License Key Verification Engine
Cryptographically signed keys carry expiry metadata, device binding, and usage quotas. Invalid or revoked keys are rejected at the API gateway before any session is established.
Lokindi is Orvexium's Python-based SaaS platform — 13+ integrated security applications covering advanced encryption, data concealment, custom cipher systems, secure communications, and B2B security solutions. Account-tier access control, identity verification, and multi-layer 2FA protection throughout.
Lokindi is a Python-based SaaS platform providing 13+ integrated security applications — from advanced multi-layer encryption and steganographic data concealment to custom cipher systems, semantic encoding, and B2B security sandboxes. Access is account-tier controlled with built-in identity verification for both users and companies. No downloadable software. No self-hosted deployment.
Multi-layer text and file encryption with selectable packages, network layers, and protection methods (Password, PIN, 2FA, 2FA+PIN). Generates a direct link, QR Code, and short code upon completion.
Hide text or files inside any carrier file of any format — image inside image, text inside PDF, file inside video. Advanced steganographic algorithms with protection and self-destruct options.
Build your own private cipher system with custom character or word mappings. Single-owner architecture — transfer via JSON export to another user while the original is deleted, ensuring uniqueness.
Secure 1-to-1 messaging, group channels, and broadcast channels — each linkable to any Lokindi encryption system. Dynamic input interface adapts per encryption type selected.
Three account types (Personal, Company, Agency) with layered verification (user identity + company identity). Sensitive services are gated to verified companies and trusted users only.
From multi-layer encryption to steganography and B2B security sandboxes — every capability is built on Python and controlled by account tier and verification level.
Cryptographically signed keys carry expiry metadata, device binding, and usage quotas. Invalid or revoked keys are rejected at the API gateway before any session is established.
All platform interactions are mediated through hardened REST API endpoints. Each request carries HMAC-signed headers, is rate-limited, IP-filtered, and fully logged. Responses are signed to prevent tampering.
All data in motion — telemetry, supervision events, configuration payloads — is transmitted over TLS 1.3 with certificate pinning. No unencrypted channels exist anywhere in the Lokindi stack.
Administrators access a secure web-based dashboard to manage licenses, review session activity, configure access policies, and receive compliance alerts — without touching endpoint devices.
Subscription tiers define session duration limits, concurrent access thresholds, feature entitlements, and renewal windows. Changes propagate instantly across all active sessions.
Every encrypted message or hidden file can be configured to self-destruct after reading, after a set number of reads, or after a specific time window — enforced server-side with no client override possible.
Conceal text or any file inside any carrier file of any format. Image inside image, text inside PDF, file inside video. Multi-layer steganographic algorithms with selectable packages, protection methods, and self-destruct options.
Create private cipher systems with custom character-to-value or word-to-word mappings. Single-owner architecture with invite codes and JSON-based ownership transfer. Build secret languages only your circle can decode.
Upon registration, users choose an account type — Personal, Company, or Agency. Service availability, usage limits, and access to sensitive features depend on both account type and verification status.
Each application operates independently yet shares Lokindi's unified protection framework — selectable packages, network layers, and multi-method authentication.
Multi-layer text and file encryption. Choose content type → package → network layer → protection method. Outputs: direct link, QR Code, short code. Decryption via the Decryption app.
Build your own cipher: assign any value to any character (A→%, B→77, C→ZX). Link to packages or network layers. Single-owner model — transfer via JSON export, original must be deleted. Invite codes for shared usage.
Like Custom Encryption but at the word/sentence level. "million" → "rabbit", "dollar" → "green". Create a private language only your circle understands. Same single-owner, invite, and transfer model applies.
Advanced steganography: hide text or any file inside any carrier file. Image inside image, text inside PDF, file inside video. Package selection, protection methods, self-destruct. Extraction via the Extraction app.
Convert images to audio (.wav) for transmission over sound-only channels. The receiver reconstructs the image by inputting a short code, live-listening, or uploading the .wav file. For environments where file transfer is restricted.
Create Morse code messages via eye blink, light flash, button tap, or direct text input. Multi-language support. Protection methods and self-destruct options apply. Generates link, QR Code, and short code.
Encrypted 1-to-1 chat rooms. Link to any Lokindi encryption system — the input interface changes dynamically. Supports text, location, voice, images, files. PIN/Password/2FA per room. Social layer integration.
Group chats with Public, Private, or Secret modes. Invite via link or code. Admin roles, member management, permission control. Linkable to any encryption system. Messages can't be opened without the correct protection key.
Broadcast-only channels — owners/admins publish, subscribers can only read. Normal, encrypted, or hidden channel types. Protection methods mean subscribers need the correct key to read any message.
Create deals for complex sensitive problems: lost encryption keys, crypto system recovery, complex equations, physical simulations, technical tasks. Each deal spawns a custom isolated Sandbox with context-appropriate tools.
Built-in professional ticketing: general inquiries, technical issues, encryption problems, data loss, security reports, vulnerability disclosures. Priority tiers (low–critical), file attachments, reference numbers, isolated security track for vuln reports.
All operation outputs stored securely per account: encrypted files, steganographic carriers, Auralith audio, archived messages, custom system data. Quota scales with account type. Auto-purge on self-destruct expiry. Per-folder extra protection available.
Each core service follows a structured workflow. Expand any service below to understand the exact steps, options, and outputs.
Creating a System: Define a system name, language, title, description, and optional logo. Set a custom character mapping — assign any value to any character (A→%, B→77, C→ZX — no limit on value type or shape).
Security Binding: Optionally link the system to a Package, a Network Layer, or both — combining symbolic encryption with Lokindi's advanced cryptographic layers.
Access Control: Set the system as open, or protect it with a Password or PIN. Invite others via an invite code — they become subscribers and can use the system for their own messages.
Ownership Transfer: Export the system to JSON and transfer to another user. The original must be deleted first — the system is designed to exist with one owner at a time, ensuring uniqueness.
Using the System: Encrypt text only (files not supported). Choose protection method (Password/PIN/2FA/2FA+PIN), optional self-destruct, then generate link, QR Code, and short code. Decryption via the Decryption app.
Semantic Encoding works identically to Custom Encryption (same 98% architecture) — but instead of mapping characters, you map words or complete sentences to replacement words/phrases.
Example: "million" → "rabbit", "dollar" → "green". A message saying "I want one million dollars" becomes "I want one rabbit green". To a third party, the message is meaningless. Only someone with the system mapping can decode it.
Use Cases: Private language between two parties, team-internal slang-based encoding, covert communication that reads as normal text to outsiders, building a proprietary linguistic cipher.
All security features of Custom Encryption apply: single-owner model, invite codes, JSON transfer with mandatory original deletion, package/network binding, protection methods, self-destruct, and Decryption app access.
Arcanum is a B2B deal system for solving complex or sensitive technical problems. A client (person or company) creates a deal, specifies the problem type, and the executing party is directed to a custom isolated Sandbox environment.
Problem types handled: Lost or corrupted encryption keys, damaged encryption systems, complex mathematical equations, physics simulations, specialized technical tasks, system analysis, or custom-commissioned tasks.
Sandbox environment: Each deal generates an isolated workspace pre-loaded with tools matching the problem type — mathematical tools for equations, simulation tools for physics, cryptographic analysis tools for security problems, development environments for coding tasks. All work is performed in isolation with no impact on the main platform.
Every encryption, concealment, Morse, and custom cipher operation can be layered with protection authentication and time/read-based self-destruction.
Authentication Methods
User-defined passphrase required to view or extract content.
Numeric PIN code required to access the protected content.
Two-factor authentication required — unique to Lokindi, applied inside the encryption itself.
Combined two-factor authentication and PIN — maximum authentication strength.
Self-Destruct Options
Content is permanently destroyed after a single view — zero trace remains.
Set a specific read count limit — content auto-deletes after that many views.
Define an expiry duration — content is destroyed automatically when the window closes.
Output Artifacts
Getting started with Lokindi takes three steps — create your account, verify your identity, and access the full suite of encryption, concealment, and communication services.
Register on Lokindi and choose your account type: Personal, Company, or Agency. Each type determines your default service limits, storage quota, and access tier. Free and paid subscription plans are available.
Complete user or company identity verification to unlock tiered services. Verified users gain expanded limits and trusted status. Verified companies unlock company-exclusive and sensitive services not available to unverified accounts.
Access the full platform from your browser — no software to install. Encrypt, hide, encode, communicate securely, build custom cipher systems, transfer images over audio, or submit B2B security deals. All data encrypted in transit and at rest.
Lokindi is built on Python — enabling deep integration with cryptographic libraries, steganographic algorithms, signal processing (Auralith), and scientific computing (Arcanum sandboxes). The layered architecture separates service logic, account management, and sandbox isolation.
Every API call is checked against account type (Personal / Company / Agency), verification level (Unverified / Verified User / Verified Company / Trusted), and subscription tier (Free / Paid). Services unavailable to the caller's tier are rejected at the API gateway.
Packages are composite bundles of encryption or steganographic libraries. Network layers define transmission protection depth. Both dimensions scale with account type — higher tiers access stronger packages and more protected network configurations.
Each Arcanum B2B deal spawns a fully isolated sandbox environment. The environment is provisioned with task-appropriate tools — mathematical, physics, cryptographic, or development — and operates independently from the main platform with zero cross-contamination.
All operation outputs are stored encrypted per-user with tenant isolation. Self-destruct configurations (read-based or time-based) are enforced server-side with automatic purge jobs. Per-folder additional protection layers are supported.
Lokindi was engineered within, and remains accountable to, Orvexium's formal information security policy framework.
Lokindi's access control model, encryption standards, incident response integration, and audit logging are designed to operate within Orvexium's Information Security Policy. All platform operations are subject to Orvexium's security governance review cycle.
Read PolicyAll personally identifiable information processed through Lokindi — including user session records, supervision logs, and account data — is handled in strict compliance with Orvexium's Data Protection Policy, with data minimisation and subject access rights enforced at platform level.
Read PolicyUse of Lokindi is governed by Orvexium's Acceptable Use Policy. Licensees agree to use the platform exclusively for lawful monitoring and supervision. Misuse or circumvention of license controls may result in immediate licence revocation.
Read PolicyEnable parents to monitor, restrict, and govern child device usage through a secure administrative interface — with real-time session activity, application usage, and access attempts logged and reported.
IT administrators gain centralised visibility into workforce endpoint activity. License keys are issued per device or per user, ensuring only authorised hardware and identities access corporate systems.
Software vendors integrate Lokindi as an access validation layer — ensuring only licensed users interact with their applications. Session quotas, feature flags, and subscription tiers are enforced at the API level.
Organisations operating distributed teams or multi-site deployments use Lokindi to maintain consistent access governance across geographic boundaries. License validation is performed centrally regardless of user location.
Lokindi is not just an encryption tool. It is a platform for creating, owning, and operating private security systems — with capabilities that exist nowhere else.
Unlike platforms that only protect login, Lokindi embeds 2FA directly inside the encryption operation itself. The content cannot be decrypted without authenticating at the moment of access — independent of any login session.
Custom Encryption and Semantic Encoding use a single-owner model. You own the system. You control who uses it. You can transfer it via JSON with mandatory deletion of the original — ensuring the cipher exists in exactly one place at a time.
Standard encryption, steganography, Morse, audio-based image transfer (Auralith), semantic language encoding, secure messaging, groups, channels, B2B sandbox, ticketing, and storage — all in one platform, all sharing the same protection framework.
Convert images to .wav audio for transmission over sound-only channels. The receiver reconstructs the original image by listening live or uploading the audio file. Designed for environments where visual file transfer is blocked or monitored.
Self-destruct is enforced server-side — not client-side. After read, after N reads, or after a time window: the content is permanently purged from storage with no client override or bypass possible. Zero trace architecture.
No other SaaS platform provides an on-demand isolated technical sandbox for B2B security problem-solving. Lost keys, damaged systems, complex equations, or custom technical tasks — each gets a purpose-built isolated environment.
Technical and commercial questions about the Lokindi platform and how it is delivered.
No. Lokindi is a Python-based SaaS platform operated entirely by Orvexium. There is no downloadable client, standalone installer, or self-hosted deployment option. All 13+ applications are accessed directly from your browser after registration — no software installation required.
There are three account types: Personal (individual use, basic limits), Company (business use, expanded limits, company-exclusive services), and Agency (maximum capabilities, professional storage, priority Arcanum processing).
Service availability also depends on verification level: Unverified → Verified User → Verified Company → Trusted User. Some sensitive services are restricted to verified companies and trusted users only.
Standard Encryption uses Lokindi's built-in cryptographic packages and network layers — bundles of pre-built encryption algorithms. It supports both text and file encryption with selectable protection strength.
Custom Encryption lets you build your own cipher system from scratch — defining what each character maps to (A→%, B→77, etc.). You own the system with a single-owner model. Only text encryption is supported (not files). The system can optionally be linked to Lokindi's standard packages or network layers for combined protection.
Inlay is Lokindi's steganography service. Instead of scrambling content into unreadable ciphertext (encryption), steganography hides content inside an ordinary-looking carrier file. The carrier file (image, PDF, video, audio, document) appears completely normal — but contains hidden text or a hidden file embedded within it.
To a third party, there is nothing unusual about the carrier file. Only someone using the Extraction app — with the correct protection method — can recover the hidden content. Daily usage limits apply per account type.
Auralith converts an image into a .wav audio file by encoding the visual data as audio frequencies. The receiving party reconstructs the original image by inputting a short code, having the system listen to the audio live (via microphone), or by uploading the .wav file directly.
Use cases include: environments where file transfer is blocked or monitored, transmission channels that only carry audio (radio, phone lines), covert data transfer, and experimental non-traditional communication scenarios.
Arcanum is Lokindi's B2B deal system for solving complex or sensitive technical problems. It is aimed at companies and individuals who need specialist help with: lost or corrupted encryption keys, damaged encryption systems, complex mathematical or physics problems, specialized technical task execution, or system analysis.
Each deal creates an isolated Sandbox environment with pre-loaded tools specific to the problem type (mathematical tools, simulation engines, cryptographic analysis tools, or development environments). All work is performed in isolation — no impact on the main platform.
Four protection methods are available: Password, PIN, 2FA, and 2FA+PIN. These are applied at the content level — not at the login level. This means the content cannot be accessed even if someone is logged into the platform, without separately authenticating with the correct method.
2FA inside encryption is unique to Lokindi: the two-factor authentication is embedded into the decryption process itself, not just the account login. This provides protection that persists independently of session state.
Three self-destruct modes are available: after first read (single-view, then permanently deleted), after N reads (specify how many views before deletion), and after a time window (define an expiry duration after which content auto-purges).
All self-destruct logic is enforced server-side — it cannot be bypassed or overridden by the client. Once triggered, the content and all associated access artifacts (link, QR, short code) become permanently non-functional.
Lokindi is designed and operated in accordance with Orvexium's Data Protection Policy, which addresses data minimisation, retention controls, subject access rights, and lawful basis for processing. Organisations deploying Lokindi for monitoring purposes are responsible for ensuring their own lawful basis and disclosure obligations are met in their jurisdiction.
Visit lokindi.com to register directly, or contact Orvexium for enterprise onboarding and custom integration requirements. Choose your account type at registration, complete identity verification to unlock your full tier, and access all 13+ applications immediately — no software installation required.