YULL ENCRYPTION PRO


Try It Out

You can download the zip file from the link on this page. It contains both Yull.exe and YullG.exe (the Console and GUI versions), along with some folders containing practice source files, a Guide to Yull pdf, a READMEFIRST text file and a start YullOptions file.

Why would I want it?

Most people do not feel their data is at risk, or that the risk is very low, and hopefully they are correct. If there is nothing on your computer you wouldn't mind sharing with the world, then don't bother with encryption. Encryption can definitely have an impact on your work pattern. BUT if you have data you really want to keep private, you absolutely need to keep private, encryption is the way to go. There are many encryption products available, but obviously I think Yull is better than them all.

For instance, if you store sensitive data on the Cloud which is potentially accessible by unauthorized entities (as has been noted in news articles), you should consider encypting it first. If you share sensitive data with co-workers or others, using YULL you can easily send them the encrypted options file so they can decrypt your data.

Why is it better?

For one, Yull encrypts its data millions or even billions of times, depending on the settings and the size of the data. Also, if you use Yull's Personal Data feature and keep that private (which is explained on the Guide page), someone could steal all your data, Yull itself, your encrypted files, the key, your settings, all of it and your data will still be safe.

What happens if I don't like it?

Nothing. If you have created a default key and folder for Yull, you can easily delete them. Yull otherwise does not alter your computer in any way. If you so choose, it will create an optional Default Folder and key. And these are just folders and files you can easily delete. The only thing secret with Yull is your data.

In other words you can just delete the executables. Of course, make sure before you do that all encrypted files are either decrypted or you are totally certain they do not need to be. That is to say, you have a back up of the orginals or you were only working with my test files.

Is Yull Government Approved?

Absolutely not. The government has blessed an encryption algorithm called AES (Advanced Encryption Standard), based on an algorithm called Rijndael, a cipher developed by two Belgian cryptographers, Joan Daemen and Vincent Rijmen. There are several other standards. Yull uses it's own encryption algorithms combined with Blowfish. Additionally, if you are from a school or any institution, and want to see the source code, please just ask (and I might say yes). Yull has six encryption modes (and you can set up your own), which control the read size and some other features. At the highest mode, MAX, some files undergo billions of encryptions.

Is there a Backdoor to Yull? What Happens if the Government demands my cryotokeys to Yull?

No and nothing. Yull is entirely a desktop application. There is no backdoor. Yull does output a history of what you do but you can stop that, you can delete the history file, you can encrypt your history file, but besides the history file (which is for your convenience), there is no way to track what Yull does. There is no backdoor to it and there are no "cryptokeys" to it. Yull sends no data to the Internet and doesn't use the Internet at all. In other words, no one will ever know you use Yull or what you do with it.

What's with the Name?

Some people ask if it's an acronym, or it means something in a language. Perhaps it does. I wouldn't know. I tried to think of something like Blue this or that which sounds cool or Encryptor which sounds like it's from a movie, or maybe something with funky wIErd capitalization. I think most of the good names are taken, so "yull" just came to me as a name that hopefully no meaning. Think of it as "yull never have to worry about your data."

Where Is It?

All downloads are on the Downloads page.

HexAscii

Check out the HexAscii format on the Odds and Ends page. This is a new download format.

A Security Note

Because certain "entities" can break into almost anything, you cannot be too careful. Please validate your copies of Yull.exe, Yullg.exe and the Yull zip file by comparing the SHA-1 hash after downloading them to the ones in the zip file and on the web site.

I used the File Checksum Integrity Verifier version 2.05. and ran it this way, in DOS (the CLI) or Powershell, for example:

fciv -sha yull.exe

The numbers and letters you get for yull.exe (or any hash) should match what is here.

You will find information on fciv from a web search. You can go directly to this page:


Microsoft Support for FCIV


The zip file contains 115 test files in the SAMPLESOURCEFILES folder which are useful in getting up to speed with Yull without impacting your own data.

The files in the source folder are various types: ASCII, non-ASCII (i.e., just binary data), 0 length files, tiny files, etc.

LEGAL NOTICES AND DISCLAIMERS


THE CONTENT OF THIS WEBSITE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, WHETHER EXPRESS, IMPLIED, OR STATUTORY. THE CONTENT OF THIS WEBSITE MAY BE INACCURATE, INCORRECT, INVALID, UNTRUE, FALSE, INCOMPLETE AND/OR MISLEADING. THE ENTIRE RISK AS TO THE QUALITY, CORRECTNESS, ACCURACY, OR COMPLETENESS OF THE CONTENT OF THIS WEBSITE IS WITH YOU. THE AUTHOR(S), OWNER(S), PUBLISHER(S), AND ADMINISTRATOR(S) OF THIS WEBSITE DISCLAIM ANY AND ALL WARRANTIES OF ANY KIND.

FURTHERMORE:

THE AUTHOR(S), OWNER(S), PUBLISHER(S), AND ADMINISTRATOR(S) OF THIS WEBSITE (AND ASSOCIATED WEBSITES/SERVERS), AND APPLICABLE INTELLECTUAL-PROPERTY OWNER(S) DISCLAIM ANY AND ALL LIABILITY AND IN NO EVENT WILL ANY OF THOSE PARTIES BE LIABLE TO YOU OR TO ANY OTHER PARTY FOR ANY DAMAGES, INCLUDING, BUT NOT LIMITED TO, ANY DIRECT, INDIRECT, GENERAL, SPECIAL, INCIDENTAL, PUNITIVE, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, ANY LOSSES SUSTAINED BY YOU OR THIRD PARTIES, PROCUREMENT OF SUBSTITUTE SERVICES, OR BUSINESS INTERRUPTION), WHETHER IN CONTRACT, STRICT LIABILITY, TORT (INCLUDING NEGLIGENCE) OR OTHERWISE, ARISING OUT OF ANY USE OF THIS WEBSITE (OR ASSOCIATED WEBSITES/SERVERS) OR THE CONTENT THEREOF OR OF ANY THIRD-PARTY WEBSITE LINKED IN ANY WAY FROM THIS WEBSITE (OR FROM ASSOCIATED WEBSITES), EVEN IF SUCH DAMAGES (OR THE POSSIBILITY OF SUCH DAMAGES) ARE/WERE PREDICTABLE OR KNOWN TO ANY AUTHOR, OWNER, PUBLISHER, ADMINISTRATOR, OR ANY OTHER PARTY.

THIS PRODUCT MAY INCORPORATE IMPLEMENTATIONS OF CRYPTOGRAPHIC ALGORITHMS THAT ARE REGULATED (E.G., SUBJECT TO EXPORT/IMPORT CONTROL REGULATIONS) OR ILLEGAL IN SOME COUNTRIES. IT IS SOLELY YOUR RESPONSIBILITY TO VERIFY THAT IT IS LEGAL TO IMPORT AND/OR (RE)EXPORT AND/OR USE THIS PRODUCT (OR PORTIONS THEREOF) IN COUNTRIES WHERE YOU INTEND TO USE IT AND/OR TO WHICH YOU INTEND TO IMPORT IT AND/OR FROM WHICH YOU INTEND TO EXPORT IT, AND IT IS SOLELY YOUR RESPONSIBILITY TO COMPLY WITH ANY APPLICABLE REGULATIONS, RESTRICTIONS, AND LAWS.

TO REITERATE:

"YULL ENCRYPTION PRO" (IN ALL ITS VERSIONS) IS SUBJECT TO CERTAIN EXPORT RESTRICTIONS OF THE UNITED STATES GOVERNMENT. IF YOU ARE (A) IN A COUNTRY TO WHICH EXPORT FROM THE UNITED STATES IS RESTRICTED FOR ANTI-TERRORISM REASONS, OR A NATIONAL OF ANY SUCH COUNTRY, WHEREVER LOCATED, (B) IN A COUNTRY TO WHICH THE UNITED STATES HAS EMBARGOED OR RESTRICTED THE EXPORT OF GOODS OR SERVICES, OR A NATIONAL OF ANY SUCH COUNTRY, WHEREVER LOCATED, OR (C) A PERSON OR ENTITY WHO HAS BEEN PROHIBITED FROM PARTICIPATING IN UNITED STATES EXPORT TRANSACTIONS BY ANY AGENCY OF THE UNITED STATES GOVERNMENT, THEN YOU MAY NOT INSTALL, DOWNLOAD, ACCESS, USE, OR LICENSE "YULL ENCRYPTION PRO." BY ACCEPTING THIS LICENSE, YOU WARRANT AND REPRESENT TO RONALD GANS SOFTWARE AND THIS SITE THAT (1) YOU DO NOT MATCH THE CRITERIA SET FORTH IN (A), (B), OR (C) ABOVE, (2) THAT YOU WILL NOT EXPORT OR RE-EXPORT YULL ENCRYPTION PRO (IN ALL ITS VERSIONS) TO ANY COUNTRY, PERSON, OR ENTITY SUBJECT TO U.S. EXPORT RESTRICTIONS, INCLUDING THOSE PERSONS AND ENTITIES THAT MATCH THE CRITERIA SET FORTH IN (A), (B), OR (C) ABOVE, AND (3) THAT NEITHER THE UNITED STATES BUREAU OF INDUSTRY AND SECURITY, NOR ANY OTHER U.S. FEDERAL AGENCY, HAS SUSPENDED, REVOKED, OR DENIED YOUR EXPORT PRIVILEGES.

YOU SHALL INDEMNIFY, DEFEND AND HOLD ALL (CO)AUTHORS OF THIS PRODUCT, AND APPLICABLE INTELLECTUAL-PROPERTY OWNERS, HARMLESS FROM AND AGAINST ANY AND ALL LIABILITY, DAMAGES, LOSSES, SETTLEMENTS, PENALTIES, FINES, COSTS, EXPENSES (INCLUDING REASONABLE ATTORNEYS' FEES), DEMANDS, CAUSES OF ACTION, CLAIMS, ACTIONS, PROCEEDINGS, AND SUITS, DIRECTLY RELATED TO OR ARISING OUT OF YOUR USE, INABILITY TO USE, COPYING, (RE)DISTRIBUTION, IMPORT AND/OR (RE)EXPORT OF THIS PRODUCT (OR PORTIONS THEREOF) AND/OR YOUR BREACH OF ANY TERM OF THIS LICENSE.

IF YOU ARE NOT SURE WHETHER YOU UNDERSTAND ALL PARTS OF THIS LICENSE OR IF YOU ARE NOT SURE WHETHER YOU CAN COMPLY WITH ALL TERMS AND CONDITIONS OF THIS LICENSE, YOU MUST NOT USE, COPY, MODIFY, CREATE DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY PORTION(S) OF IT. YOU SHOULD CONSULT WITH A LAWYER.

IF (IN RELEVANT CONTEXT) ANY PROVISION OF THIS LICENSE IS UNENFORCEABLE, INVALID, OR PROHIBITED UNDER APPLICABLE LAW IN YOUR JURISDICTION, YOU HAVE NO RIGHTS UNDER THIS LICENSE AND YOU MUST NOT USE, COPY, MODIFY, CREATE DERIVATIVE WORKS OF, NOR (RE)DISTRIBUTE THIS PRODUCT, NOR ANY PORTION(S) THEREOF.