Local-only processing
Files, text, passwords, answers, gestures, and key files are handled in your browser. OzCrypt is designed so these secrets are not uploaded.
A practical guide to what OzCrypt protects, what remains local, and where the honest privacy boundary sits.
OzCrypt should be clear about what protects the encrypted content and what only helps guide local use.
Files, text, passwords, answers, gestures, and key files are handled in your browser. OzCrypt is designed so these secrets are not uploaded.
Strong protection comes from AES-GCM encryption plus secrets that are hard to guess. Long unique passwords and well-kept key files are stronger than short answers or simple gestures.
Local time windows and environment checks are useful reminders and workflow controls, but device time and browser characteristics can be changed. Treat them as soft policy locks.
OzCrypt does not have an account recovery back door. If a required password, answer, gesture, or key file is lost, the encrypted content cannot be recovered by the app.
OzCrypt works locally in the browser. The public .ozc header is now minimal and authenticated; file names, questions, dates, and notes are encrypted as protected metadata.
Avoid exaggerated promises. Strong encryption is about careful implementation, strong secrets, and honest limits.
A few habits make local encryption much safer and reduce accidental lockouts.
The encrypted payload uses AES-GCM. The public header is authenticated as AES-GCM additional data, so changing header fields causes unlock to fail.
.ozc keeps only minimal public header data outside the ciphertext: format/version, app id, algorithm, KDF settings, salt, and required factor types. User-facing details are protected inside the encrypted payload.
Always test decryption before deleting originals. Keep passwords, answers, gesture reminders, and key-file backups separate from the encrypted package.
Modern browsers with Web Crypto and File API support are required for the core app. Service Worker and Clipboard support improve convenience.
QR codes and camera frames are processed locally in the browser. They are not uploaded to OzCrypt.
QR export is best for short encrypted notes. Larger encrypted text blocks should usually be copied as text or saved as .ozc files instead.
.ozcfg templates only save non-secret settings. They must not contain passwords, answers, gestures, key-file hashes, derived keys, or unlock secrets.
Features such as recipient sharing, remote revocation, cloud backup, cross-device sync, or hardware-key enrollment would require a future online service. They are not active in this local-only build.
OzVault stores vault items in an encrypted .ozv file and keeps the unlocked database only in page memory.
The master password is not stored. If it is lost, OzVault cannot recover the encrypted vault.
Vault creation, unlock, editing, export, search, generator, and dashboard checks happen locally. The current build has no cloud sync or hosted account.
Copied passwords may remain in the operating-system clipboard. Auto-lock clears the page memory state after inactivity, but it is not a substitute for locking your device.
Sync, hosted backup, team vaults, hosted audit history, and online breach monitoring would require backend infrastructure and are not part of this offline local build.
OzPurge helps remove common metadata locally, but it should stay honest about what it can and cannot guarantee.
Photos and documents are processed locally in your browser. OzPurge does not upload files, metadata previews, or reports.
OzPurge removes common metadata such as EXIF, text chunks, comments, or document properties when supported, but it does not guarantee complete hidden-content removal for every format.
Always open the cleaned file, confirm it still looks correct, and keep the original backup if you may need it later.
Once metadata is removed and the cleaned file is shared, you may not be able to restore timestamps, comments, camera details, or document properties.
OzGen can generate fake identities locally for demos, mockups, and privacy-friendly placeholders, but those records must never be presented as real people.
Use generated identities only for testing, development, demos, and mock data. They should never be used to impersonate real people or bypass verification systems.
Names, usernames, emails, addresses, phone numbers, and test card values are generated locally in the browser using built-in lists and randomness. OzGen does not fetch remote identity data.
OzStegano helps hide content inside PNG carriers locally, but hiding and cryptographic confidentiality are different goals.
Carrier PNG files, hidden payloads, passwords, extracted files, and checksums are processed locally in the browser. OzStegano does not upload them.
LSB steganography can still be detected by specialist or forensic tools. Optional AES encryption protects the payload contents, but it does not make the presence of hidden data impossible to detect.
JPEG, WebP, MP3, AAC, OGG, and other lossy formats may destroy hidden bits. The current build intentionally focuses on PNG to keep the carrier lossless.
Open the stego PNG locally, confirm it still looks acceptable, and test extraction before relying on the file for transport or backup.
OzChat is a local-first WebRTC preview for 1:1 encrypted chat and small file transfer without a signaling server in the default build.
The static app does not upload messages or files. In this preview, users manually exchange WebRTC offer and answer text to establish a DataChannel.
Offer/Answer metadata must be readable by the receiving peer. A pairing code can encrypt the package while you share it, but the peer decrypts it before connecting.
OzChat adds an app-layer ECDH/AES-GCM session on top of WebRTC. Compare the displayed fingerprint with your peer over a trusted channel before relying on the session.
Signal QR codes, uploaded QR images, and camera frames are processed locally. Camera scanning depends on browser support and usually requires HTTPS or localhost.
A static web app can only open offline after it has already loaded and cached on that device. Open or install OzChat before travel, and keep the tab open if Service Worker support is unavailable.
Connection setup metadata may reveal network information to peers. Browser LAN auto-discovery is limited, and AP/client isolation, VPNs, or restrictive networks can block direct connections.
A room card is just portable setup data for manual signaling. It is not stored by OzChat, does not create an online room, and does not upload messages.
Chat messages and transferred files stay in page memory only and are cleared when the session disconnects, refreshes, or closes. Future encrypted local history would require an explicit local passphrase.
OzChat diagnostics summarize browser support, connection state, signaling mode, fingerprint status, and ICE candidate counts without including messages, keys, pairing codes, raw signaling payloads, file contents, or IP addresses.
Future signaling, TURN, or SFU services could help blocked networks, but they require online infrastructure and may expose setup metadata to those services. They are not active in this static build.
OzChat is an experimental local secure-chat tool. Do not use it for life-critical or high-risk communications without independent security review.