About FileFortress
Your personal digital vault, built on privacy and trust.
Our Mission
In an era where data privacy is increasingly under threat, FileFortress was created with a simple yet powerful mission: to provide an easy-to-use, highly secure, and completely private way for anyone to encrypt their files. We believe that you should have exclusive control over your data. Our tool empowers you to be the sole keeper of your digital secrets, without having to trust a third party with your sensitive information.
Our Security Philosophy
Client-Side First
Every cryptographic operation—encryption, decryption, and key derivation—happens directly in your web browser. Your files and keys are never transmitted to, or stored on, our servers.
Zero-Knowledge
We know nothing about your data. Since we never see your files or your keys, we cannot access, share, or lose them. The privacy of your data is mathematically guaranteed.
Industry-Standard Crypto
We use the Web Crypto API, a standardized and audited browser technology, to perform all operations. We employ AES-GCM for encryption and PBKDF2 for key stretching, trusted standards in cybersecurity.
How Encryption Works
- Key Derivation: When you enter a password and security key, we don't use them directly. Instead, we combine them and feed them into a Key Derivation Function (PBKDF2). This function performs thousands of hashing rounds to produce a strong, uniform 256-bit encryption key. This process makes password guessing extremely difficult and time-consuming for an attacker.
- Encryption (AES-GCM): Your file's data is then encrypted using this derived key with the Advanced Encryption Standard (AES) in Galois/Counter Mode (GCM). AES is the standard for data encryption used by governments and organizations worldwide. The GCM mode provides both confidentiality and authenticity, meaning it not only encrypts the data but also ensures it hasn't been tampered with.
- Packaging: The final downloadable file is a bundle containing the salt (a random value used in key derivation), the IV (an initialization vector for encryption), and the encrypted ciphertext. When you decrypt, the app unpacks these components to reverse the process.