Paranoid Qrypto™

Learn How to Use Paranoid Qrypto™ with Our Step-by-Step Video Tutorials

Welcome! Paranoid Qrypto is designed for air-gapped, offline security, allowing you to store sensitive data like passwords, private keys, and seed phrases as encrypted QR codes. These tutorials will guide you through every feature, from initial setup to advanced functions.

First Steps & Video Tutorials
Info: This is a general tutorial based on the Ultimate version. Please see the manual for available functions in your specific version before purchase.


00 If you own the Advanced or Ultimate version, you will need an Authenticator app.

This first step is for users of the Advanced or Ultimate versions. Learn how to download, install, and configure a Time-based One-Time Password (TOTP) authenticator app for a completely offline 2FA setup.

01 2FA Setup tab (Ultimate, Advanced) Essential can skip this.

Follow these video instructions to correctly set up Two-Factor Authentication in the 2FA tab. Getting familiar with this process is crucial for securing your data.

02 EncryptQR Tab / Encrypting, note some functions are Exclusive to Ultimate version

This tutorial shows you the core function: encrypting your sensitive information. Understand how to use the EncryptQR tab to generate secure, encrypted QR codes for maximum offline security.

03 DecryptQR Tab / Decrypting, note some functions are Exclusive to Ultimate.

Learn how to securely access your information by using the DecryptQR tab. This video walks you through the process of turning your encrypted QR code back into readable data.

04 RegenerateQR Tab, all versions identical.

Understand how to use the RegenerateQR tab, a feature available in all versions. This is useful for preparing a saved image or screenshot of a QR code for decryption.

05 QRTool Tab, Ultimate only.

This tutorial is for Ultimate version users. Get an overview of the powerful optional functions available in the QRTool tab for advanced QR code management.

06 Shamir's Secret Sharing Tab, Ultimate only

Discover the principles of Shamir's Secret Sharing, an advanced security feature for Ultimate users. Learn how to split a single secret into multiple parts (shards) for ultimate protection and redundancy.