Terms and Conditions

Effective Date: 14/2/2026 By downloading, installing, or using the PurpleKrypt Graphical Tool (the "Tool," the "Software," or "PurpleKrypt"), you agree to comply with and be bound by the following terms and conditions. If you do not agree with these terms, do not use the Tool.


1. License
The PurpleKrypt Graphical Tool is an open-source Software released under the GNU General Public License (GPL) v3.0. You are free to use, modify, and distribute the Tool in accordance with the terms of the GPLv3 license. For more details on the terms of the GPLv3 license, visit GNU General Public License v3.0.


2. Software Description
PurpleKrypt Graphical Tool is an open-source encryption application designed to securely encrypt and decrypt both files and text. The Software supports key generation derived from a user-defined password, a key file, or a combination of both. Key material derived from passwords is generated using the Argon2id key derivation function provided by the Bouncy Castle cryptographic library. Encryption and decryption operations are performed using the AES-256-GCM algorithm, as implemented by the Java Cryptography Extension (JCE).


3. No Data Collection
PurpleKrypt Graphical Tool does not collect any data. The Software operates locally on your device, and no personal information, usage data, or other data is transmitted to external servers or third parties.


4. No Warranty / "As-Is" Basis
The Tool is provided on an "as-is" basis, with no warranty of any kind, express or implied, including but not limited to warranties of merchantability, fitness for a particular purpose, or non-infringement. The developers and contributors to the Tool make no claims regarding the Tool’s performance, security, or suitability for any particular use case. You agree to use the Tool at your own risk. The developers and contributors shall not be held liable for any damages, including but not limited to loss of data, system malfunctions, or any indirect, incidental, or consequential damages arising from the use or inability to use the Tool


5. No Modification of Data
The Tool does not automatically alter or modify any original input data. By default, it operates by creating an encrypted or decrypted copy of the input data. The user is provided with an optional setting to remove the original input data after the copy has been successfully created. If enabled, this option should be used with caution and does not guarantee secure, irreversible, or unrecoverable data removal from the storage device. The developers and contributors of the Tool shall not be held responsible or liable for any data corruption, data loss, or any data that may remain recoverable after deletion. You are solely responsible for verifying and maintaining the integrity of the original data both before and after any encryption or decryption operation.


6. Keyfile and Password Safekeeping
The Tool may generate encrypted or unencrypted key files containing cryptographic keys that are essential for encrypting and decrypting data. You are solely responsible for securely storing and backing up these key files. If a key file is lost, corrupted, or otherwise rendered unusable, the associated data cannot be decrypted. The Tool may not automatically detect whether a key file is encrypted; therefore, it is your responsibility to know which key files are encrypted and to remember the password used to protect them. For data encrypted using a key derived solely from a password, you are responsible for remembering the password used for encryption, as it will be required to decrypt the data. The developers and contributors shall not be held responsible or liable for the loss, corruption, theft, or misuse of key files or passwords. You are strongly advised to maintain multiple secure backups of all key files and to store passwords securely in reliable and protected locations.


7. PK AAD ID Safekeeping
The Tool generates a file named "pk_aad_id" the first time the Software is run. This file contains a randomly generated identifier that may be used as Additional Authenticated Data (AAD) during file encryption. By default, this feature is disabled; however, the user may choose to enable it. When the "PK AAD ID" is used, any data encrypted using the "pk_aad_id" as Additional Authenticated Data (AAD) cannot be decrypted on another or the same installation or copy of the Software without access to the same "pk_aad_id" file, even if the correct key file and/or password are provided. If the "pk_aad_id" file or the associated Software instance is lost, corrupted, or otherwise rendered unusable, the encrypted data cannot be decrypted. You are solely responsible for maintaining and safeguarding the "pk_aad_id" file. The developers and contributors shall not be held responsible or liable for the loss, corruption, theft, or misuse of the "pk_aad_id" file or any data associated with it. You are strongly advised to maintain multiple secure backups of the "pk_aad_id" file and any associated Software installations in reliable and protected locations.


8. Limitation of Liability
To the fullest extent permitted by applicable law, in no event shall the developers or contributors of the Tool be liable for any direct, indirect, incidental, special, exemplary, or consequential damages arising out of or in connection with the use or inability to use the Tool. This includes, but is not limited to, loss of data, data corruption, loss of encryption keys, loss of key files, loss of passwords, loss of Additional Authenticated Data (PK_AAD_ID), or any other damages, even if the developers or contributors have been advised of the possibility of such damages. The Tool is provided with the understanding that its use involves inherent risks. Any damage, loss, or adverse outcome resulting from the use, misuse, or incorrect operation of the Software is solely the responsibility of the user.


9. Modification and Distribution
You may use, modify, and distribute the Software in accordance with the terms of the GNU General Public License version 3 (GPLv3). However, if you redistribute the Tool or any modified version of it, you must: • Provide proper credit and acknowledgment to the original developers and contributors. • Include a copy of, or a link to, this Terms and Conditions document. • Ensure that the applicable license terms are respected and that users are informed that the Software is released under the GPLv3.


10. Indemnification
You agree to indemnify and hold the developers, contributors, and affiliated entities harmless from any claims, losses, damages, or legal expenses arising from your use or misuse of the Tool. This includes any third-party claims resulting from your actions or inactions.


11. Changes to Terms
We reserve the right to update or modify these Terms at any time. Any changes will be posted on the official website or distribution platform, and the updated Terms will be effective upon posting. It is your responsibility to review these Terms periodically to stay informed of any changes.


12. Governing Law
These Terms and Conditions shall be governed by and construed in accordance with the laws applicable in the user's jurisdiction, without regard to its conflict of law principles.


13. Contact Information
If you have any questions regarding these Terms and Conditions or need further clarification, please contact us at: purplekrypt@gmail.com


Conclusion
By using the PurpleKrypt Graphical Tool, you acknowledge that you have read, understood, and agree to these Terms and Conditions.