Open format .priv v1

Encryption that
protects everything

ZIP hides content but exposes filenames. 7z encrypts but leaves metadata. The .priv format was designed to protect your files, their names, and their metadata - in one step.

Create .priv file → Open .priv file
AES-256
Encryption standard
600,000
PBKDF2 iterations
0 bytes
Sent to server
100%
Client-side

Password-protected archives aren't private

When you password-protect a ZIP file, you feel safe. But anyone who opens that file can still see every filename, folder structure, and file size inside. Metadata like GPS coordinates in photos and author names in documents stays intact.

Older ZipCrypto encryption has been cracked for years. Even "strong" AES-ZIP leaks structure. If someone intercepts your archive, they already know what's inside - just not the content.

  • ZIP filenames visible even with a password
  • EXIF data (GPS, camera, timestamp) preserved
  • ZipCrypto broken since 2004
  • No built-in expiry or self-destruct
  • Filenames encrypted inside the payload
  • EXIF and author metadata stripped automatically
  • AES-256-GCM authenticated encryption
  • Optional expiry date built into the format
  • Unique salt and IV for every file
  • Zero-knowledge: we never see your data

.priv protects everything - by default

The .priv format encrypts your files, their names, and their structure into a single opaque blob. Metadata is stripped before encryption. An optional expiry date makes files self-destruct after a deadline.

All processing happens in your browser using the native Web Crypto API. Your files never leave your device.

ZIP vs .priv

A side-by-side look at what each format protects.

ZIP + Password

  • Filenames visible
  • Metadata preserved
  • ZipCrypto vulnerable
  • No expiry mechanism
  • Universal support
  • Compression built-in
VS

.priv

  • Filenames encrypted
  • Metadata auto-stripped
  • AES-256-GCM
  • Built-in expiry date
  • Zero-knowledge
  • Open specification

Four steps, zero server contact

Everything happens in your browser. The server only delivers the page - it never sees your files.

1

Select files

Choose any files you want to protect - images, documents, spreadsheets, code. Drag and drop or click to browse. Any file type, up to 500 MB.

2

Set a password

Your password goes through PBKDF2 with 600,000 iterations and a random 32-byte salt. This turns even a simple password into a 256-bit encryption key that's extremely hard to brute-force.

3

Encrypt in your browser

The Web Crypto API handles everything: metadata is stripped, filenames bundled into the payload, and the entire package encrypted with AES-256-GCM. Your files never leave your device.

4

Share the .priv file

Send it through email, Slack, WhatsApp, cloud storage - any channel. Share the password separately. The recipient opens it at privconvert.com.

Open and transparent

The .priv format is fully documented. No hidden layers, no proprietary extensions. Here is the binary layout.

Offset Size Field Description
0 4 bytes Magic PRIV (0x50 0x52 0x49 0x56)
4 1 byte Version Format version (currently 0x01)
5 1 byte Flags Bit 0: has expiry | Bit 1: metadata stripped
6 4 bytes Expiry Unix timestamp (uint32 big-endian), 0 if none
10 32 bytes Salt Random salt for PBKDF2 key derivation
42 12 bytes IV Initialization vector for AES-256-GCM
54 variable Ciphertext AES-256-GCM encrypted payload + 16-byte auth tag

Encrypted payload structure

uint32 file count, then for each file: uint16 filename length, N bytes filename (UTF-8), uint32 data size, N bytes raw file data. All integers are big-endian.

Built on proven cryptography

Every component uses battle-tested standards implemented through the browser's native Web Crypto API.

AES-256-GCM

Authenticated encryption. Tamper with one bit and decryption fails.

PBKDF2 600K

600,000 iterations make brute-force attacks computationally impractical.

Unique salt + IV

Random 32-byte salt and 12-byte IV. Same file encrypted twice looks completely different.

Zero knowledge

We never see your files or password. Everything encrypts and decrypts in your browser.

Use .priv from the terminal

Encrypt and decrypt .priv files on Linux and macOS without a browser. Fully compatible with the web tools.

Quick install

# One-liner install
curl -sL https://raw.githubusercontent.com/
  toprivHQ/priv-format/main/priv \
  -o /usr/local/bin/priv && \
  chmod +x /usr/local/bin/priv && \
  pip install cryptography

Usage

# Encrypt
priv encrypt secret.pdf photos/ -o bundle.priv

# Decrypt
priv decrypt bundle.priv -o ./output/

# File info
priv info bundle.priv
View on GitHub

Try .priv now

Create or open encrypted .priv files in your browser or terminal. No signup, no tracking.

Create .priv file → Download CLI tool