PicSew ($2 iOS app) stitch photos together automatically (scrollshot). Text annotation. By far the best of the bunch. Here’s a small sample of two screen shots stitched together and then taking out the extra space and showing the final result.
GREP (Global REplace and Print) command used in iThoughts app on iOS
m..n - Tamzin, Germaine, Tomlin, McEntire
m.n - Amanda, feminist, Minogue, Monaco
man$ - matches what ends in man Portman, Kidman, Chapman but NOT Amanda
sausage$ will match all text where the line ends with sausage ($ means 'end of line')
^ma - matches what starts in ma Mayor, May, Mary, Matt but NOT Pitman, Huma
^sausage will match all text where the line starts with sausage (^ means 'start of line')
sausage[1-3] will match on sausage1, sausage2, sausage3 but NOT sausage4.
[0-9] - only digits [A-Z] - only letters
m..n - Tamzin, Germaine, Tomlin, McEntire
m.n - Amanda, feminist, Minogue, Monaco
man$ - matches what ends in man Portman, Kidman, Chapman but NOT Amanda
sausage$ will match all text where the line ends with sausage ($ means 'end of line')
^ma - matches what starts in ma Mayor, May, Mary, Matt but NOT Pitman, Huma
^sausage will match all text where the line starts with sausage (^ means 'start of line')
sausage[1-3] will match on sausage1, sausage2, sausage3 but NOT sausage4.
[0-9] - only digits [A-Z] - only letters
Veracrypt is a free hard disk and partition encryption program. Even has plausible deniability if so needed. Create a Volume by following the easy tutorial on Vercrypt's website.
Encryption Algorithms - all are Key size 256 bits and Block Size 128 bits
AES J. Daemen, V. Rijmen 2001
Camellia Mitsubishi Electric and NTT of Japan 2000
Kuznyechik National Standard of the Russian Federation GOST R 34.12-2015 2015
Serpent R. Anderson, E. Biham, L. Knudsen 1998
Twofish B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, N. Ferguson 1998
Personal rating Kuzneychik > Camellia > Serpent > AES > Twofish so with that said choose your poison combo
AES-Twofish
AES-Twofish-Serpent
Camellia-Kuznyechik
Camellia-Serpent
Kuznyechik-AES
Kuznyechik-Serpent-Camellia
Kuznyechik-Twofish
Serpent-AES
Serpent-Twofish-AES
Twofish-Serpent
Encryption benchmark. Slower I'd assume is better
Encryption Algorithms - all are Key size 256 bits and Block Size 128 bits
AES J. Daemen, V. Rijmen 2001
Camellia Mitsubishi Electric and NTT of Japan 2000
Kuznyechik National Standard of the Russian Federation GOST R 34.12-2015 2015
Serpent R. Anderson, E. Biham, L. Knudsen 1998
Twofish B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, N. Ferguson 1998
Personal rating Kuzneychik > Camellia > Serpent > AES > Twofish so with that said choose your poison combo
AES-Twofish
AES-Twofish-Serpent
Camellia-Kuznyechik
Camellia-Serpent
Kuznyechik-AES
Kuznyechik-Serpent-Camellia
Kuznyechik-Twofish
Serpent-AES
Serpent-Twofish-AES
Twofish-Serpent
Encryption benchmark. Slower I'd assume is better
Hash Algorithms - recommend either Whirlpool or Streebog
RIPEMD-160 1996 160 bits
SHA-256 by NSA 2002 256 bits
SHA-512 by NSA 2002 512 bits
Whirlpool by Vincent Rijmen (co-designer of the AES encryption algorithm) and Paulo S. L. M. Barreto 2003 512 bits
Streebog competitor of NIST SHA-3 standard 2012 512 bits
Hash speed. Slower indicates better
RIPEMD-160 1996 160 bits
SHA-256 by NSA 2002 256 bits
SHA-512 by NSA 2002 512 bits
Whirlpool by Vincent Rijmen (co-designer of the AES encryption algorithm) and Paulo S. L. M. Barreto 2003 512 bits
Streebog competitor of NIST SHA-3 standard 2012 512 bits
Hash speed. Slower indicates better