Home / Protect
The universal way to password-protect files.
Password-protect any file. No accounts, no installs, no platform lock-in. SentinelLolge encrypts files entirely in your browser and generates a self-unlocking HTML page that anyone can open on any device, operating system, or browser.
How It Works
- Pick a file — drag and drop or browse to select any file you want to protect.
- Set a password — choose a memorable password. It never leaves your device.
- Share the output — download a single HTML file that your recipient opens in any browser to unlock.
Key Features
- AES-256-GCM authenticated encryption with Argon2id key derivation
- 100% client-side — your files never leave your browser
- Self-unlocking HTML output with preview or download control
- Works offline after the initial page load
Why It Fits
Built for confidential documents, internal team shares, private uploads, and password-protected deliverables. Protection stays attached to the file even when it moves across inboxes, drives, or offline handoffs.
Pricing
Choose the level of control your files need.
Start with self-protected sharing for free. Upgrade when you need more control after the file leaves you: larger exports, stronger rules, customization, and team accountability.
Base
Free protection for everyday sharing, with offline unlock files, no recipient account requirement, and lightweight limits for anonymous or account-based use.
Plus
Sensitive sharing with larger exports, stricter access flows, recipient verification, read-only delivery, branded unlock experiences, and control that survives handoff.
Business & Pro
Planned tiers for teams and higher-trust environments that need policy, governance, integrations, larger workflows, white-label delivery, and advanced security posture.
Contact
Real support for the files you cannot afford to mishandle.
Use-case guidance, support requests, privacy questions, and billing issues. One channel. Real humans. No support maze.
Use-case Guidance
Need to know whether SentinelLolge fits contracts, financials, internal docs, or private files? Ask directly and describe the workflow you need to control.
Workflow Issues
If something breaks, include browser details and the shortest reproducible description you can so the issue can be verified and fixed quickly.
Security & Privacy
Trust-model, privacy, and compliance questions are welcome. Support contact: support@lolge.in.
Privacy Policy
Privacy by design, not by promise.
SentinelLolge is built as a protection layer for digital files, not as a platform that needs to see them. The normal website workflow keeps file contents local while account and billing metadata stay limited to what is needed for access and operations.
Core File Handling
The standard protection flow and generated offline unlock experience rely on local browser processing with AES-256-GCM encryption and Argon2id key derivation.
Account Data
If you create an account, the product may store your email address, account identifiers, plan state, entitlement metadata, and billing operations metadata to restore access correctly.
Operational Boundaries
SentinelLolge is not designed around ad-tech tracking. Product analytics, if added, are intended for conversion, reliability, diagnostics, and support rather than third-party ad surfaces.
Terms
Clear boundaries for a product built around control.
SentinelLolge provides client-side file protection tools and related account-linked services. Browser compatibility, preview support, plan availability, and feature scope can vary as the launch-stage product evolves.
Compatibility
Offline unlock files are designed for modern Chrome, Safari, Firefox, and Edge releases, but performance can vary by device hardware, browser version, storage, memory, and local browser restrictions.
User Responsibility
You are responsible for the files you protect, the passwords you create, and the compliance obligations that apply to your use. Critical workflows should be tested on the intended recipient environment.
Security Expectations
SentinelLolge is designed to improve confidentiality and preserve control after sharing, but no software can guarantee perfect security in every environment or preserve every experimental behavior over time.