xyz

Information

Contents

1. Acceptance of Terms

Please read the Terms of Use. If you do not agree to these terms, you must not use the service.

2. What the service does

This service provides a toolset that allows the user to:
Encrypt Plaintext to Ciphertext
Decrypt Ciphertext to Plaintext
Encrypt files/folders
Decrypt Encrypted .enc files created using this service

3. Target Audience

This service is designed for a broad range of users and supports a variety of use cases, including but not limited to:

Security
Encrypt your data to protect it from unauthorized access
Store or share information with confidence, knowing it remains secure

Privacy
Send encrypted messages containing sensitive or confidential information
Safeguard personal content such as digital journals or diaries

4. How it works

There are three requirements to make the magic happen:
Secret Key: A serverside key
Passphrase Key: A key chosen by the user
Data: to Encrypt/Decrypt
(Secret Key + AES 256GCM -- 2 Million Itterations) + Passphrase Key + data = output

What is a Secret Key and why is it important?:
The secret key means absulutely no one can crack your encrypted data without having access to the same version of the service/app used to Encrypt the data
Even if you used "a" as the Passphrase and the bad actor knew this information they could not decode the data without access to exactly which version it was encrypted with (more on this in the next section)

5. Versioning on demo and paid subscription

The Demo Version of this webapp will rotate secret keys daily.
DEMO WARNING:
DECRYPTION OF DATA WHICH WAS ENCRYPTED ON PREVIUOS DAYS WILL NOT BE POSSIBLE!
Subscription will be required for long term use.
More inforation on key rotation time will be provided at a later date.

Paid Subscriptions will receive a unique and static Secret Key with a random unique sub domain (ie a7g30giq76.cipher.soogs.xyz)
Paid Subscriptions will have options for two layers of authentication:
Level one: username and password (these will be randomised)
Example credentials:
Username: SLZw*M@S2s#ZUK88ZHgW$jqjX^%87Dd^$Lp7567yfY5!m3df4jdoNV%D%qYk&z72
Password: r%V7DZ$H@GRNi8Uqm6&4NJsKNjE&*%$U#w24W%r7d!@9A^6t8Mse!!97%Qy!pod&
Level two: SSO signin
Paid Subscriptions will also have access to Geo and IP limiting (Allow lists, Block lists)

For more information, please use the Contact Form

6. Logging and Retention Policy

Logs:IP address is logged and retained for 1 week for audit and server abuse checks.
No data is logged or kept outside of IP address.
Data: Text Cipher: no logging
Files: Files are uploaded to a tempory job space, processed and immediately removed once the file has been served (or the job is cancelled/failed).
Failsafe: A sheduled job runs at regular intervals to clean up any potential unremoved temporary files which may have been left behind on failed jobs.
Subscription Secret Keys: Secret Keys will be retained after a Subscription ends or is terminated (unless the subscriber requests removal). This is to allow for returning subscribers to safegaurd their existing dataset.
Secret Keys will be retained for as long as GDPR allows.