Military-Grade Client-Side File Encryption
An encrypted copy of the file will be generated. No data is sent to our server.
Only files encrypted by this tool are accepted.
This phrase will be used as an encryption key. Write it down or remember it; you won't be able to restore the file without it.
Enter the pass phrase that was used to encrypt this file. It is not possible to decrypt it without it.
Uses AES-256-GCM encryption, the same standard used by governments and military organizations worldwide. Your files are protected with 256-bit keys, providing virtually unbreakable security.
All encryption happens in your browser. Your files never leave your device, and no data is transmitted to any server. We can't access your files because we never receive them.
Leverages modern Web Crypto API with hardware acceleration. Process files of any size quickly and efficiently, with real-time progress tracking.
Completely free to use with no hidden costs, registration, or subscriptions. Works offline once loaded. Your data, your control.
Select whether you want to encrypt a file to protect it, or decrypt a previously encrypted file to restore it.
Click the browse button and choose any file from your computer. All file types are supported - documents, images, videos, archives, and more.
For encryption: create a strong passphrase (minimum 8 characters). Mix uppercase, lowercase, numbers, and symbols for maximum security. Store this passphrase safely - you cannot recover your file without it.
For decryption: enter the exact passphrase used during encryption.
Your encrypted/decrypted file is ready! Download it to your device. Encrypted files will have a .encrypted extension added.
Protect confidential contracts, financial reports, business plans, and sensitive company data before sharing or storing in the cloud.
Secure patient information, medical histories, and health records to comply with privacy regulations like HIPAA and GDPR.
Keep your private photos, personal documents, tax records, and sensitive family information away from prying eyes.
Encrypt files before uploading to cloud services like Dropbox, Google Drive, or OneDrive for an extra layer of security.
Secure sensitive attachments before sending via email. Share the passphrase through a separate secure channel.
Protect attorney-client communications, legal contracts, intellectual property, and confidential case files.
AES-256-GCM (Advanced Encryption Standard with 256-bit key in Galois/Counter Mode)
PBKDF2 (Password-Based Key Derivation Function 2) with SHA-256
Cryptographically Secure Random Number Generator (CSRNG)
Web Crypto API (Native Browser Implementation)
A: Absolutely safe. All encryption happens entirely in your browser using JavaScript. Your files never leave your device, and we never receive or store any data. This can be verified by checking your browser's network activity - no uploads occur.
A: Yes! After loading the page once, you can save it locally and use it completely offline. Just save the HTML, CSS, and JavaScript files to your computer.
A: There's no hard limit imposed by our tool. The only limitation is your device's available memory. Modern devices can typically handle files up to several gigabytes.
A: Unfortunately, no. This is actually a feature, not a bug. Because we use client-side encryption and never receive your passphrase, there is no recovery mechanism. This ensures complete privacy - even we cannot access your files.
A: With a strong passphrase, AES-256 encryption is effectively unbreakable with current technology. A brute-force attack would take billions of years. However, weak passphrases can be guessed, so always use strong, unique passphrases.
A: All modern browsers support the Web Crypto API: Chrome, Firefox, Safari, Edge, Opera, and Brave. Internet Explorer is not supported.
A: Currently, files must be encrypted individually. For multiple files, consider creating a ZIP archive first, then encrypting the archive.
A: Files encrypted with this tool use a custom format (salt + IV + encrypted data) and can only be decrypted by this tool. This ensures compatibility and prevents corruption from incompatible decryption attempts.