On top of what @zspider wrote it is a dangerous attitude to take that you can build a secure encrypted system by just executing a pre-made script written by someone else that was intended for a similar system that you are building. There are just too many different ways two system may differ and you may easily end up overlooking something critical. When it comes to implementing security you must walk the walk and do some thinking and learning on your own.
Last edited by a moderator: