CORE FEATURES

State-of-the art Core Features of VX-Lock and VX-Lock Pro will surely satisfy your keen eyesight and high expectations at the same time.

Easy Steps
for All Users

Step 1

Register

Register your Crypto or NFT Asset accounts for secure management. Add your account securely whenever you achieve new Crypto or NFT Assets.

Step 2

Send

Send your Crypto & NFT Assets securely to other accounts. Keep the rest of Assets absolutely securely utilizing strongest encryption algorithms.

Download User Guide

Core Technologies

K E Y - E X C H A N G E

  • The first step of our unique and most secure communication with other VX-Lock users

Key Exchange is the very process for communicating securely with other VX-Lock users. You will need a copy of their public key and they will need yours. Your public key is just a block of text, so it’s quite easy to share your keys with someone. A list of all your friends with whom you have exchanged your public key will be displayed on the screen.

Of course, you can freely create groups among the friends for more convenient group communication.

E N C R Y P T I O N

  • SOTA Encryption Tech : Encrypting & Decrypting files or DB in storage with triple ultra strong algorithms of ECC¹, AES² & SHA-3³

¹ ECC (Elliptic Curve Cryptosystem) is the best asymmetrical algorithm guaranteeing high security with faster and shorter keys.

² AES (Advanced Encryption Standard) is the best symmetrical algorithm authorized by NIST.

³ SHA-3 (Secure Hash Algorithm 3) is the latest version of standard Secure Hash Algorithm released by NIST on Aug. 5th, 2015.

C L I P B O A R D

  • It's a most secure service of sending chats, SMS, and email to other VX-Lock users.

When you want to send private or confidential texts to others, you can enter the texts on Clipboard, encrypt and send them via SMS, Chatting Apps such as WhatsApp, WeChat, Kakao Talk, Telegram, Zalo, and etc or via email securely.

When receiving them as encrypted, your friends only need to paste and activate them on Clipboard to read them in plain text.

S H R E D D E R

  • SOTA Sheredding Tech

    1. ECC Encryption : ECC 320 bit Encryption of Addressable Location of DB/File

    2. Pseudo Random DB Process : Overwrite the Locations with Random Characters

    3. US DOD 5220.22-M (8-306. C) : Overwrite the Locations with a Single Character

    4. US DOD 5220.22-M (8-306. E) : Then with a Character, Complement, and a Random Character

  • International Patent : Generation Tech. of Public Key IDentity
  • Met with FIPS Standard : Federal Information Processing Standard 140-2

C L O A K I N G

Hide Your Confidential File beneath Image or Video Clip!
  • Encrypting & Hiding files beneath image or video clip files.
  • Most Secure Way of Crypto Transactions among VX-Lock Clients

W I P I N G

Hide Your Confidential File under Image or Video Clip Files!
  • Perfect Cleaning on vacant spaces of storage
  • Perfect Deletion on deleted files and folders of storage


Advantages over Similar Products

VX-Lock & VX-Lock Pro prevent us from being hacked with reasonable price.
(Hot: On Line Service / Cold: Off-Line Service / Cloud: Cloud Service)

Exodus
for Beginners
VX-Lock
for Desktop Users
best choice
VX-Lock Pro
for Desktop Users
best choice
Electrum
for Advanced Users
Mycelium
for Mobile Users
Ledger Nano X
Secure Hardware Wallets
Trezor Model T
Secure Hardware Wallets
Ledger Nano S
Secure Hardware Wallets
Type of Wallet
Hot / Cold
File Security
Cold
Hot / Cloud / Cold
Hot / Cloud / Cold
Cloud / Cold
Cold
Cold
Purchase Cost
Free
$12
$15
Free
Free
$119
$195
$59
Incorporated Exchange
No
No
No
Compatible Hardware
Backup & Recovery
No
Easy & Secure
Easy & Secure
No
No
Complex
Complex
Complex
Vulnerabilities
Danger
Most Secure
Most Secure
Danger
Danger
Secure
Secure
Secure