PK Yuen is a well known expert on communications, Internet and the World Wide Web. With over 25 years experience working on web technologies, including large-application developments, engineer training and the security systems of international airports.
PK Yuen, Creator and Founder of Permanent Privacy Encryption
Permanent Privacy Encryption: Benefits Beyond The Ciphertext
Deleting confidential information doesn't mean it's gone.
Our Instant, simple technology ensures privacy forever with just one click.
Be More Productive
Everything happens fast - you don't have time to waste.
Save time and money with single click security.
Someone you don't trust reads your emails. Your quest for privacy ends here.
Communicate in private.
Delete Files Forever
No matter how much you try - sensitive information can be recovered.
Get permanent file deletion.
How Secure is your Sensitive Information?
The transfer of information over the world wide web depends critically on secure communications. The need to protect the material we send and receive in cyberspace is crucial to ensuring we can continue to use this incredible resource safely. Cryptography provides the most reliable tools for storing and transmitting digital information and is the gold standard for attaining the levels of security our online interactions demand
Our service can be considered as an enhanced AES encryption method to the point where its security strength reaches an "unhackable" level by achieving "Perfect Security" as defined and created by Claude Shannon.
The decryption space contains every single readable character, words of any language and all potential combinations.
When a ‘try-them-all’ (brute-force) method is used to attack pp-Encryption, the decryption results will contain every readable sentence up to the length of the original message.
This feature is what makes our encryption trulyunhackable since it is mathematically impossible to find the original message.
Our patent protected encryption-engine uses AES 256-Bit with an expansion on the decryption space.
The decryption space contains every single readable character, words of any language and all potential combinations of them.
If a brute force attack is attempted - the decryption results will contain every readable sentence up to the length of the original message.
This feature will secure data - and make data attacks useless - it is mathematically proven.
For example, if you encrypt a four letter word ‘East’, the brute force attack will discover all four letter combinations including (but not limited to) ‘Home’, ‘Time’, ‘West’, ‘Note’ as well as your original word ‘East’. There is no chance for the hacker to identify your original text.
The Unhackable Feature
You create two unique passwords and a random “Control File” that is larger in size than the file or text that you are encrypting/decrypting. For additional security - store all three keys offline.
Permanent File Deletion
When you delete information on your computer - it can be recovered. Permanent deletion occurs when you change your control file after encrypting your data. Once you change the control file - the data is gone forever.
How strong is PP encryption?
Permanent Privacy secures data to an unbreakable level. Proven against the world’s most advanced computers and the #1 security service as recommended by Harvard University cryptographers*.
Are we able to decrypt a file without knowing the Keys?
No. Unbreakable means unbreakable. Privacy means privacy.
A system, device and method for encrypting plaintext information securely. The system includes a transmitting agent to generate and synchronize a first cipher stream using the plaintext information and a first key, to generate and synchronize a second cipher stream using a second key and a randomizing function to randomize and synchronize a controllable plaintext stream to form a second synchronized cipher stream, and to operate on the plurality of first and second cipher streams using an exclusive disjunction operator to obtain a ciphertext stream; and a receiving agent to decrypt the ciphertext stream.
An encryption box device has a memory and a processor coupled to the memory. A first clipboard runs on the processor and downloads a plaintext stream. An encryption engine runs on the processor and receives the plaintext stream and encrypts the plaintext stream to produce an encrypted stream. A digitizer runs on the processor and digitizes the encrypted stream to produce a digitized encrypted stream. A second clipboard runs on the processor and uploads the digitized encrypted stream. The encryption engine may also decrypt the encrypted stream to produce the plaintext stream and upload the plaintext stream to the first clipboard.