Proprietary AI Ecosystem

The foundation for intelligent systems

AegisVectro provides a wide range of products and services built on top of our proprietary AI. We develop modern software, secure systems, fine-tuned AI models, and more.

Flagship Product · Live on Google Play

When everything fails, VELORYN doesn't.

A fully offline AI survival assistant. On-device intelligence, vector search across 500+ survival manuals, 30+ tools, vision support, and mesh networking — built to work when cell towers fall and infrastructure collapses.

100%
Offline
30+
Tools
500+
Manuals
0
Exfiltration

State-of-the-art on-device AI

Billion-parameter language models running fully on your phone. No cloud. No data leaks.

Vision in your pocket

Analyse injuries, plants, terrain, and water sources from a single photo — even with no signal.

Mesh networking

Discover nearby VELORYN devices over Bluetooth and WiFi Direct. Broadcast SOS without a cell tower.

Offline real-time world map

Full-planet vector map with GPS positioning — pre-loaded so you never need to download a tile.

Security Flagship · Browser Extension

Your browser, defended locally.

Our flagship browser extension. A 17-engine defense matrix, Vision AI for phishing detection, and active DOM injection monitoring — all powered by our proprietary local intelligence. Nothing leaves your machine.

17
Engines
100%
Local
DOM Watch
0
Telemetry

17-engine defense matrix

Layered detection across heuristics, signatures, and behavioural analysis — every page, every click.

Vision AI for phishing

A local vision model spots cloned login pages by their visual fingerprint, not just their URL.

DOM injection monitoring

Watches the document tree in real time for hostile script grafts, formjacking, and overlay attacks.

Zero exfiltration

Every engine runs on-device. No central database, no traffic harvesting, no account required.

Encryption Suite · Stable v2.1 · Offline Only

Stateless encryption for the post-quantum era.

A stateless cryptographic engine. Memory-hard Argon2id key derivation, AES-256-GCM authenticated encryption, and a self-contained .qenc file format — no databases, no key servers, no network.

AES-256
GCM Cipher
Argon2id
Memory KDF
v2.1
Stable Release
0
Telemetry

Memory-hard Argon2id KDF

Tunable memory cost makes GPU and ASIC brute-force clusters economically infeasible.

AES-256-GCM with AAD binding

Authenticated encryption with cryptographic metadata binding — every tampered byte is detected.

Stateless .qenc format

Self-contained binary layout — magic, salt, nonce, AAD metadata, GCM tag, encrypted stream. No external state.

Granular operational controls

Keyfile 2FA, secure shredder, steganography carriers, and camouflage masking — tune for your threat model.