Originally Posted By: JustSid
How does it work? Is it I/O expensive? Do you use a symmetric or asymmetric encryption? Does the encryption make use of multiple cores? And last but not least: Is there a test application which uses your system so that we can test it?

You can find a demostration of how it works by viewing the Video linked in first post.
It combines the two encryption types, symmetric and asymmetric, and no, it isn't resource expensive.

Paolo Infante.