How this Privacy Technology Works

Use this link to access Full Speed Ahead and Damn the Qubits: How Marpx Extreme Encryption Works by Douglas Lowry, Ph.D. If you stayed awake in high school math classes, you are on your way to understanding a neat method of post-quantum encryption. $9.99 US for the ebook, $15.99 for the print edition at

MarpX Privacy with Automatic Keys -- FREE

MarpX Privacy has been released with Automatic Key ability, 3.5 trillion keys, and ability to support Extreme Encryption add-ons. You may download this Windows program for free from anywhere in the world. Go to Shopping Cart, MarpX Privacy, select quantity "one", register, and download. When you activate the download, be very sure to RIGHT CLICK on MarpxPrivacySetup.exe and select RUN AS ADMINISTRATOR to install the program.

MarpX Extreme Encryption™ -- Add-ons

MarpX Extreme Encryption™ add-ons are available only in the United States. Instead of only 3.5 trillion different keys, with an Extreme Encryption™ add-on to MarpX Privacy you can exchange messages and files with a confidant of your choice with unusual security. The number of keys a hacker has to try is a number 623 digits long.


If your organization has a vested interest in U.S. national security, if it is U.S. based and U.S. owned, and if you are interested in building this technology into your organization's software, please contact Stephen Feher at or 740 317-4847. Thank you.

Privacy Goals Achieved


Privacy goals achieved

In our research, development, and 2017 patent application, we believe we have fully achieved each of the following goals. The overall purpose is to make life extremely difficult for hackers of messages and files. You are invited to judge the success and the quality of these endeavors!

  1. Destroy all meaningful patterns in data (in technical terms, "high entropy" results).
  2. Resist brute force attacks. Make attacks difficult with MarpX Good Privacy, make attacks 438 times more difficult with MarpX Better Privacy, and render brute force attacks impossible ("computationally infeasible") with Extreme Encryption™.
  3. Blindfold the hacker.
  4. Maximize efficiency of encryption and decryption.
  5. Add research capability (search and text data mining) to encrypted content.
  6. Achieve full scalability in the light of the quantum computing threat.