UNBREAKABLE ENCRYPTION
PDS provides unbreakable encryption, relying on AES ciphers and key sizes up to 256 bits. PDS also supports the use of the TDEA and DES ciphers, with the former considered secure and the latter not so since the 1990's (DES is useful for distributing and evaluating PDS). TDEA, in any of its forms, is an extension of DES, and recently (July 2017) the National Institute of Standards and Technology proposed that TDEA be deprecated. Though both AES and TDEA are considered secure today, AES is the clear choice to keep your confidential information secure well into the future.
DATA AVAILABILITY
PDS is written in the Java language, so 1) the same PDS binary runs on Linux/Unix, Mac and Windows Desktop/Laptop computers,* 2) the features, security and quality of each release is equal, and 3) as newer Java runtime environments (JREs) support applications written for older JREs, PDS will run on the JREs of the future. All of this may be verified today by mixing and matching combinations of PDS, OS's and JREs (currently 6, 7, 8, 9 and now 10). So, whether it's Java 10 or 100, PDS will be there for you, making sure your confidential information is always available.
* Note: The demise of Apple's JDK caused a one-time glitch on Mac when Apple libraries were integrated into Java 9.
OPEN SOURCE
For the most part, Java runtime environments (JRE) leverage the open source JRE from OpenJDK, so the complex cryptographic libraries that securely generate the cryptographic components (ciphers, keys and keystores) are open-source. Knowing that cryptographic experts have reviewed these libraries should give all of us some piece of mind.
Generating keys and keystores in Java are boilerplate, and to demonstrate PDS provides the source code for those operations. The remaining area, the creation of ciphers, is not so trivial, so PDS provides the source code for that operation also. PDS verification doesn't stop there, as it also provides 1) runtime verification of the use of the cryptographic objects, to include events such as creating and accessing keystores, keys and ciphers, and 2) a verification each time a password array has been "scrubbed" from memory.
HOW TO FIGHT IDENTITY THEFT AND CYBERCRIME ??
Keep your passwords confidential.
Never reuse your passwords - random passwords are best.