OFFICIAL RELEASE: Source Code Published on GitHub
AES-256-GCM · File Encryption · Version 2.2

Privacy Isn't Paranoia.
It's Survival.

Military-grade encryption built by a forensic expert with 25+ years experience. For whistleblowers, journalists, activists, and anyone whose freedom depends on privacy. Client-side only. Zero knowledge. Zero compromise.

Why encryptor.app Exists

After 25 years as a forensic expert, I've seen things you don't forget. I've stood in basements where hard drives were seized. I've read protocols that destroyed lives. I've worked with investigators across four continents, and I've come to understand this: The line between security and surveillance is as thin as a password on an unencrypted PDF.

I've seen cases where encryption saved lives. Where a single encrypted message protected a whistleblower who exposed billion-dollar fraud. Where an encrypted file made the difference between press freedom and prison. Where an investigative journalist in Tehran could protect their sources because no one could read the message. Not the intelligence service. Not the state. No one.

But I've also seen the other side, the dark one. I've read files where a single unencrypted text message destroyed a life. An unprotected email became evidence in a show trial. A document without encryption cost someone not just their career, but their family. Their freedom. Sometimes their life. This isn't paranoia. This is reality.

And now it's getting worse.

On November 26, 2025, something happened that should terrify you. EU ambassadors in the Committee of Permanent Representatives approved a new Chat Control mandate. The headlines said the EU "backed away" from mass surveillance. They lied to you.

Let me tell you what really happened.

They removed the word "mandatory" and replaced it with "voluntary." Sounds better, doesn't it? Except it's the most cynical political sleight of hand I've seen in decades. Here's how the scam works: Service providers are now required to assess how their platforms could be "misused." If you're classified as high-risk, and yes, offering end-to-end encryption automatically makes you high-risk, you're pressured to "develop technologies to mitigate the risks."

Translation: Build scanning tools. Implement surveillance. Or face regulatory hell.

"Voluntary" means scan or die. It's extortion dressed up as child protection. And it gets darker. The framework includes mandatory age verification for every user. Think about what that means. You want to use WhatsApp? Show your ID. Signal? Facial recognition. Your grandmother sending photos of her grandkids? She'll need to prove who she is first. Your teenage daughter chatting with friends? Biometric data handed over to platforms you'll never fully trust.

Anonymity? Gone. Privacy? An illusion. Freedom? Something we used to have.

The trilogue negotiations between the Council, Parliament, and Commission start soon. They're aiming to finalize this by April 2026. That's the deadline. That's when the current temporary framework for voluntary scanning expires. That's when they want this permanent surveillance infrastructure locked into law.

Patrick Breyer, one of the few politicians who still gives a damn about your rights, said it best: "Chat Control is not dead. It's just being privatized."

Let that sink in.

This isn't happening in China. This is happening here. In Europe. Right now. I know what some of you are thinking. "But George, I have nothing to hide." That's exactly what they want you to think. Let me tell you something I learned in 25 years of forensic work: Everyone has something to hide. Not because you're a criminal, but because you're human. Your therapy sessions with your psychologist. The photos you send your partner. The arguments you have with your family. The doubts you share with your best friend. The medical diagnosis you're not ready to tell anyone about yet. The political opinions you're afraid to voice publicly.

You think an algorithm scanning every message, every photo, every file you send is protecting children? Let me give you the numbers. Germany's Federal Criminal Police Office reported in 2024 that every second chat flagged through voluntary chat control was legally irrelevant. That's a 50% false positive rate. Half of all "suspicious" content was completely innocent.

Now scale that to billions of messages. Imagine how many lives will be disrupted. How many innocent people will be investigated. How many intimate moments will be viewed by "moderators somewhere in the world." People you'll never know. People who will see your most vulnerable moments and judge them with AI-powered tools that don't understand context, nuance, or humanity.

Your baby in the bathtub? Flagged. Your vacation photos with your kids at the beach? Flagged. A joke in a private chat that an algorithm doesn't understand? Flagged. And then what? Then real humans look at it. Strangers. Contractors. People in countries you've never been to, working for companies you've never heard of, making decisions about your life based on fragments of conversations ripped from context.

This isn't security. This is madness.

I've spent my life solving crimes. I understand the value of investigations. But I also understand the difference between targeted investigation and blanket surveillance.

Encryption doesn't protect criminals. Criminals have always found ways around everything. They use burner phones, dead drops, coded language, offshore servers. They adapt. They always have. You know who encryption really protects?

The whistleblower exposing pharmaceutical fraud who fears multimillion-dollar lawsuits. The journalist in Moscow reporting on war crimes whose sources could disappear. The human rights activist in Iran coordinating protests who knows a single intercepted message could cost her life. The lawyer conducting confidential client conversations whose confidentiality is the foundation of the rule of law. The doctor who must safeguard sensitive patient data.

And you. Yes, you. With your diary. Your passwords. Your photos. Your secrets. Your life.

Privacy is not a privilege for the paranoid. Privacy is infrastructure for freedom. And freedom is always just one generation away from extinction.

That's why I built Encryptor.

Open source. Transparent. Free. For you. For everyone.

I'm releasing it under the MIT License because this isn't just software. This is a movement. Every lawyer can now communicate securely with clients without fear that confidentiality becomes a meaningless word. Every medical practice can protect patient data as the law requires and ethics demands. Every business can preserve trade secrets. Every journalist can protect their sources. Every person can finally breathe again.

But it goes further. You can embed Encryptor into your own website. You can install it on your server. You can run it locally on your PC. You decide where your data lives. You decide who has access. You decide what's secure and what's not.

And if you need help with integration, if you don't know how to build it into your infrastructure, ask me. I'll help you. For free. Because this isn't business. This is a promise.

My dream is simple and radical: Encryptor everywhere. On your servers. On your computers. In your practices. In your law offices. In your newsrooms. In your homes. Imagine thousands of installations. In Berlin and Rio. In Hong Kong and Tehran. In small villages and megacities. A global network of people who refuse to be surveilled. Who say: No. My thoughts belong to me. My words belong to me. My life belongs to me.

I've released Encryptor as open source on GitHub because transparency isn't optional.

Transparency is the foundation of trust in a world that has robbed us of trust. Everyone can see what the code does. Everyone can improve it. Everyone can adapt it. You don't have to trust me. You only have to trust the code.

Encrypt your password PDFs. Encrypt your diaries. Encrypt your patient records. Encrypt your client correspondence. Encrypt your research data. Encrypt your life.

Because we live in a time when everything is scanned. When every photo, every message, every file is considered suspicious until proven otherwise. When our freedom and privacy are no longer taken for granted but must be fought for.

That's why I'm giving you Encryptor. Not because I want to sell something. Not because I want to be famous. Because I've spent 25 years watching what happens when people don't have tools to protect themselves. Because I'm tired of reading files where a life could have been saved if just one single file had been encrypted. Because I won't stand by anymore watching freedom die while we all look away.

Encryptor is my answer. To Chat Control. To surveillance. To fear. To resignation.

Get it. Use it. Share it. Install it on every device you have. Embed it in your website. Install it on your server. Make it part of your digital DNA.

And if one day the door opens and they ask for your data, smile and say: Encrypted. Unbreakable. Mine.

This is not the end. This is the beginning.

The beginning of a world where privacy is a right again, not a privilege. The beginning of a world where you don't have to explain why you have something to hide, but where they have to explain why they want to see it. The beginning of a world where encryption is as natural as an envelope. As normal as a closed door. As fundamental as the right to breathe.

The fight against Chat Control isn't over. The trilogue negotiations are happening now. They want this finalized by April 2026. That means we have months, not years, to stop this. Contact your representatives. Support organizations fighting for digital rights. Use privacy tools. Make noise. Be ungovernable.

Freedom dies in secrecy. Encryption brings it to light.

NEW: Encrypt Files Up To 2GB

Version 2.2 introduces client-side file encryption. Your confidential documents, contracts, medical records, or source materials are encrypted entirely on your device. They never touch our servers.

Any File Type

PDFs, images, videos, documents, archives. Drag and drop or click to browse. Maximum file size: 2GB.

Chunked Processing

Files are encrypted in 64MB chunks to prevent memory overload. Progress bar shows real-time status.

Same Security

AES-256-GCM encryption with PBKDF2 key derivation. Same military-grade security as message encryption.

How File Encryption Works

1
Select your file

Any file type, up to 2GB. Drag and drop or click to browse.

2
Browser encrypts in chunks

Your file is read in 64MB chunks. Each chunk is encrypted with AES-256-GCM and a unique IV.

3
Download encrypted file

Original filename and file type preserved in encrypted metadata. Share via email, cloud, or USB.

4
Decrypt when needed

Upload the .encrypted file, enter your password, and get your original file back. Same zero-knowledge process.

Performance: A 1GB file typically encrypts in 15-30 seconds on modern desktop (M2/M3 MacBook, high-end PCs). Mobile devices recommended for files under 500MB due to memory constraints. The entire process happens in your browser using the Web Crypto API - no server upload, no cloud processing, no third-party access.

Try File Encryption

Version 2.2: Why We Rebuilt Everything

encryptor.app launched in 2023 with server-side PHP encryption. It was good. AES-256-CBC with HMAC authentication. Better than 99% of tools available.

But good isn't good enough when lives are at stake.

Version 1.x had a fundamental limitation: your plaintext passed through the server before encryption. We never logged it. We never stored it. But it existed on our infrastructure for milliseconds.

That millisecond is a vulnerability. If a state actor compromised our server, or compelled us to log traffic, or conducted memory forensics, your plaintext could theoretically be captured.

Version 2.2 eliminates that possibility completely.

Technical Changes

Version 1.x (PHP Server-Side)
  • Plaintext sent to server
  • Server performs encryption
  • AES-256-CBC + HMAC
  • Password used directly as key
  • Server sees your data
Version 2.2 (Pure Client-Side)
  • Plaintext never leaves browser
  • JavaScript Web Crypto API
  • AES-256-GCM (authenticated)
  • PBKDF2 key derivation (100k iterations)
  • Server sees nothing

What this means in practice:

  • Even if we wanted to read your messages, we cannot. The cryptographic operations happen in your browser using native Web Crypto APIs. We have zero access.
  • If a government agency compels us to log data, there is nothing to log. Your plaintext and password exist only in your browser's memory.
  • If our server is compromised, seized, or destroyed, your encrypted messages remain secure. The encryption happened before any network transmission.
  • If quantum computers break internet encryption (TLS), your message content is still protected. AES-256 is quantum-resistant.

This is zero-knowledge architecture. Not marketing. Not theory. Mathematical certainty.

How It Works: Technical Deep Dive

Encryption Process

1

Password to Key Transformation

Your password is not used directly. It passes through PBKDF2 (Password-Based Key Derivation Function 2) with SHA-256 and 100,000 iterations. A random 16-byte salt ensures identical passwords produce different keys. This process takes ~100 milliseconds deliberately, making brute-force attacks computationally expensive.

2

Encryption (AES-256-GCM)

Your message is encrypted using AES (Advanced Encryption Standard) with a 256-bit key in Galois/Counter Mode (GCM). GCM provides both confidentiality and authentication. A random 12-byte initialization vector (IV) ensures that encrypting the same message twice produces different ciphertext. The authentication tag prevents any tampering.

3

Output Format

The final output combines: [Salt (16 bytes)] + [IV (12 bytes)] + [Encrypted Data] + [Auth Tag (16 bytes)]. This is Base64-encoded for easy copying and pasting. Anyone with your password can decrypt it. Anyone without your password faces 2^256 possible combinations.

Why AES-256?

AES-256 is the same encryption standard used by the NSA for TOP SECRET information. It's been extensively analyzed by cryptographers worldwide for over two decades. No practical attacks exist.

The math is simple and terrifying (if you're trying to break it):

Possible AES-256 keys:

2^256 = 115,792,089,237,316,195,423,570,985,008,687,907,853,269,984,665,640,564,039,457,584,007,913,129,639,936

Fastest supercomputer (2025): ~10^18 keys/second

Time to try all combinations:

3.7 × 10^55 years

Age of the universe: 13.8 billion years (1.38 × 10^10)

You need: 10^46 times the age of the universe

To put this in perspective: there are approximately 10^80 atoms in the observable universe. The number of possible AES-256 keys is larger than the number of atoms in a trillion trillion universes.

Your encrypted message will outlive the sun.

What About Quantum Computers?

Legitimate concern. Quantum computers break certain types of encryption. Specifically, Shor's algorithm can break RSA and ECC (the encryption used for HTTPS and digital signatures) in polynomial time.

AES is different.

Grover's algorithm, the best known quantum attack against AES, provides only a quadratic speedup. This means AES-256 becomes equivalent to AES-128 against a quantum attacker.

AES-128 still has 2^128 possible keys:

2^128 = 340,282,366,920,938,463,463,374,607,431,768,211,456

Even with a hypothetical quantum computer trying 10^12 keys/second:

Time to crack: ~10 billion years

Current quantum computers have ~1,000 qubits. To break AES-128 with Grover's algorithm, you need millions of error-corrected qubits. Current error rates make this impossible.

Most experts estimate we're 30-50 years away from cryptographically relevant quantum computers. Even then, AES-256 remains secure. The NSA, NIST, and every major cryptographic authority consider AES-256 quantum-resistant.

Translation: Your encrypted messages are safe from any known or theoretical attack, including quantum computers that don't exist yet.

Military-Grade Security

AES-256-GCM with PBKDF2 key derivation. The same standards trusted by governments and intelligence agencies worldwide.

Zero Knowledge

All encryption happens in your browser. We never see your data or passwords. Mathematical certainty, not marketing claims.

Works Offline

Once loaded, no internet required. Encrypt and decrypt anywhere, anytime. Perfect for high-risk environments.

No Account Required

No registration, no emails, no tracking. Just open and encrypt. Privacy by design, not afterthought.

Mobile Ready

Works perfectly on any device. Secure communication on the go, whether you're at home or in the field.

Open Standards

Web Crypto API implementation. No proprietary algorithms. Transparent, auditable, trustworthy.

File Encryption

Encrypt files up to 2GB. PDFs, images, videos, documents. Chunked processing for any file size.

Real-Time Progress

Live progress bars show encryption status. Time estimates for large files. Never wonder what's happening.

Open Source

MIT License. Fork it, audit it, improve it. Transparency builds trust. Available on GitHub.

Built by Security Experts for People Who Need It

This tool was created by professionals with decades of experience in digital forensics, intelligence analysis, and cryptography. We've worked on cases involving whistleblower protection, journalist security, and evidence preservation in high-stakes environments.

We've seen firsthand how encryption protects those who expose corruption, how lack of security can lead to imprisonment of truth-tellers, and how a single intercepted message can change lives forever.

This is why we built this tool: because privacy is not a luxury. It's a fundamental human right. And because the tools that protect this right must be open, transparent, and available to everyone who needs them.

This isn't just software. It's resistance.

Secure Contact

Questions? Feedback? Security concerns? Reach out.

Secure Form: Rate-limited (3 messages per 10 minutes). Messages are sent via encrypted SMTP to your@email.com (Proton Mail). Your IP address is stored for 7 days for spam protection (see Privacy Policy).

Important Notice

While we use military-grade encryption (AES-256-GCM), no system is 100% secure. Use at your own risk.

We cannot recover lost passwords. If you forget your password, your encrypted data is permanently inaccessible. There are no backdoors. This is by design.

Users must comply with all applicable laws. Encryption regulations vary by jurisdiction. It is your responsibility to ensure compliance. This tool is intended for legitimate privacy protection, not illegal activities.

Threat model limitations: This tool protects message content. It does not protect metadata (who you communicate with), endpoint security (if your device is compromised), or operational security (if you use weak passwords or insecure channels to share them).

For comprehensive security, combine encryptor.app with: secure operating systems, Tor or VPN for anonymity, strong password management, and proper operational security practices.

See our Privacy Policy for complete terms.