It's based around "battle-hardened industry-standard cryptography", but that cryptography is used in a less than standard way. Remember that it doesn't matter how secure the underlying cryptographic primitives you're using are if the way you're using them is flawed.