Last Updated: January 2025
By downloading, installing, or using the Encrypt App ("the App"), you agree to be bound by these Terms of Use. If you do not agree to these terms, please do not use the App.
The Encrypt App is a file encryption application that provides military-grade security for your files. The App provides:
Important Security Considerations:
User Responsibilities:
The App provides tools for managing encryption keys and encrypted files:
The App does not validate the authenticity of public keys you import - you must verify their legitimacy independently.
All content, features, and functionality of the App, including but not limited to encryption algorithms implementation, user interface, and software, are owned by the App developer and are protected by copyright and other intellectual property laws.
Your Files and Keys: You retain full ownership of all files you encrypt and all encryption keys you generate. We do not claim any rights to your content or cryptographic keys.
Encryption Limitations: While the App uses industry-standard encryption, no encryption is 100% secure against all possible attacks or vulnerabilities.
Key Loss: We cannot recover lost private keys or decrypt files if you lose access to your keys.
File Integrity: While the App includes integrity checks, you should verify important files after encryption/decryption.
Technical Limitations: The App may experience bugs or compatibility issues, and we cannot guarantee perfect operation.
The App developer shall not be liable for any direct, indirect, incidental, special, or consequential damages resulting from the use or inability to use the App, including but not limited to loss of files, compromise of encrypted data, or security breaches, even if advised of the possibility of such damages.
The App uses encryption technology that may be subject to export control laws. By using the App, you agree to comply with all applicable laws and regulations regarding the use and export of encryption software.
You are responsible for ensuring your use of the App complies with local laws and regulations in your jurisdiction.
We reserve the right to modify these Terms of Use at any time. Updated terms will be posted within the App and on our website, and continued use constitutes acceptance of the revised terms.
For questions about these Terms of Use, please contact us through the App Store review system or the support information provided in the App.
Personal Information: We do not collect, store, or transmit any personal information, account details, user profiles, or identifying information.
File Data:
Encryption Keys:
App Usage Data:
Device Information: We do not collect device identifiers, location data, or any technical information about your device.
Local Processing Only: All file encryption, decryption, and key management operations occur entirely on your device using standard cryptographic libraries.
Temporary Processing: Files are temporarily accessed during encryption/decryption processes and immediately released from memory after completion.
Key Storage: Private keys are stored securely in the device's keychain and never transmitted or backed up to external services.
Contact Management: Public keys from contacts are stored locally to enable secure file sharing.
No Data Sharing: We do not share, sell, rent, or disclose any file data, encryption keys, or personal information to third parties because we do not collect or store such data.
User-Controlled Sharing: The only way data leaves your device is when you explicitly share encrypted files or public keys through your device's sharing features.
No External Services: The App does not integrate with any external encryption services, cloud storage, or analytics platforms.
System Sharing: When you share files or keys, the sharing is handled by iOS/macOS system features and subject to Apple's privacy policies.
Local Security: All sensitive data is protected by your device's built-in security features, including device encryption, biometric authentication, and system-level app sandboxing.
Keychain Protection: Private keys are stored in the iOS/macOS keychain, which provides hardware-backed security on supported devices.
Cryptographic Security: The App uses industry-standard encryption algorithms (RSA 2048-bit, AES-256) implemented through Apple's Security framework.
No Network Transmission: Since no data is transmitted over networks, there are no network-related security risks.
Memory Security: Sensitive data is cleared from memory immediately after processing to minimize exposure.
The App does not knowingly collect any information from children under 13. Since all data processing occurs locally on the device with no external data collection, there are no additional privacy concerns for younger users. Parents should supervise children's use of encryption software and key management.
Apple Security Framework: The App uses Apple's Security framework for cryptographic operations, which operates according to Apple's privacy policies.
iOS/macOS System Services: The App uses standard system frameworks for file access, keychain storage, and sharing functionality.
No External Dependencies: The App does not use any third-party analytics, advertising, cloud services, or external cryptographic services.
Since no data is collected, transmitted, or stored on external servers, there are no international data transfer concerns. All file processing and key management occurs locally on your device, regardless of your geographic location. Users should ensure compliance with local encryption laws and regulations.
We will notify users of any material changes to this Privacy Policy through App Store updates and within the App. Continued use of the App after such changes constitutes acceptance of the updated policy.
For privacy-related questions or concerns, please contact us through:
Zero-Knowledge Privacy: Encrypt is built with a zero-knowledge architecture. Your files and encryption keys never leave your device or enter our systems.
Military-Grade Security: Uses RSA 2048-bit and AES-256 encryption with secure key storage in your device's keychain.
Local Processing: All encryption, decryption, and key management happens entirely on your device.
Your Responsibility: You are responsible for protecting your private keys and ensuring secure key sharing practices.
Complete Control: You have full control over your encrypted files and can share them securely with anyone you trust.
This document serves as both Terms of Use and Privacy Policy for the Encrypt App. By using the App, you acknowledge that you have read, understood, and agree to these terms.