Passwords are used to encrypt or hide files.
If you have many passwords, you can store all of them in a list, open with one “master password”. That master password is called Access Key (to a list of passwords).
Activation Keys are useful only to those that want to develop their own encryption algorithms or new carriers. It’s an internal security system of east-tec InvisibleSecrets.
east-tec InvisibleSecrets works on all Windows platforms, including Windows 7 & 8, Windows Vista/XP/2000/NT/Me/98/95.
The receiver can download and use the trial version of east-tec InvisibleSecrets. The unhide and decrypt functions from the trial version will NOT expire! After the 15 days of evaluation the receiver will not be able to encrypt or hide, but will be able to unhide and decrypt any message.
Our policy is free minor upgrades (updates) and paid major upgrades. If a major paid upgrade will be released within 3 months since the purchase date, it will be totally free for you! If you don’t want to upgrade, you may continue using our product. In case you want to upgrade to the latest version, we usually offer great discounts for existing customers.
east-tec InvisibleSecrets uses government-level 256-bit AES On-the-fly encryption (also known as Rijndael) to encrypt and protect your data. This is one of the most secure encryption algorithms. Secret files are highly secure. It also uses word leader industry standards such as the 256-bit Blowfish encryption algorithm which is a highly secure method to protect your sensitive files.