The OBAKE-512 algorithm (which our software is named after) is the result of many years of development and enhancement, conducted by David B.Svaiter, an InfoSec professional and cryptology researcher for many decades. The algorithm was first created in 1999 for using on i386 machines and Windows 98 by a shareware software called CYPHER, and over the last decades has been updated to achieve greater speed and improve its cryptographic security due to the advance of cryptanalysis and attacks.
The algorithm is annualy revised.
The algorithm is private and not published to make it harder for everyone to attack its results. Moreover, this result is another security layer since an attack must cryptanalise the algorithm beyond the utilized key, which is challenging. But, some people may argue that "security-by-obscurity" is not a valid protection scheme for encryption tools, and for these, we say that::
And finally: do you know what are the encryption algorithms utilized by NAVY to contact submarines or those used by the Intel agencies worldwide?
However, to avoid suspicions about "backdoors" or other illegal procedures, we inform you that the code can be audited by any volume-based customer (above 1000 licenses) using a trusted third party elected by both companies (ours and yours) with the total cost under the sole responsibility of the customer and subject to specific rules as described in a particular NDA to be signed by all parties involved. Also, if needed, the compilation can be done on a certified and reviewed code within the customer's premises, accompanied by internal auditors, and following the same rules described above.
Below you can see how OBAKE is resistant to the most critical criptanalysis attacks.