According to a document leaked by Anonymous, the keys are protected by 256-bit security, and are saved on a internal server, and issued only to the authorized users. The current key provided for download never expires.
Acid Cryptofiler's primary threat is to information systems because of its adaptability. Users are not given access to the server where the keys are stored and each key is coded with a numerical code. The keys identifying the users are provided at the same time as the user's email address. Because of Acid Cryptofiler's central structure, if any of the nodes fail, other nodes can recover the keys.
Acid Cryptofiler allows encryption of information to be stored. The file encryption algorithm provided by the program is AES-256. The decryption is carried out with 256-key, which is the largest key that can be made and issued by the organization. The keys are saved on a central server and only a single copy of the keys is stored in the key server. A customer records a password so that the authorization of a key can be tracked and viewed. 7211a4ac4a