1. Provably secure cryptography.
This is a necessary property.
A protocol without a proof of security is likely to be insecure and must not be trusted.
2. Software of excellent quality.
Thoroughly tested code developed by experts.
Minimal number of dependencies to potentially insecure software.
Polished using multiple static analysis and test coverage tools.
Zero reported vulnerabilities since 2010.
3. Easy to deploy and use. Portable on Linux/BSD, easy to install, and robust command line interface.
4. Comprehensive documentation.
Mature research papers, whitepapers, overview descriptions, APIs, usage info, and documented code.
5. Free and open source MIT License. The MIT License is the most liberal among the widely adopted free and open source licenses .