data security
Family documents, passwords, private memories
Human rights documentation, sensitive field data
Export-controlled data, defense-adjacent work
Public, peer-reviewed cryptographic standards. No security through obscurity. No proprietary algorithms.
OWASP recommended, memory-hard
XChaCha20-Poly1305 also available
Post-quantum + classical (AND construction)
FIPS 204 + classical defense-in-depth
FIPS 205 (Pro/Enterprise)
Air-gapped by design
# Encrypt (prompts for password) $ qnsqy-free encrypt -i secret.pdf # Output: secret.pdf.qs # Encrypt with compression $ qnsqy-free encrypt -i largefile.tar -z # Output: largefile.tar.qs (compressed)
# Decrypt (prompts for password) $ qnsqy-free decrypt -i secret.pdf.qs # Output: secret.pdf (original restored)
# 3-pass secure delete $ qnsqy-free shred secret.pdf # File overwritten and deleted
| Feature | QNSQY | 7-Zip | GPG | VeraCrypt |
|---|---|---|---|---|
| Post-quantum safe | Yes | No | No | No |
| Memory-hard KDF | Argon2id | PBKDF2 | S2K | PBKDF2 |
| Large file streaming | Yes | Limited | No | Yes |
| Authenticated encryption | Yes | Yes | Yes | Yes |
| Digital signatures | ML-DSA | No | RSA/ECDSA | No |
| Air-gapped / Offline | Always | Yes | Yes | Yes |
Not your cloud provider. Not your government. Not us. Take control with quantum-safe encryption.