Terms and Conditions
1. Acceptance of Terms
By accessing or using the AES-256-GCM Web Utility (the “Service”), you agree to be bound by these Terms and Conditions. If you do not agree, you must not use the Service. The Service is provided free of charge and operates entirely in your browser.
2. Description of Service
The Service is a client-side web application that allows users to:
- Encrypt and decrypt text using AES-256-GCM via the Web Crypto API
- Generate deterministic keys and nonces from user-provided phrases using PBKDF2
All operations occur locally in your browser. No data is transmitted to any server.
3. User Responsibilities
You are solely responsible for:
- Choosing strong, unique keys and never reusing nonces
- Correctly using the tool according to cryptographic best practices
- Protecting any sensitive data you encrypt or decrypt
- Verifying that decryption succeeds only when the authentication tag is valid
Misuse (e.g., nonce reuse, weak keys, or ignoring warnings) can result in loss of confidentiality or integrity. We are not responsible for cryptographic errors caused by user actions.
4. No Warranties
The Service is provided “as is” and “as available” without warranties of any kind, express or implied, including but not limited to warranties of merchantability, fitness for a particular purpose, or non-infringement. We do not guarantee that the Service will be error-free, uninterrupted, or secure against all threats.
5. Limitation of Liability
To the fullest extent permitted by law, we shall not be liable for any indirect, incidental, special, consequential, or punitive damages arising from your use of the Service, even if advised of the possibility of such damages. This includes loss of data, profits, or security breaches resulting from incorrect usage.
6. Prohibited Uses
You may not use the Service:
- For any unlawful purpose
- To harm or attempt to harm others
- To violate any applicable laws or regulations
7. Changes to the Service or Terms
We may modify, suspend, or discontinue the Service at any time without notice. We may also update these Terms. Continued use after changes constitutes acceptance of the revised Terms.
8. Governing Law
These Terms are governed by the laws of the jurisdiction where you reside, without regard to conflict of law principles.
9. Contact
For questions about these Terms, contact us via the project repository.
Use this tool responsibly — cryptographic security depends on correct key management and nonce discipline.