Security

When it comes to something this simple, there's no need to try to use redundent encryption methods to trick laymen into thinking our implementation is more secure than it is.

All we have to do is handle the conversion on the device, and suddenly encryption and network interception is no longer of concern.

With this tool, none of your images ever leave your device. You can check this by using the Chrome Developer Tools or the developer tools of the browser you're using right now by right clicking the page, and clicking the "Inspect Element", "Inspect Source", or similar terminology and watching the network calls when you execute a conversion.