× BETA *
  About   F A Q   Tips & Tutorials   Language Support
 Buy me a coffee
  L A N G U A G E S
  English   Español
              
Terms of Use Privacy Statement Beta Disclaimer
© 2023, Amaca Tech, LLC
All rights reserved.
Own your privacy
  Home  |  FAQ

Frequently Asked Questions

About Amaca®  |  Keyphrases  |  Texts  |  Access  |  Language Support  |  Parental Controls  |  Safety & Privacy

About Amaca®  |  Keyphrases  |  Texts  |  Access  |  Language Support  |  Parental Controls  |  Safety & Privacy

About Amaca

Amaca® is the easy, safe, and free online tool to encrypt your written content for sharing and safekeeping.

Because your personal privacy is being seriously undermined, and the consequences for you and every member of society will be dire.

Many people are not yet too concerned about protecting their privacy, and that's understandable. The near-complete loss of personal privacy is a brand new phenomenon and most people still don't realize the extent of the damage this will cause—much less what to do about it.

TIP To learn more about the privacy-loss problem and how Amaca helps solve it, read the Amaca Paper: "Own Your Encryption: It's time we all regain control of our privacy."

Amaca is more useful than you might think, so make the most of it. To see a list of use cases and ideas on when to use Amaca, read: When to use Amaca.

TIP To take full advantage of Amaca, visit the section entitled Tips & Tutorials.

  1. It's easy and safe.
  2. You are in control.
  3. Your anonymity is protected.
  4. Your device performs all operations internally. Nothing is ever sent to or processed by Amaca or 3rd-party servers.
  5. The public version of Amaca is free. And even though the service costs you nothing, with Amaca you are NOT the product.
  6. Amaca is platform independent. (See next question/answer for more on this)

TIP To learn more about Amaca and what makes it truly unique and useful, check out our: About page.

It means that, to access Amaca, you only need a web browser. App stores have no in on how you use Amaca, or how you handle your encrypted content. This is a big deal because, with Amaca, your private information stays private and in your possesion.

NEW  Now your can easily install Amaca in your devices and use it even without an Internet connection!

TIP To get you going quickly, check out this animated presentation: How to Use Amaca.

Decrypting and encrypting text works the same way. To decrypt text:

TIP To get you going quickly, check out this animated presentation: How to Use Amaca.

Amaca implements a secure industry-standard cryptographic hash function called SHA-512. From there, Amaca's proprietary algorithm gives you strong encryption capabilities to protect your confidential written information. All the encryption and decryption operations are performed by your own computer or device, so neither your keyphrase nor your written information are ever transmitted to Amaca or third-party servers.

Yes it is!

I'm developing Amaca in my free time and at my own expense because I believe personal privacy is a fundamental human right that is currently under threat. If you find Amaca useful and want to help protect people's right to privacy, please consider supporting me...

Yes. Amaca is available and intended for individuals aged 13 years or older. If you are 13 or older, but under the age of majority in your jurisdiction, you should review Amaca's Terms of Use with your parent or guardian to make sure that you and your parent or guardian understand it.

If you are younger that 13 years of age, you may not access or use Amaca.

Keyphrases

Passwords (also called keywords) usually don't allow spaces. So the longer the password, the harder it is to remember. This is why most people make them short, and therefore less secure.

Amaca keyphrases, in contrast, can include spaces. They can also include characters in any language or writing system, and even emojis! This makes Amaca keyphrases easier to remember because they can constitute full sentences that are memorable to you but very difficult for others to guess or figure out.

No. Once you activate your keyphrase, Amaca automatically shaves off any spaces at either end.

Remember that spaces between other characters are fine and encouraged, because they can help make your keyphrases more memorable to you.

Amaca requires a minimum length of 15 characters. However, we suggest creating keyphrases at least 25 characters long. They can be as long as you want them to be — the longer, the safer. Just make sure they are memorable to you and your intended recipients.

Yes! Keyphrases are everything-sensitive! – and that includes caps and spaces.

It takes only one single, tiny change in a keyphrase to make the resulting encrypted text completely different! This is true regardless of whether you change the case of a single letter, or if you add or remove a space, a dot, a comma, a dash—whatever!

This is one of Amaca's most powerful security features! By changing a single character of your keyphrase you create a brand new encryption formula.

If you forget your keyphrase once you've already encrypted your written content and left the Amaca site, your encrypted text will remain unreadable. Oops!

A strong keyphrase is:

If it's not unique, someone else who knows a previous keyphrase of yours could guess your new keyphrase.

If it's not memorable to you, you could forget it and make the encrypted text inaccessible for yourself.

If it's obvious and easy to guess, an unwanted third party might figure it out and decrypt your private text.

Establish and use a keyphrase protocol.

TIP To learn more about Keyphrase Protocols, and how to create and share them easily and safely, read:
Creating a Keyphrase Protocol  |  Sharing a Keyphrase Protocol

TIP To learn more about Keyphrase Protocols, and how to create and share them easily and safely, read:
Creating a Keyphrase Protocol  |  Sharing a Keyphrase Protocol

Texts

A text can be as short or as long as you want. The upper limit will depend on your device's capabilities.

It depends on your individual device's speed and internet connection, but let's just say it's pretty much instant!

TIP To get you going quickly, check out this animated presentation: How to Use Amaca.

By any electronic means you'd use to send regular written content: By email, text instant message, inside a Word or Google document, via text messaging, through cloud storage services, or you can even post it on social media platforms.

TIP To get you going quickly, check out this animated presentation: How to Use Amaca.

Yes! As a matter of fact, using Amaca to encrypt written data and then uploading them inside files to a cloud storage service is an incredibly effective and safe way to store your private data for safekeeping.

It's also an excellent way to "travel" with your encrypted written content, because it frees you from having to transport a digital copy on a computer, device or storage drive, during your travels.

Finally, it's also a highly effective, safe — and instant — way to transmit your encrypted written content to your intended recipients anywhere in the world.

If they know the exact same keyphrase: 100%.
If they don't: Virtually zero.

Go to the Amaca website at https://amaca.tech (always double-check the URL). Then...

TIP To get you going quickly, check out this animated presentation: How to Use Amaca.

No. Amaca only encrypts and decrypts written text.

Yes! And it's super easy!

To encrypt a spreadsheet table, simply select and copy to your clipboard (CTR C) the table or portion of the table you wish to encrypt. Then simply paste it on Amaca's appropriate field (the gray area) and encrypt as you normally would any text. Once encrypted, the contents will be unrecognizable as a spreadsheet or table. This is a powerful security feature.

To save the encrypted Excel table, save it inside a Word document (or equivalent), or simply paste it on the body of an email.

To decrypt, follow the regular Amaca decryption procedure: Paste it onto the gray area, input and activate the keyphrase, and click the TRANSFORM button.

To reconstruct the Excel table, select the top-left cell of the spreadsheet where you want the table to appear, and then paste onto that cell the contents of the clipboard.

NOTE Formatted elements of a spreadsheet (like background colors, text colors, and formulas), if any, will be automatically removed and won't be encrypted. The reconstructed spreadsheet won't include these formatting elements either.

No. Formatted text (bold letters, colors, italics, etc.), would only make it easier for prying eyes to figure something out about the content.

NOTE  For your convenience, you can PASTE formatted text straight into the gray input box. But, for your security, the formatting elements won't be included in the encrypted text.

Yes! You can encrypt anything that uses letters, numbers and symbols from the Latin/Roman alphabet.

Access

No. Amaca is what's called a progressive web app (PWA), and this is great news for you! Now you can easily install Amaca in your computer and devices, and use it even without an Internet connection! All without having to download anything from (or be subject to the monitoring of) app stores. With Amaca, your private information stays private and in your possesion.

NEW  Learn how to install Amaca in your computer and devices.

Amaca is compatible with all major web browsers. To maximize your privacy, we recommend you use these privacy browsers:

Brave  |  DuckDuckGo  |  Firefox  |  Firefox Focus  |  Safari  |  Tor  |  Vivaldi

With most browsers, no.

NOTE Amaca does not use persistent (activity tracking) cookies. However, for your convenience, Amaca uses session cookies—temporary cookies that are not installed in your device and don't track your activity. Session cookies disappear once you end your session and close your browser. Some privacy-friendly browsers allow session cookies by default, but others don’t. If Amaca is not working correctly with your privacy browser, make sure to change the settings so “session cookies” (and only session cookies) are enabled while using Amaca. Finally, Amaca uses Javascript, so make sure to allow scripts.

Amaca does not restrict geographical access. However, each country has its own rules and restrictions concerning Internet access.

Language Support

With Amaca, you can now encrypt text written in over 130 languages—the ones that use the Latin/Roman Alphabet. These include:

In total, the native languages of about 70% of the world's population use the Standard Western Latin alphabet. That's more than 5 billion people!

More details: Language Support

At this moment, Amaca has user interfaces in English and Spanish.

All over the world (either as a 1st or 2nd language), there are currently about...

Taking into account that there is a good number of people who speak both English and Spanish, it is safe to say that Amaca is currently accessible to about 1.5 billion people.

And even people who don't speak either English or Spanish—but whose language uses the Latin/Roman alphabet—can presumably use Amaca to encrypt their written content, as long as they are able to figure out Amaca's simple and user-friendly interface.

Not at this moment. In the future we will roll-out additional versions of Amaca that support languages using other scripts and writing systems.

Yes you can! Keyphrases can be written using any alphabet or script, regardless of the language used on the text you wish to encrypt!

If your device supports a non-Latin script, you can write your keyphrase using that script (and even emojis).

Parental Controls

Yes. Amaca is available and intended for individuals aged 13 years or older. If you are 13 or older, but under the age of majority in your jurisdiction, you should review Amaca's Terms of Use with your parent or guardian to make sure that you and your parent or guardian understand it.

If you are younger that 13 years of age or under the age of majority in your jurisdiction, you may not access or use Amaca.

Amaca is accessible on web browsers only, and most of them include adjustable parental controls.

TIP The most thorough resource we've found on this topic can be found at independent review website WizCase: The Complete Guide to Parental Controls. This guide includes the section: Configure Parental Controls on Internet Browsers.

IMPORTANT DISCLOSURE: Parental controls features and setup instructions vary from one browser to another, and are subject to change without notice. The information and links provided here come from 3rd-party sources. Amaca does not vouch for their accuracy or effectiveness, and we urge parents and tutors to conduct their own research on the matter.

IMPORTANT DISCLOSURE: Parental controls features and setup instructions vary from one browser to another, and are subject to change without notice. The information and links provided here come from 3rd-party sources. Amaca does not vouch for their accuracy or effectiveness, and we urge parents and tutors to conduct their own research on the matter.

IMPORTANT DISCLOSURE: Parental controls features and setup instructions vary from one browser to another, and are subject to change without notice. The information and links provided here come from 3rd-party sources.

IMPORTANT DISCLOSURE: Parental controls features and setup instructions vary from one browser to another, and are subject to change without notice. The information and links provided here come from 3rd-party sources. Amaca does not vouch for their accuracy or effectiveness, and we urge parents and tutors to conduct their own research on the matter.

IMPORTANT DISCLOSURE: Parental controls features and setup instructions vary from one browser to another, and are subject to change without notice. The information and links provided here come from 3rd-party sources. Amaca does not vouch for their accuracy or effectiveness, and we urge parents and tutors to conduct their own research on the matter.

IMPORTANT DISCLOSURE: Parental controls features and setup instructions vary from one browser to another, and are subject to change without notice. The information and links provided here come from 3rd-party sources. Amaca does not vouch for their accuracy or effectiveness, and we urge parents and tutors to conduct their own research on the matter.

IMPORTANT DISCLOSURE: Parental controls features and setup instructions vary from one browser to another, and are subject to change without notice. The information and links provided here come from 3rd-party sources. Amaca does not vouch for their accuracy or effectiveness, and we urge parents and tutors to conduct their own research on the matter.

IMPORTANT DISCLOSURE: Parental controls features and setup instructions vary from one browser to another, and are subject to change without notice. The information and links provided here come from 3rd-party sources. Amaca does not vouch for their accuracy or effectiveness, and we urge parents and tutors to conduct their own research on the matter.

IMPORTANT DISCLOSURE: Parental controls features and setup instructions vary from one browser to another, and are subject to change without notice. The information and links provided here come from 3rd-party sources. Amaca does not vouch for their accuracy or effectiveness, and we urge parents and tutors to conduct their own research on the matter.

Safety & Privacy

The following applies to any computer or device that you use, including your own:

For more information on how to protect your privacy, please read: Top Tips to Protect Your Privacy.

Not really. Assume that company-owned and corporate/provided computers and devices, as wells as public-use computers offered in places like hotels, public libraries or event venues have activity-tracking software.

For more information on how to protect your privacy, please read: Top Tips to Protect Your Privacy.

No. Public wi-fi communications are not encrypted, so they could be monitored. Office wi-fi could be monitored too. If you can't connect to a trusted password-secured wi-fi or wired internet connection, use your phone’s cellular data connection.

For more information on how to protect your privacy, please read: Top Tips to Protect Your Privacy.

If any of the above does not hold true, you are at a phishing site and your information is NOT safe. Close the browser window, open a new one, and type in the correct Amaca URL: https://amaca.tech

For more information on how to protect your privacy, please read: Top Tips to Protect Your Privacy.

No, we do not. All encryption and decryption operations are handled by your own device. Neither your keyphrases nor your encrypted or decrypted texts are ever transmitted to, or stored in, Amaca or third-party servers.

For more information on Amaca's privacy practices, please read our Privacy Statement.

No, we do not. That is why we Amaca doesn't require you to register, sign up, or log in.

The only thing we keep track of, in terms of website analytics, is minimal standard non-personal website traffic information and statistics for the purposes of understanding and optimizing web usage, and to assess and improve the effectiveness of the Amaca website.

To this end, we use a privacy-focused website analytics platform called Fathom Analytics, which does not collect personal or invasive data and is also fully GDPR compliant and doesn't use cookies.

For more information on Amaca's privacy practices, please read our Privacy Statement.

No. Amaca does not use or install persistent cookies on your computer.

For more information on Amaca's privacy practices, please read our Privacy Statement.

Amaca makes no guarantees of any kind. As powerful and secure as Amaca is, there are factors beyond our control that could potentially compromise the security of your keyphrase or encrypted text. This includes but is not limited to:

Always proceed with caution, knowing that your privacy is of the utmost importance.

For more information, please read our: Terms of Use  |  Privacy Statement  |  Beta Disclaimer