Frequently Asked Questions

Frequently Asked Questions

What files can you recover?

We currently support ZIP, RAR, and PDF files - the most common formats where users forget their passwords. ZIP files include standard PKZIP and encrypted ZIP-AES formats. RAR support covers both RAR3 and the more secure RAR5 formats. For PDFs, we handle various encryption levels from RC4-40 to AES-256. We're actively developing support for Microsoft Office documents (Word, Excel, PowerPoint) which will be available in future updates. Our focus remains on the most requested file formats to ensure the highest quality recovery service.

How long does recovery take?

Recovery time varies significantly based on several factors: password length, character complexity, encryption difficulty, and your chosen attack method. Simple passwords on Easy encryption (PKZIP, PDF RC4) might be recovered in minutes using dictionary attacks. Medium encryption (ZIP-AES, RAR3) typically takes hours to days. Hard encryption (RAR5, PDF-AES-256) with complex passwords can take days or may be impossible to crack in reasonable time without password hints. Dictionary attacks are faster but limited to common passwords, while brute force attacks guarantee coverage but require exponentially more time as password length increases. For detailed time estimates, visit our How It Works page.

How much does recovery cost?

We use a transparent two-tier pricing model based on encryption difficulty. You pay a low initial Start Fee that covers computational resources for your custom attack setup: Easy encryption (€2.00 for 25 min), Medium encryption (€2.99 for 35 min), or Hard encryption (€4.99 for 45 min). This fee is charged regardless of outcome because server resources are consumed during the attempt. If recovery succeeds, a Success Fee is charged before revealing your password: Easy (€9.99), Medium (€12.99), or Hard (€17.99). This pay-per-success model minimizes your upfront risk - you only pay the full amount if we actually recover your password.

What if recovery fails?

If we cannot recover your password within the allocated time and selected attacks, you won't be charged the success fee - only the initial start fee applies. The start fee is non-refundable because computational resources, electricity, and server time were already consumed during your recovery attempt. You can try again with different attack methods or parameters if you'd like. For Hard encryption files, we recommend providing any password hints you remember to improve success chances, as random brute force has very low probability of success.

Is this legal?

Yes, our service is completely legal when used for legitimate file access - specifically recovering passwords for your own files. We designed this service strictly for ethical password recovery where users have lost access to their own documents. Using this service to access others' files without explicit permission is illegal and constitutes unauthorized access under computer crime laws in most jurisdictions. We have zero tolerance for misuse and employ automated detection systems to identify and reject suspicious requests. Any illegal or unethical use is strictly prohibited and will be reported to authorities.

How do you ensure privacy?

Your privacy and data security are our top priorities. All files are encrypted during upload using industry-standard TLS encryption. Files are processed in isolated, secure server environments with no human access. Your uploaded documents and any recovered passwords are automatically deleted from our servers within 48 hours after processing completion or failure. We never store, share, or sell your data to third parties. Our system is designed with privacy-by-default architecture, ensuring your sensitive information remains protected throughout the entire recovery process.

Can I cancel a recovery in progress?

Yes, you can cancel an ongoing recovery attempt at any time through your status page. However, the initial start fee remains non-refundable because computational resources were already allocated and consumed during the processing time before cancellation. If you cancel before any significant progress, you won't be charged the success fee. We recommend letting the full attack window complete, as passwords are often found near the end of dictionary or brute force attempts.

What payment methods do you accept?

We accept all major credit and debit cards (Visa, Mastercard, American Express, Discover) processed securely through Stripe, a industry-leading payment processor with PCI-DSS Level 1 certification. We also accept PayPal for added convenience and buyer protection. All transactions are encrypted and secure. We never store your payment information on our servers - all payment data is handled exclusively by our trusted payment partners.

Do you store recovered passwords?

Recovered passwords are stored in encrypted format for 30 days after successful recovery to allow you time to access and save them. After 30 days, all password data is permanently deleted from our systems with no possibility of recovery. We strongly recommend saving your password immediately upon successful recovery and storing it securely in a password manager. We cannot retrieve your password after the 30-day period expires.

What happens to my files?

All uploaded files follow a strict automatic deletion policy. Your encrypted file is stored securely during the recovery process only. Within 48 hours after processing completion (success or failure), all files are automatically and permanently deleted from our servers. This includes the original uploaded file, any temporary working files, and processing logs. We maintain no backup copies. This automatic deletion ensures your sensitive documents remain private and are not retained longer than absolutely necessary.

Can I improve success chances?

Absolutely! The more information you provide about your password, the higher the success rate. When customizing attack parameters, include any details you remember: approximate password length, character types used (lowercase, uppercase, numbers, symbols), possible words or names included, common patterns you use, or any partial password fragments. For Hard encryption files, this information is crucial - a targeted mask attack with password hints can achieve near 100% success, while random brute force has minimal chance. Use the custom mask builder to create patterns matching your password style.

What encryption types do you support?

We support a wide range of encryption standards across different file formats. For ZIP files: traditional PKZIP encryption (very fast recovery) and ZIP-AES 128/256-bit encryption. For RAR files: RAR3 encryption and the newer, more secure RAR5 with AES-256. For PDF files: RC4 40/64/128-bit encryption (older, faster to crack) and AES 128/256-bit encryption (modern, more secure). Each encryption type has different computational requirements, which is why we categorize them into Easy, Medium, and Hard difficulty levels with corresponding pricing.

Why are some encryptions marked as 'Hard'?

Modern encryption algorithms like RAR5 and PDF-AES-256 are intentionally designed to be computationally expensive to crack. These 'Hard' encryptions use advanced cryptographic techniques that require massive computational resources and time to brute force. A single password attempt on RAR5 can take 10,000x longer than on older PKZIP encryption. This is why dictionary attacks become impractical for Hard encryption - even testing millions of common passwords can take days. For Hard encryption, success depends heavily on targeted attacks using password hints or patterns you remember. Without hints, success rate drops below 15% for random attempts.

Can you guarantee password recovery?

No, we cannot guarantee success, and we're transparent about this. Password recovery success depends on multiple factors: encryption strength, password complexity, length, randomness, and the attack methods you select. For Easy encryption with common passwords, success rates are high (60-80%). For Hard encryption with truly random passwords, success without hints is unlikely. This is why we use a fair pricing model - you only pay the full amount if we actually succeed. The initial fee covers our computational costs regardless of outcome, which is standard in the password recovery industry.

What makes your service different from competitors?

Our key differentiators are transparency, customization, and ethical focus. Unlike competitors with hidden pricing, we show exact costs upfront based on encryption difficulty. We give you full control over attack methods and parameters - you're not locked into a one-size-fits-all approach. Our custom mask attack builder is particularly powerful for users who remember password patterns. We're privacy-focused with automatic file deletion and no data retention. Most importantly, we have strict ethical policies against misuse, with automated detection systems to prevent illegal access attempts. We're building a service we'd want to use ourselves.