Software Alternatives & Reviews
Register   |   Login

Cryptonite VS Axcrypt

Compare Cryptonite VS Axcrypt and see what are their differences

Cryptonite brings EncFS and TrueCrypt to Android.

We have a newer web site! Visit axcrypt. net instead! AxCrypt - Password Protect Files With Strong Encryption. AxCrypt is the leading open source file encryption software for Windows.
Cryptonite Landing Page
Cryptonite Landing Page
Axcrypt Landing Page
Axcrypt Landing Page

Cryptonite details

File Encryption Security & Privacy Encryption

Axcrypt details

File Encryption Security & Privacy Encryption

Cryptonite videos

No Cryptonite videos yet. You could help us improve this page by suggesting one.

+ Add video

Axcrypt videos

Free encryption software for windows AxCrypt

More videos:

  • - How to Use AxCrypt
  • - AxCrypt 2.1.1573.0

Category Popularity

0-100% (relative to Cryptonite and Axcrypt)

What are some alternatives?

When comparing Cryptonite and Axcrypt, you can also consider the following products

VeraCrypt - When you need to know that your information is secure, VeraCrypt offers an added layer of protection. Their encrypting process keeps your files and data safe from prying eyes.

LibreCrypt - LibreCrypt (formerly DoxBox) is an open-source disk encryption for Windows and the successor of...

AES Crypt - AES Crypt is an advanced file encryption utility that integrates with the Windows shell or runs from the Linux command prompt to provide a simple, yet powerful, tool for encrypting files using the Advanced Encryption Standard (AES).

LUKS - LUKS is the standard for Linux hard disk encryption.

Cryptomator - When it comes to saving your files on a cloud server, it is important to ensure the security of those files. Keeping your delicate files out of the wrong hands can save you a lot of time and hassle. Read more about Cryptomator.

File Lock PEA - Password-encryption of files and directories. File PEA encrypts files and folders with authenticated encryption to protect confidentiality and integrity. The program uses memory-hard key derivation functions to prevent custom hardware attacks.

User reviews

Share your experience with using Cryptonite and Axcrypt. For example, how are they different and which one is better?

Post a review