Experiments with encrypting and decrypting files iteratively with a similar process adopted by ransomware malware. The process is entirely reversible as it uses a simple XOR but it can be improved to support RSA encryption using one of the several libraries available on here.