Integrated Applications
13+
Backend
Python
Account Types
3 Tiers
Protection Methods
4 Types
Deployment Model
SaaS
Service Overview

A Full-Spectrum Security Platform.
SaaS-Delivered.

Lokindi is a Python-based SaaS platform providing 13+ integrated security applications — from advanced multi-layer encryption and steganographic data concealment to custom cipher systems, semantic encoding, and B2B security sandboxes. Access is account-tier controlled with built-in identity verification for both users and companies. No downloadable software. No self-hosted deployment.

  • Advanced Encryption System

    Multi-layer text and file encryption with selectable packages, network layers, and protection methods (Password, PIN, 2FA, 2FA+PIN). Generates a direct link, QR Code, and short code upon completion.

  • Steganography — Data Concealment (Inlay)

    Hide text or files inside any carrier file of any format — image inside image, text inside PDF, file inside video. Advanced steganographic algorithms with protection and self-destruct options.

  • Custom Encryption & Semantic Encoding

    Build your own private cipher system with custom character or word mappings. Single-owner architecture — transfer via JSON export to another user while the original is deleted, ensuring uniqueness.

  • Secure Communications Layer

    Secure 1-to-1 messaging, group channels, and broadcast channels — each linkable to any Lokindi encryption system. Dynamic input interface adapts per encryption type selected.

  • Account-Tiered Access & Identity Verification

    Three account types (Personal, Company, Agency) with layered verification (user identity + company identity). Sensitive services are gated to verified companies and trusted users only.

Core Capabilities

Eight Pillars of Platform Security

From multi-layer encryption to steganography and B2B security sandboxes — every capability is built on Python and controlled by account tier and verification level.

License Key Verification Engine

Cryptographically signed keys carry expiry metadata, device binding, and usage quotas. Invalid or revoked keys are rejected at the API gateway before any session is established.

Real-Time Key Binding Expiry Enforcement

Secure API Validation

All platform interactions are mediated through hardened REST API endpoints. Each request carries HMAC-signed headers, is rate-limited, IP-filtered, and fully logged. Responses are signed to prevent tampering.

HMAC Signing Rate Limiting IP Filtering

Encrypted Communication Layer

All data in motion — telemetry, supervision events, configuration payloads — is transmitted over TLS 1.3 with certificate pinning. No unencrypted channels exist anywhere in the Lokindi stack.

TLS 1.3 Cert Pinning Zero Plain-Text

Remote Administrative Dashboard

Administrators access a secure web-based dashboard to manage licenses, review session activity, configure access policies, and receive compliance alerts — without touching endpoint devices.

Web-Based RBAC-Controlled Audit Logs

Usage Control & Subscription Management

Subscription tiers define session duration limits, concurrent access thresholds, feature entitlements, and renewal windows. Changes propagate instantly across all active sessions.

Tier Management Instant Propagation Quota Enforcement

Self-Destruct & Expiry Controls

Every encrypted message or hidden file can be configured to self-destruct after reading, after a set number of reads, or after a specific time window — enforced server-side with no client override possible.

Auto-Destroy Read Counter Time-Based Expiry

Inlay — Advanced Steganography

Conceal text or any file inside any carrier file of any format. Image inside image, text inside PDF, file inside video. Multi-layer steganographic algorithms with selectable packages, protection methods, and self-destruct options.

Steganography Any File Format Multi-Layer

Custom Encryption & Semantic Encoding

Create private cipher systems with custom character-to-value or word-to-word mappings. Single-owner architecture with invite codes and JSON-based ownership transfer. Build secret languages only your circle can decode.

Custom Cipher Single-Owner Invite System
Platform Services

13 Integrated Security Applications

Each application operates independently yet shares Lokindi's unified protection framework — selectable packages, network layers, and multi-method authentication.

Cryptography

Standard Encryption

Multi-layer text and file encryption. Choose content type → package → network layer → protection method. Outputs: direct link, QR Code, short code. Decryption via the Decryption app.

Text & File Packages Network Layers

Custom Encryption System

Build your own cipher: assign any value to any character (A→%, B→77, C→ZX). Link to packages or network layers. Single-owner model — transfer via JSON export, original must be deleted. Invite codes for shared usage.

Char Mapping Single-Owner JSON Transfer

Semantic Encoding System

Like Custom Encryption but at the word/sentence level. "million" → "rabbit", "dollar" → "green". Create a private language only your circle understands. Same single-owner, invite, and transfer model applies.

Word Mapping Secret Language Single-Owner
Concealment & Transfer

Inlay — Data Concealment

Advanced steganography: hide text or any file inside any carrier file. Image inside image, text inside PDF, file inside video. Package selection, protection methods, self-destruct. Extraction via the Extraction app.

Steganography Any Format Daily Limits

Auralith

Convert images to audio (.wav) for transmission over sound-only channels. The receiver reconstructs the image by inputting a short code, live-listening, or uploading the .wav file. For environments where file transfer is restricted.

Image → Audio Live Listen WAV Output

Morse Communication System

Create Morse code messages via eye blink, light flash, button tap, or direct text input. Multi-language support. Protection methods and self-destruct options apply. Generates link, QR Code, and short code.

4 Input Methods Multi-Language Protected
Secure Communications

Secure Messaging

Encrypted 1-to-1 chat rooms. Link to any Lokindi encryption system — the input interface changes dynamically. Supports text, location, voice, images, files. PIN/Password/2FA per room. Social layer integration.

1-to-1 Dynamic UI Any Cipher

Secure Groups

Group chats with Public, Private, or Secret modes. Invite via link or code. Admin roles, member management, permission control. Linkable to any encryption system. Messages can't be opened without the correct protection key.

Public/Private/Secret Role Control Encrypted

Secure Channels

Broadcast-only channels — owners/admins publish, subscribers can only read. Normal, encrypted, or hidden channel types. Protection methods mean subscribers need the correct key to read any message.

Broadcast Owner-Publish Key-Gated
Enterprise & Platform

Arcanum — B2B Sandbox

Create deals for complex sensitive problems: lost encryption keys, crypto system recovery, complex equations, physical simulations, technical tasks. Each deal spawns a custom isolated Sandbox with context-appropriate tools.

B2B Isolated Sandbox Specialized Tools

Support & Incident Ticketing

Built-in professional ticketing: general inquiries, technical issues, encryption problems, data loss, security reports, vulnerability disclosures. Priority tiers (low–critical), file attachments, reference numbers, isolated security track for vuln reports.

6 Ticket Types Priority Levels Security Track

Secure Storage System

All operation outputs stored securely per account: encrypted files, steganographic carriers, Auralith audio, archived messages, custom system data. Quota scales with account type. Auto-purge on self-destruct expiry. Per-folder extra protection available.

Account-Scaled Auto-Purge Per-Folder Lock
How Services Work

Service Workflow Detail

Each core service follows a structured workflow. Expand any service below to understand the exact steps, options, and outputs.

1
Content Type — Choose text encryption or file encryption.
2
Package Selection — Packages are combined layers of encryption libraries and algorithms. Available packages vary by account type and subscription tier (free/paid).
3
Network Layer — Select a network layer that determines the protection depth. Options vary by account type.
4
Protection Method — Password, PIN, 2FA, or 2FA+PIN. Content cannot be decrypted without the correct method input.
5
Security Options — Optional: self-destruct after read, after N reads, or after a set time period.
Output — Direct access link, QR Code, and short code generated. Decryption via the Decryption app (link, QR, short code, or manual paste for text / file upload for files).
1
Content to Hide — Choose to hide text or a file inside the carrier.
2
Carrier File — Upload any file in any format to serve as the container (image, PDF, video, audio, document).
3
Package Selection — Layers of steganographic libraries and algorithms. Availability based on account type.
4
Protection Method — Password, PIN, 2FA, or 2FA+PIN. The hidden content cannot be extracted without the correct method.
5
Security Options — Optional self-destruct: after read, after N reads, or after time.
Output — New carrier file created, plus direct link, QR Code, and short code. Extraction via the Extraction app (link/QR/short code, or file upload with auto-detection of package, network, and protection type).

Creating a System: Define a system name, language, title, description, and optional logo. Set a custom character mapping — assign any value to any character (A→%, B→77, C→ZX — no limit on value type or shape).

Security Binding: Optionally link the system to a Package, a Network Layer, or both — combining symbolic encryption with Lokindi's advanced cryptographic layers.

Access Control: Set the system as open, or protect it with a Password or PIN. Invite others via an invite code — they become subscribers and can use the system for their own messages.

Ownership Transfer: Export the system to JSON and transfer to another user. The original must be deleted first — the system is designed to exist with one owner at a time, ensuring uniqueness.

Using the System: Encrypt text only (files not supported). Choose protection method (Password/PIN/2FA/2FA+PIN), optional self-destruct, then generate link, QR Code, and short code. Decryption via the Decryption app.

Semantic Encoding works identically to Custom Encryption (same 98% architecture) — but instead of mapping characters, you map words or complete sentences to replacement words/phrases.

Example: "million" → "rabbit", "dollar" → "green". A message saying "I want one million dollars" becomes "I want one rabbit green". To a third party, the message is meaningless. Only someone with the system mapping can decode it.

Use Cases: Private language between two parties, team-internal slang-based encoding, covert communication that reads as normal text to outsiders, building a proprietary linguistic cipher.

All security features of Custom Encryption apply: single-owner model, invite codes, JSON transfer with mandatory original deletion, package/network binding, protection methods, self-destruct, and Decryption app access.

Arcanum is a B2B deal system for solving complex or sensitive technical problems. A client (person or company) creates a deal, specifies the problem type, and the executing party is directed to a custom isolated Sandbox environment.

Problem types handled: Lost or corrupted encryption keys, damaged encryption systems, complex mathematical equations, physics simulations, specialized technical tasks, system analysis, or custom-commissioned tasks.

Sandbox environment: Each deal generates an isolated workspace pre-loaded with tools matching the problem type — mathematical tools for equations, simulation tools for physics, cryptographic analysis tools for security problems, development environments for coding tasks. All work is performed in isolation with no impact on the main platform.

Protection Framework

Four Protection Methods. Three Destruction Modes.

Every encryption, concealment, Morse, and custom cipher operation can be layered with protection authentication and time/read-based self-destruction.

Authentication Methods

Password

User-defined passphrase required to view or extract content.

PIN

Numeric PIN code required to access the protected content.

2FA

Two-factor authentication required — unique to Lokindi, applied inside the encryption itself.

2FA + PIN

Combined two-factor authentication and PIN — maximum authentication strength.

Self-Destruct Options

After First Read

Content is permanently destroyed after a single view — zero trace remains.

After N Reads

Set a specific read count limit — content auto-deletes after that many views.

After Time Window

Define an expiry duration — content is destroyed automatically when the window closes.

Output Artifacts

Direct Access Link
QR Code
Short Access Code
How It Works

Register. Verify. Protect.

Getting started with Lokindi takes three steps — create your account, verify your identity, and access the full suite of encryption, concealment, and communication services.

Create Your Account

Register on Lokindi and choose your account type: Personal, Company, or Agency. Each type determines your default service limits, storage quota, and access tier. Free and paid subscription plans are available.

Verify Your Identity

Complete user or company identity verification to unlock tiered services. Verified users gain expanded limits and trusted status. Verified companies unlock company-exclusive and sensitive services not available to unverified accounts.

Use 13+ Security Applications

Access the full platform from your browser — no software to install. Encrypt, hide, encode, communicate securely, build custom cipher systems, transfer images over audio, or submit B2B security deals. All data encrypted in transit and at rest.

Technical Architecture

Python-Based Layered Architecture

Python SaaS Backend

Lokindi is built on Python — enabling deep integration with cryptographic libraries, steganographic algorithms, signal processing (Auralith), and scientific computing (Arcanum sandboxes). The layered architecture separates service logic, account management, and sandbox isolation.

Account-Tier Access Control

Every API call is checked against account type (Personal / Company / Agency), verification level (Unverified / Verified User / Verified Company / Trusted), and subscription tier (Free / Paid). Services unavailable to the caller's tier are rejected at the API gateway.

Package & Network Layer System

Packages are composite bundles of encryption or steganographic libraries. Network layers define transmission protection depth. Both dimensions scale with account type — higher tiers access stronger packages and more protected network configurations.

Arcanum Sandbox Isolation

Each Arcanum B2B deal spawns a fully isolated sandbox environment. The environment is provisioned with task-appropriate tools — mathematical, physics, cryptographic, or development — and operates independently from the main platform with zero cross-contamination.

Encrypted Storage & Auto-Purge

All operation outputs are stored encrypted per-user with tenant isolation. Self-destruct configurations (read-based or time-based) are enforced server-side with automatic purge jobs. Per-folder additional protection layers are supported.

Security Alignment

Policy-Conformant by Architecture

Lokindi was engineered within, and remains accountable to, Orvexium's formal information security policy framework.

Information Security Policy

Lokindi's access control model, encryption standards, incident response integration, and audit logging are designed to operate within Orvexium's Information Security Policy. All platform operations are subject to Orvexium's security governance review cycle.

Read Policy

Data Protection Policy

All personally identifiable information processed through Lokindi — including user session records, supervision logs, and account data — is handled in strict compliance with Orvexium's Data Protection Policy, with data minimisation and subject access rights enforced at platform level.

Read Policy

Acceptable Use Policy

Use of Lokindi is governed by Orvexium's Acceptable Use Policy. Licensees agree to use the platform exclusively for lawful monitoring and supervision. Misuse or circumvention of license controls may result in immediate licence revocation.

Read Policy
Use Cases

Deployed Across Four Verticals

Parental Supervision

Enable parents to monitor, restrict, and govern child device usage through a secure administrative interface — with real-time session activity, application usage, and access attempts logged and reported.

  • Real-time usage dashboards
  • Time-based access controls
  • Activity reporting per device
  • Remote policy enforcement

Enterprise Device Control

IT administrators gain centralised visibility into workforce endpoint activity. License keys are issued per device or per user, ensuring only authorised hardware and identities access corporate systems.

  • Per-device license issuance
  • Centralised fleet oversight
  • Policy deviation alerts
  • Compliance audit exports

License-Based Application Management

Software vendors integrate Lokindi as an access validation layer — ensuring only licensed users interact with their applications. Session quotas, feature flags, and subscription tiers are enforced at the API level.

  • API-level license enforcement
  • Feature entitlement gating
  • Session quota management
  • Subscription tier routing

Secure Distributed Access Systems

Organisations operating distributed teams or multi-site deployments use Lokindi to maintain consistent access governance across geographic boundaries. License validation is performed centrally regardless of user location.

  • Geographically distributed enforcement
  • Centralised access governance
  • Remote workforce support
  • Multi-site policy consistency
Why Lokindi

What Makes Lokindi Different

Lokindi is not just an encryption tool. It is a platform for creating, owning, and operating private security systems — with capabilities that exist nowhere else.

2FA Inside the Encryption

Unlike platforms that only protect login, Lokindi embeds 2FA directly inside the encryption operation itself. The content cannot be decrypted without authenticating at the moment of access — independent of any login session.

Own Your Cipher System

Custom Encryption and Semantic Encoding use a single-owner model. You own the system. You control who uses it. You can transfer it via JSON with mandatory deletion of the original — ensuring the cipher exists in exactly one place at a time.

13 Integrated Applications

Standard encryption, steganography, Morse, audio-based image transfer (Auralith), semantic language encoding, secure messaging, groups, channels, B2B sandbox, ticketing, and storage — all in one platform, all sharing the same protection framework.

Audio-Based Image Transfer (Auralith)

Convert images to .wav audio for transmission over sound-only channels. The receiver reconstructs the original image by listening live or uploading the audio file. Designed for environments where visual file transfer is blocked or monitored.

Server-Side Self-Destruct

Self-destruct is enforced server-side — not client-side. After read, after N reads, or after a time window: the content is permanently purged from storage with no client override or bypass possible. Zero trace architecture.

B2B Security Sandbox (Arcanum)

No other SaaS platform provides an on-demand isolated technical sandbox for B2B security problem-solving. Lost keys, damaged systems, complex equations, or custom technical tasks — each gets a purpose-built isolated environment.

FAQ

Common Questions

Technical and commercial questions about the Lokindi platform and how it is delivered.

No. Lokindi is a Python-based SaaS platform operated entirely by Orvexium. There is no downloadable client, standalone installer, or self-hosted deployment option. All 13+ applications are accessed directly from your browser after registration — no software installation required.

There are three account types: Personal (individual use, basic limits), Company (business use, expanded limits, company-exclusive services), and Agency (maximum capabilities, professional storage, priority Arcanum processing).

Service availability also depends on verification level: Unverified → Verified User → Verified Company → Trusted User. Some sensitive services are restricted to verified companies and trusted users only.

Standard Encryption uses Lokindi's built-in cryptographic packages and network layers — bundles of pre-built encryption algorithms. It supports both text and file encryption with selectable protection strength.

Custom Encryption lets you build your own cipher system from scratch — defining what each character maps to (A→%, B→77, etc.). You own the system with a single-owner model. Only text encryption is supported (not files). The system can optionally be linked to Lokindi's standard packages or network layers for combined protection.

Inlay is Lokindi's steganography service. Instead of scrambling content into unreadable ciphertext (encryption), steganography hides content inside an ordinary-looking carrier file. The carrier file (image, PDF, video, audio, document) appears completely normal — but contains hidden text or a hidden file embedded within it.

To a third party, there is nothing unusual about the carrier file. Only someone using the Extraction app — with the correct protection method — can recover the hidden content. Daily usage limits apply per account type.

Auralith converts an image into a .wav audio file by encoding the visual data as audio frequencies. The receiving party reconstructs the original image by inputting a short code, having the system listen to the audio live (via microphone), or by uploading the .wav file directly.

Use cases include: environments where file transfer is blocked or monitored, transmission channels that only carry audio (radio, phone lines), covert data transfer, and experimental non-traditional communication scenarios.

Arcanum is Lokindi's B2B deal system for solving complex or sensitive technical problems. It is aimed at companies and individuals who need specialist help with: lost or corrupted encryption keys, damaged encryption systems, complex mathematical or physics problems, specialized technical task execution, or system analysis.

Each deal creates an isolated Sandbox environment with pre-loaded tools specific to the problem type (mathematical tools, simulation engines, cryptographic analysis tools, or development environments). All work is performed in isolation — no impact on the main platform.

Four protection methods are available: Password, PIN, 2FA, and 2FA+PIN. These are applied at the content level — not at the login level. This means the content cannot be accessed even if someone is logged into the platform, without separately authenticating with the correct method.

2FA inside encryption is unique to Lokindi: the two-factor authentication is embedded into the decryption process itself, not just the account login. This provides protection that persists independently of session state.

Three self-destruct modes are available: after first read (single-view, then permanently deleted), after N reads (specify how many views before deletion), and after a time window (define an expiry duration after which content auto-purges).

All self-destruct logic is enforced server-side — it cannot be bypassed or overridden by the client. Once triggered, the content and all associated access artifacts (link, QR, short code) become permanently non-functional.

Lokindi is designed and operated in accordance with Orvexium's Data Protection Policy, which addresses data minimisation, retention controls, subject access rights, and lawful basis for processing. Organisations deploying Lokindi for monitoring purposes are responsible for ensuring their own lawful basis and disclosure obligations are met in their jurisdiction.

Visit lokindi.com to register directly, or contact Orvexium for enterprise onboarding and custom integration requirements. Choose your account type at registration, complete identity verification to unlock your full tier, and access all 13+ applications immediately — no software installation required.

Get Started with Lokindi

Bring Intelligence-Grade Access Control to Your Organisation

Contact Orvexium to discuss licensing, integration requirements, and deployment options for the Lokindi platform within your environment.