*The  #1 security service as recommended by Harvard University cryptographers*
Get Secured Now. Fast & Simple
How To Revolutionize Your Privacy
With Just A Single Click.....
AT A GLANCE

From the Author of Practical Cryptology and Web Security

PK Yuen is a well known expert on communications, Internet and the World Wide Web. With over 25 years experience working on web technologies, including large-application developments, engineer training and the security systems of international airports.
PK Yuen, Creator and Founder of Permanent Privacy Encryption
Premium and Unparalleled Encryption Technology
Permanent Privacy Encryption uses "Advanced Encryption
Standard (AES) 256-bit as a foundation with an expansion on
the decryption space - known as Shannon Perfect Secrecy.
Permanent Privacy can guarantee 100% security.

Permanent Privacy Encryption: Benefits Beyond The Ciphertext
Deleting confidential information doesn't mean it's gone. 
Our Instant, simple technology ensures privacy forever with just one click.
Be More Productive
Everything happens fast - you don't have time to waste. 
Save time and money with single click security.
Communicate Safely
Someone you don't trust reads your emails. Your quest for privacy ends here. 
Communicate in private.  
Delete Files Forever
No matter how much you try - sensitive information can be recovered.  
Get permanent file deletion. 
How Secure is your Sensitive Information?
The transfer of information over the world wide web depends critically on secure communications. The need to protect the material we send and receive in cyberspace is crucial to ensuring we can continue to use this incredible resource safely. Cryptography provides the most reliable tools for storing and transmitting digital information and is the gold standard for attaining the levels of security our online interactions demand
Our service can be considered as an enhanced AES encryption method to the point where its security strength reaches an "unhackable" level by achieving "Perfect Security" as defined and created by Claude Shannon. 
The decryption space contains every single readable character, words of any language and all potential combinations. 
When a ‘try-them-all’ (brute-force) method is used to attack pp-Encryption, the decryption results will contain every readable sentence up to the length of the original message.
This feature is what makes our encryption truly unhackable since it is mathematically impossible to find the original message. 
Compare
Permanent Privacy Encryption 
Microsoft Office Suite
$
249.99
Billed annually, no set up fee.
  • Built For Windows 
  • Excel, Outlook, Explorer, Word
  • Instant, Single Click Encryption
  • Permanent File Deletion
Microsoft Excel
$
75
Billed annually, no set up fee.
  • Built For Windows
  • C & Visual Basic
  • Encrypt Cells, Workbooks
  • Permanent File Deletion
Microsoft Outlook
$
100
Billed annually, no set up fee.
  • Built For Windows
  • C & Visual Basic
  • Encrypt Text, File Attachments
  • Permanent File Deletion
Microsoft
Explorer
$
100
Billed annually, no set up fee.
  • Built For Windows
  • C & Visual Basic
  • Encrypt Files, Folders
  • Cloud Encryption
  • Permanent File Deletion
Microsoft Office Suite
$
249.99
Billed annually, no set up fee.
  • Built For Windows 
  • Excel, Outlook, Explorer, Word
  • Instant, Single Click Encryption
  • Permanent File Deletion
MAC & IOS
$
75
Billed annually, no set up fee.
  • Built For Mac & IOS
  • Java 8
  • 360 Functionality
  • Permanent File Deletion
Microsoft Excel
$
75
Billed annually, no set up fee.
  • Built For Windows
  • C & Visual Basic
  • Encrypt Cells, Workbooks
  • Permanent File Deletion
Microsoft Outlook
$
100
Billed annually, no set up fee.
  • Built For Windows
  • C & Visual Basic
  • Encrypt Text, File Attachments
  • Permanent File Deletion
Microsoft
Explorer
$
100
Billed annually, no set up fee.
  • Built For Windows
  • C & Visual Basic
  • Encrypt Files, Folders
  • Cloud Encryption
  • Permanent File Deletion
Technology Overview

How it Works? 
Our patent protected encryption-engine uses AES 256-Bit with an expansion on the decryption space. 
The decryption space contains every single readable character, words of any language and all potential combinations of them.
 If a brute force attack is attempted - the decryption results will contain every readable sentence up to the length of the original message. 
This feature will secure data - and make data attacks useless - it is mathematically proven.

For example, if you encrypt a four letter word ‘East’, the brute force attack will discover all four letter combinations including (but not limited to) ‘Home’, ‘Time’, ‘West’, ‘Note’ as well as your original word ‘East’. There is no chance for the hacker to identify your original text.

The Unhackable Feature
  You create two unique passwords and a random “Control File” that is larger in size than the file or text that you are encrypting/decrypting. For additional security - store all three keys offline.

Permanent File Deletion
 When you delete information on your computer - it can be recovered. Permanent deletion occurs when you change your control file after encrypting your data. Once you change the control file - the data is gone forever.

How strong is PP encryption? 
Permanent Privacy secures data to an unbreakable level. Proven against the world’s most advanced computers and the #1 security service as recommended by Harvard University cryptographers*.

Are we able to decrypt a file without knowing the Keys?
No. Unbreakable means unbreakable. Privacy means privacy.

*We offered a $1million bounty to anyone who could hack our software*
Preview
See how you can protect your data in Microsoft Excel
Learn about our Instant encryption -  Encrypt cells, tables, sheets and workbooks with a single click.
The "Unhackable" Feature
Patents
Sign Up Now!
Get Exclusive Offers. 
IOS Encryption Coming Soon. 
Permanent Privacy Limited (PPL) - www.permanentprivacy.com 
© 2018 Permanent Privacy Limited. All rights reserved. Permanent Privacy and its logo are registered trademarks of Permanent Privacy Limited.