Frequently Asked Questions
| Encryption can be complicated. We will answer the most common concerns concerning our encryption service here in our FAQ.
How it Works?
Our Encryption-Engine uses the “Advanced Encryption Standard” (AES) as a foundation with an expansion on the decryption space (patent-protected). The decryption space contains every single readable character, words of any language and all potential combinations of them. In other words, when a brute force attack is attempted on pp-Encryption, the decryption results will contain every readable sentence up to the length of the original message. This feature is what makes pp-Encryption truly unhackable.
For example, if you encrypt a four letter word ‘East’, the brute force attack will discover all four letter combinations such as ‘Home’, ‘Time’, ‘West’, ‘Note’ as well as your original word ‘East’. There is no chance for the hacker to identify your original text.
Who is Permanent Privacy (PP) designed for?
|Anyone and everyone who wants to keep their private data private – forever.|
How strong is PP encryption?
|Permanent Privacy will encrypt data to an unbreakable level. Data is 100% secured (even from the world’s most advanced computers and cryptographers) if you use and secure your three keys. You have two unique passwords (which you choose) and a truly random “Control File” that is larger in size than the file or text that you are encrypting/decrypting.
NB: Do not keep these keys in your computer. Use an external memory device so you are not vulnerable to hackers or prying eyes.
Are we able to decrypt a file without knowing the Keys?
|No. Unbreakable means unbreakable. Privacy means privacy.|
Is the software hard to use?
|PP is user friendly The User Guide comes as part of the download package and will take you through 2 different types of encryption/decryption (Text mode and File mode) in a few easy steps. Both achieve unconditionally secure encryption.|
Does my friend need the software to open an encrypted file?
|Yes, to decrypt the file they will need our software.|
I am corresponding with a colleague/friend – do we both need the same keys?
|Yes. Both parties must use identical passwords and control files.
Do not communicate your keys through email or instant messaging platforms as these forms of communication are not secure. If you have PP software already – you can communicate your passwords using PP Outlook.
What is the purpose of the Random File Generator (RFG)?
|The RFG generates any specified file size and then applies four different tests of randomness. You will use this as your Control File (or 3rd key). Provided that it is bigger than the file that you are encrypting, you can use any file (such as a photo, MP3, Mpeg etc) for almost perfect security. Our co-founder stated simply, “take a picture of the sky”.|
Can I encrypt an entire hard disc or folder?
|Yes, provided you zip it first. PP can only encrypt FILES as an attachment, and after the zipping process a hard disc or folder becomes a .zip FILE.|
How long will the download and installation process take?
|Download speeds will depend on your internet connection. Once downloaded, a setup wizard will guide you through a quick and easy installation process.|
How fast is the encryption/decryption process?
|In Text mode, we will encrypt a 1000 character message in under a second (depending on your computer speed).
In File mode it will encrypt a 15Mb file in under 4 seconds and will encrypt/decrypt a 1 Gig file in under 10 minutes (again depending on CPU speed).
What operating systems are compatible with PP?
|It works perfectly on all Microsoft Windows systems. For Intel based Mac users, if you have your Mac setup to run PC/Windows on a partition (Boot Camp) or via Parallels it will also work. Our software will be compatible with other operating systems such as IOS and Android shortly.|
Will my details be passed on to any third parties?
|Absolutely not. We believe passionately in your right to privacy.|
Please email firstname.lastname@example.org if you have any further questions.