Logo Cyphersol

Cyphersol


Freedom of thought, freedom of opinion, freedom of communication


Cyphersol Manifesto

The Foundations of Freedom - Private Communication in the History of Humanity

Private communication between individuals has always been a pillar of human coexistence.
Since the earliest civilizations, the ability to communicate freely among individuals has played a crucial role in the social fabric.
Private conversations within a family context or among friends have always represented not only an expression of trust and personal bond but also an essential means for the transmission of knowledge and decision-making.
This freedom of private communication has always been seen as an intrinsic component of personal identity and autonomy.

The Sanctity of Private Dialogue

In ancient Greece and Rome, the concept of "oikos" — the domestic core — was considered inviolable, a place where private conversations could flow freely, essential for the well-being of the family and the broader society.
This sanctity of the domestic hearth was reflected in laws and social norms that protected the privacy of individuals.

Inconceivability of Limitations

The mere thought of imposing limitations on private communication would have been considered aberrant in many historical cultures.
For example, in tribal societies, trust and open communication among members were considered essential for the survival and integrity of the group.
Limiting such freedom would have undermined not only social cohesion but also the collective ability to respond to challenges and threats.

Modern Reflections of Ancient Freedoms

Even today, the value of private communication is evident in modern human rights doctrines, as evidenced by Article 12 of the Universal Declaration of Human Rights, which protects against arbitrary interference in privacy, family, home, or correspondence.
This international recognition reflects an ancient and universal principle, emphasizing how a civil and guaranteeing society considers the right to private communication to be fundamental.

Using Terrorism as a Pretext for Global Surveillance

In the current context, the justification of combating terrorism is often used by governments to extend their surveillance capabilities.
However, it is evident that this is merely a cunning means to try to circumvent Article 12 of the universal rights declaration.
For a long time, governments have been trying to "convince" citizens that Freedom is a dangerous concept, which should be viewed negatively.
And that it should always be placed far behind concepts such as security.
This is because in this way they can justify and make increasingly restrictive laws acceptable.

Abuse of the Security Concept

The request by governments to remove end-to-end encryption from platforms like Telegram and WhatsApp illustrates an attempt at surveillance that goes beyond simple terrorism prevention.
End-to-end encryption is a technology designed to ensure that only the people involved in a conversation can read the messages exchanged, thus protecting the privacy and security of personal communications.
People should shudder at such requests.
They blatantly violate Article 12 of the Universal Declaration of Human Rights, and even more so the natural universal law that mandates the freedom of private communication between individuals.

The Risk of Global Control

When governments demand unlimited access to private data, the risk is not just a violation of privacy, but the creation of a surveillance society where all citizens are potentially suspects.
More than a risk, it is a certainty.
It also makes it clear that the intent to combat terrorism is not exactly the true goal.
Having the ability to globally control citizens means "Power".
It means having an enormous means of blackmail against citizens who would live in fear of freely expressing their opinions when not aligned with governmental ones.

The Shadows of History: Lessons from the Past for Future Freedom

History offers numerous examples of the dangers associated with the abuse of surveillance power by authoritarian regimes.
How figures like Hitler and other dictators used control of information to suppress opposition and perpetuate their power, highlighting the dangers of invasive laws in the modern digital era.

The Power of Control in Totalitarian Regimes

During the Nazi regime, the Gestapo used a vast network of spies and informants to monitor and suppress any form of dissent.
This widespread surveillance system made it nearly impossible for citizens to organize an effective resistance.
Similarly, in the Soviet Union under Stalin, control over communications allowed the government to arrest and deport millions of people considered threats to state power.

Implications with the Advent of the Internet

With the advent of digital technologies, the potential for surveillance has been amplified in ways that dictators of the past could not have even imagined.
If invasive laws allowing global surveillance like those today had been in the hands of Hitler, the power to suppress dissent would have been total and devastating.
To assume that a Hitler will no longer exist is at least naive.
Only now, he would find himself with laws that would greatly increase his power.

The Importance of Resisting Surveillance

The lesson from history is that excessive control and surveillance can lead to a loss of freedom and the destruction of civil society.
Protecting the freedom of speech, expression, and private communication is crucial not only for individual dignity but also for a society's ability to protect itself from future tyrannies.
History has shown that rights can be rapidly eroded under the yoke of new authoritarian regimes.
Maintaining the freedom of uncontrolled and free communication is an essential safeguard that can protect society from similar future threats.
The cost of ignoring this lesson could be freedom itself.

Article 12 of the Universal Declaration of Human Rights

No one shall be subjected to arbitrary interference with his privacy, family, home, or correspondence, nor to attacks upon his honour and reputation.
Everyone has the right to the protection of the law against such interference or attacks.


F.A.Q

What is Cyphersol?

Cyphersol is an advanced system for encoding and decoding.
It allows for the encoding of sensitive texts (private communications, seeds, private keys, passwords, etc.).

What sets it apart from other systems?

Beyond its security, Cyphersol's feature is its nature, being both digital and manual at the same time.
Typically, encoding software operates only digitally.
In this case, it can be used both through the software and without it.

Why is it an extremely secure and practically inviolable encoding system?

Everything will be explained in detail in the dedicated guide.
However, the main factors that make this system extremely secure and inviolable are the nature of the "matrix" and the fact that both the matrix itself and the encoded and decoded data always reside strictly on the user's local device.

Why are data not saved in the cloud or on a network server?

Such a hypothesis, especially in the case of certain types of data, would be truly dangerous.
Therefore, I chose to set up the application this way.
In this regard, I want to emphasize the risk that versions forked by others might implement such a feature.
If so, never trust them.

What does it mean that the matrix is unique?

It means that it is practically impossible for even just 2 identical ones to be created.
After reading the guide you will understand the reasons.

How can this system be violated?

In only one way.
It can be violated only if both the matrix and the code derived from it are stolen.
Possession of only the matrix or only the code will not allow the attacker to trace back to the decoded text.
In this sense, the advice is always to keep the two files separate (and renamed imaginatively).
Obviously, such a scenario should not even be considered a weakness of the software but a lack of the necessary caution on the part of the user.


Download the app

Download all versions


Linux version



Windows version



PGP Key

PGP Key Fingerprint: 79A0 D0AF 38F0 8EA0 F3F1 E261 A5FC AAF9 1538 D881

PGP Key ID: 79A0D0AF38F08EA0F3F1E261A5FCAAF91538D881



Authenticity Verification


Authenticity Verification on Linux

To ensure the integrity and authenticity of the compressed application files, you can verify the PGP signature that I have assigned to the Cyphersol.AppImage.tar.gz archive containing the app.
By following these steps, you can confirm that the files have not been tampered with.

  1. Make sure you have downloaded the following files:
    Cyphersol.AppImage.tar.gz
    Cyphersol.AppImage.tar.gz.asc
    pgp-key.asc

  2. Ensure all three files are in the same directory

  3. Open the terminal and move to the directory where the files are located or directly open the terminal when you are in the correct directory

  4. Run the following command to import the public key:
    gpg --import pgp-key.asc

  5. Now run the following command to verify the file signature:
    gpg --verify Cyphersol.AppImage.tar.gz.asc Cyphersol.AppImage.tar.gz

  6. Ensure that the output indicates that the signature is valid and was made using the PGP key with ID 79A0D0AF38F08EA0F3F1E261A5FCAAF91538D881.
    The output should inform you that the signature is correct and that the key used matches the one imported.


Authenticity Verification on Windows

  1. Download and install Gpg4win, the software to verify signatures on Windows.

  2. Make sure you have downloaded the following files:
    Install.zip
    Install.zip.asc
    pgp-key.asc

  3. Ensure all three files are inside the same directory

  4. Open the command prompt or PowerShell and move to the directory where the files are located

  5. Run the following command to import the public key:
  6. gpg --import pgp-key.asc
  7. Now run the following command to verify the file signature:
    gpg --verify Cyphersol.AppImage.tar.gz.asc Cyphersol.AppImage.tar.gz

  8. Ensure that the output indicates that the signature is valid and was made using the PGP key with ID 79A0D0AF38F08EA0F3F1E261A5FCAAF91538D881.
    The output should inform you that the signature is correct and that the key used matches the one imported.



Using on Linux

The application for Linux is a AppImage.
After downloading, you can place it in any directory of your choice.
To function, however, it must be made executable.

Example of how to make the application executable if placed in the home directory.
Open the terminal and type:

chmod +x Cyphersol.AppImage

Tested Linux versions:

Ubuntu 24.04
Ubuntu 22.04
Linux Mint 21.3
Linux Mint 22
MX Linux 23
Kali Linux 2024.2

Using on Windows

The application for Windows is an executable exe to be installed in the usual way software is installed on Windows.

Tested Windows versions:

Windows 10
Windows 11

Disclaimer for Cyphersol

Cyphersol is an Open Source and free software, conceived and created by Mister Cypher and released under the GPL license.
The "Cyphersol" software is provided "as is", without any warranty of any kind, express or implied, including, but not limited to, the warranties of merchantability or fitness for a particular purpose.
In no event shall the software creator be liable for any direct, indirect, incidental, special, exemplary, or consequential damages.
Be advised that modified versions (forks) of "Cyphersol" are not officially supported and may include changes that alter the intended operation of the software, such as the ability to interface with external servers.
This could pose significant risks to the security of the user's data.
Users are advised to verify the authenticity and integrity of any forked version of the software before use.
"Cyphersol" was developed to operate exclusively in a local environment.
Specifically, data will always and only be created and saved locally.
Forked versions of Cyphersol that involve remote data storage should be absolutely avoided.
Using the software in ways not intended by the original developer can increase the risk of exposure of user data.

Official Version

The source code will be uploaded to Github in the official repository of the project.

Do you like Cyphersol?

You will be able to use Cyphersol freely and in its full version whether you make a donation or not.
The only difference, if you use it without donating, is the opening of a popup window with a countdown of a few seconds every time you perform an operation.
However, the software will function correctly in the same way.

In any case, if you find this software useful, I ask you to consider the work done and to make a donation so that I can keep it updated and monitored.

After making a donation, contact me via email and I will provide you with the version free from countdown popups.

Make a donation

Donate Bitcoin

Donate on Ethereum Network (ETH, Matic, ZK ecc)

Donate Solana

Donate Kaspa


After making a donation, you will need to follow these steps:
Contact me through the email address provided below by including the TX of the transaction.
After verifying that the donation has been successfully received, I will send you a link from which you can download the version free from countdown popups.
The app will be linked to your email address also for any future downloads.
Email