************************** Used Algorithms and Hashes ************************** The encryption technologies used are strong, open, and industry-proven: * RSA 4096-bit keys for asymmetric encryption * OAEP (Optimal Asymmetric Encryption Padding) using MGF1 with SHA-256 * AES-256 in CBC mode for data encryption, using random keys and IVs * SHA3-512 digests for verifying metadata, file content, and overall file integrity * All digests, metadata, and file data are encrypted with individual random IVs * The file-level checksum is **not encrypted** to allow fast integrity checks