About HybridCipher

Building the future of long-lived data protection

Our Mission

Today's encryption protects against today's threats—but what about tomorrow's? Sensitive data has a shelf life measured in decades, while cryptographic assumptions can collapse overnight when quantum computers arrive.

HybridCipher exists to solve two problems most file encryption ignores: true access revocation (not just policy-based) and protection against "harvest now, decrypt later" attacks.

What is HybridCipher?

🔒

Client-side encryption layer

Works on top of any cloud storage folder—no vendor lock-in

🔑

Device-held keys

Your encryption keys never leave your devices

♻️

Rekeying for revocation

Removed team members lose cryptographic access via epoch transitions

🛡️

Post-quantum hybrid cryptography

ML-KEM-768 + X25519 protects against both classical and quantum threats

📊

Merkle-based audit logs

Tamper-evident transparency for membership and key events

🚫

No vendor lock-in

Use any cloud storage provider—your data stays portable

Who is Responsible

Leadership

AC
Allen Chen, PhD in Physics
Founder & Engineer

Focused on post-quantum cryptography, long-lived data protection, and building security products that respect user privacy.

Legal Entity

Trust Posture

We believe trust should be earned through transparency, not just claimed. Here's where we stand on key trust indicators:

Trust IndicatorStatusLink
Security Model✅ AvailableView →
Technical Documentation✅ AvailableView →
Cryptography Choices✅ AvailableView →
Third-party Security Audit🔜 PlannedAfter product stabilization
Reproducible Builds🔜 PlannedAfter product stabilization
Open Source Release🔜 PlannedAfter product stabilization

What We Don't Do

Understanding what a security product doesn't do is just as important as understanding what it does. Here are our explicit non-goals:

🔑

We don't store your encryption keys

Your keys live exclusively on your devices. We never have access to them, which means we can't decrypt your files—even if compelled.

📄

We don't process unencrypted content

All encryption and decryption happens client-side. Our servers only ever see encrypted blobs—never your actual files.

🌐

We don't require internet for local access

Once your keys are synced, you can access and decrypt your local files offline. No phone-home requirements.

Questions?

We're happy to discuss our security model, answer technical questions, or explore partnerships