End-to-end encrypted, audited, single-use by default

Send secrets like
they actually matter.

A shareable link with as many locks as your secret deserves — passwords, biometrics, USB hardware keys, NDAs, geographic limits, single-device binding. Every view watermarked, signed, and recorded.

Password Face match USB key NDA signature Geo-locked Single device Single use SMS code Email confirm

The stack

Compose protection layers per secret. Or don't.

A casual link works for a wifi password. A signed NDA gated by a face-match and a USB key works for the term sheet. Same product, same audit log, two very different gates.

Password

Bcrypt-hashed and used as part of the encryption key derivation. Without it, the content is mathematically inaccessible.

Face recognition

AWS Rekognition matches the viewer against an enrolled reference image, with quality and basic anti-spoof checks.

USB hardware key

Bind a secret to a specific USB device via WebUSB. The device must be physically present at access time.

NDA / document

Require a signed click-through or a drawn signature before content reveals. Signatures are hashed against the document.

Geographic limits

Allow only specific countries. IP-based, fail-closed when the lookup is uncertain.

Single device

The first viewer's browser fingerprint becomes the only one that can ever open this link.

Single use

Race-safe one-shot reveal. After the first view the link is gone — no replay, no second window.

Email + SMS

Per-recipient verification with 6-digit codes. Audit who proved their identity, not just who clicked.

Watermarking

Every reveal carries a unique watermark tied to the access log row. Leaks become forensically attributable.

How it works

Three steps. One link. Full audit trail.

01

Compose

Write or upload your secret in a familiar editor. Pick the protection layers it needs from a checklist.

02

Distribute

Send a link. Optionally name recipients so each one gets a personalised link with verification baked in.

03

Audit

Every view, every signature, every failed attempt is logged. Download a tamper-evident certificate per signature.

Everyday

Things you've probably texted that you shouldn't have.

Most secret-sharing isn't dramatic. It's a wifi code, a Netflix password, a crypto seed phrase, a copy of your passport. Send a link instead, pick the gates that match the stakes, walk away.

Wifi password for the houseguest

Single-use · 1-day expiry

Crypto seed phrase to yourself

Password · Single-device

Tax documents to your accountant

Email-verified recipient · 7-day expiry

Door code to a short-stay guest

Geographic · Time-windowed

Bank login to your partner

Password · Single-device

Medical results to a family member

Email + SMS · Watermarked

API keys to a freelancer

Password · Single-use

Streaming password for the kids

No gates · 30-day expiry

A one-off file your accountant lost

Single-use · Watermarked

When stakes are higher

When "send it over WhatsApp" isn't an option.

Legal & M&A

Term sheets, NDAs, due-diligence packets. Force a signature, capture identity, log every view with a hash of the document version that was actually shown.

Credentials & secrets

API keys, root passwords, recovery codes. Combine a password gate with single-use and single-device so even a forwarded link is dead on arrival.

Executive announcements

Pre-public news to a named board list. Email + SMS verification proves who saw it before any public release; watermarks make leaks attributable.

Regulated industries

Geographic limits, biometric verification, full audit trails. The guarantees compliance teams ask for, without an enterprise sales cycle.

Philosophy

What we believe about secrets.

A short list of things we hold to. If any of them ever stop being true, the whole product is broken.

We can't read your secrets either.

Content is encrypted with a key derived from your team's root + the secret's unique id + (optionally) your password. Without all three, the bytes on disk are noise. Our database alone is not enough to decrypt anything.

Defense in depth, by your choice.

One lock for trivia, ten for treasure. Each protection layer composes with the others — every step is a server-side gate, not a client-side suggestion. Skip the dramatic ones when you don't need them.

Single-use is the default for a reason.

A link that lives forever is a link that gets forwarded, screenshotted, indexed. Most things you share have a short useful life. We make the short option the easy one.

Every view is recorded.

Timestamps, IP, country, signed identity if you required one, a unique watermark embedded in the rendered content. If something leaks, the leak has a name attached.

We're honest about what we don't protect.

Screenshots happen. Compromised endpoints happen. We can't stop someone's phone from photographing the screen. We tell you what the gates protect against — and what they don't.

Pricing

Simple plans. Pay for what your secrets are worth.

Start free. Upgrade when the gates you need go past the basics.

Personal

For the wifi password and the houseguest.

Free forever
  • 20 secrets / month
  • Password, geographic, single-use, single-device
  • Email confirmation per recipient
  • 30-day audit log retention
Most teams pick this

Team

For the small team with real things to send.

CHF 12 per seat / month
  • Unlimited secrets
  • Every protection layer
  • Named recipients with email + SMS verification
  • Document acceptance & NDA signature workflows
  • 1-year audit log retention
  • Up to 10 team members
Coming soon

Enterprise

For compliance teams and regulated workloads.

Custom annual
  • Everything in Team
  • SSO / SAML
  • Configurable audit retention
  • Custom DPA & data residency options
  • Priority support
Talk to us

Pricing is finalised at launch. The Personal tier will stay free — everything that protects everyday secrets shouldn't be paywalled.

FAQ

Quick answers.

Things people ask before they sign up. If yours isn't here, drop us a line.

Can you read the contents of my secrets?

No. Content is encrypted with a key derived from your team's root secret, the link's unique id, and (optionally) your password. We never see those combined inputs and we cannot reconstruct them from the database alone. If we lost APP_KEY tomorrow, the bytes on disk would still be unreadable.

What happens if I forget my password on a secret?

The content is gone. The password is part of the encryption key derivation; without it, no one — including us — can decrypt. That is the design, not a bug. Use a password manager.

Can the recipient forward my link to someone else?

Technically yes — a link is a URL, and URLs travel. But you can stack gates that defeat forwarding: single-use (link dies on first view), single-device (only the first browser fingerprint can ever open it), named recipients with email/SMS verification (the forwarder isn't in the recipient list), or face match (the forwarder isn't the right face).

Do you log IP addresses?

Yes, on every secret access. They form part of the audit trail you can download as a signature certificate. They are retained for the period your plan specifies (30 days on Personal, 1 year on Team, configurable on Enterprise) and then purged.

Where is my data stored?

In the EU region of AWS — Frankfurt by default. Sub-processors are listed in the privacy policy. We do not transfer personal data outside the EU/EEA without a valid legal basis (standard contractual clauses or equivalent).

Are signed NDAs legally binding?

They are evidence — in many jurisdictions they meet the bar for "simple electronic signatures" under eIDAS, FADP, or equivalent. We are not a Qualified Electronic Signature (QES) provider; if you need QES for a specific document, pair us with a specialist provider for that document.

How big can my attachments be?

Up to your plan's per-secret limit (configured at launch). Large media (videos, design files) work but very large files take longer to encrypt at upload time.

Can I bring my own domain?

White-label / custom domain support is on the Enterprise tier. Talk to us if it's on your must-have list before you sign up.

Do you have an API?

Not yet at launch. The shape of an API depends on your use case — automated secret distribution looks very different from automated audit retrieval. If you have a use case in mind, tell us; the design is open.

How do I close my account?

Profile → Delete Account. We confirm with your password and your 2FA factor, then erase your data within 30 days. Audit-relevant data may persist longer where law requires it.

Stop sending sensitive things in email.

The first secret you send is free. Every secret after that is too.