Ctrl+E Encrypt Ctrl+D Decrypt Ctrl+R Recent
AES-256-GCM PBKDF2 · 250k Keyfile 2FA Batch encrypt Timestamp Memory-zeroed Offline · no server
🔒
Drop images or videos here
multiple files supported · jpg png gif webp mp4 webm mov · or click to browse
Passphrase
Keyfile (optional second factor)
Any file — a photo, a PDF, an audio file — becomes a second authentication factor.
Without BOTH the passphrase AND this exact file, decryption is impossible.
⚠ Lose the keyfile → lose access. Store it separately from the passphrase.
🔑
Description (optional, stored in plaintext header)
Encrypting… 0 / 0
🔓
Drop a .lol file here
drop your encrypted .lol file or click to browse
🔒
🔑 This .lol file was encrypted with a keyfile. You must provide the same keyfile below.
Passphrase
Keyfile (if used during encryption)
🔑
decrypted content
// .lol v2 binary format specification
0x00–0x03
Magic
"LOL!" · identifies file type
0x04
Version
0x02 · format version
0x05–0x14
PBKDF2 Salt
16 bytes · random per file · key derivation
0x15–0x20
AES-GCM IV
12 bytes · random nonce · never reused
0x21–0x28
Timestamp
uint64 big-endian · Unix ms · forensic trail
0x29
Flags
bit0: keyfile used · bits1-7: reserved
0x2A–0x2B
Desc length
uint16 BE · plaintext description byte count
0x2C–N
Description
UTF-8 · plaintext · may be 0 bytes
N+1 – EOF
AES-256-GCM ciphertext
Encrypted: [2B mime_len][mime][2B fn_len][filename][file bytes] · 16-byte auth tag · any tampering fails authentication