Frequently Asked Questions
Is my data safe when using these tools?
Yes. The encoder/decoder and PGP key generator run entirely inside your browser using JavaScript — nothing is transmitted to any server. The port checker does make a server-side TCP connection to the host you specify, but it only tests connectivity and does not store the results.
What is the difference between URL encoding and Base64?
URL encoding (percent encoding) transforms characters that are unsafe or reserved in URLs — such as spaces, ampersands, and hashes — into their %XX hexadecimal equivalents. Base64 converts arbitrary binary data into a set of 64 printable ASCII characters, making it suitable for embedding binary content (like images or files) inside text-based formats such as HTML, JSON, or email headers.
What can I use PGP keys for?
PGP (Pretty Good Privacy) key pairs are used to encrypt and digitally sign data. Common uses include encrypting sensitive emails so only the intended recipient can read them, signing software releases to prove authenticity, and securing file transfers. The public key is shared openly; the private key is kept secret and protected by a passphrase.
Why would a port show as filtered rather than closed?
A filtered port does not respond at all — a firewall or network device is silently dropping packets before they reach the host. A closed port, by contrast, actively sends back a TCP reset (RST) packet, confirming the host is reachable but nothing is listening on that port. Filtered results typically indicate a firewall rule is in effect.
Which algorithm should I choose for PGP key generation?
For most users, ECC (Curve25519) is the modern recommended choice — it produces smaller keys that are faster to use while offering equivalent security to much larger RSA keys. RSA remains the most widely compatible option and is a safe choice for any PGP software. If maximum compatibility with older systems is a priority, choose RSA 2048 or RSA 4096.
How do I find which ports my system is currently using?
On Windows, open Command Prompt and run netstat -an. On macOS or Linux, use netstat -an or ss -tuln in the terminal. These commands list all active connections and ports in the LISTEN state, giving you a clear picture of what services are exposed.