CipherOnce
CipherOnce
FeaturesHow it worksSecurity
CipherOnce
CipherOnce

Built for privacy-conscious users. Zero-knowledge architecture designed from day one — your secrets stay yours, permanently.

AES-256-GCM EncryptedZero Server KnowledgeOpen SourceNo Data Retention
Open source on GitHub

Product

  • How it works
  • Features
  • Security
  • Create Secret
  • User Manual

Company

  • About
  • Privacy Policy
  • Terms of Service
  • Security Disclosure

© 2026 CipherOnce. All rights reserved.

All systems operational
Zero-Knowledge · End-to-End Encrypted

Secrets Shared Once.
Gone Forever.

CipherOnce encrypts your passwords, API keys, and confidential messages client-side — generating a self-destructing link that vanishes after one view or expiration. No server ever sees your plaintext.

AES-256-GCM Encryption
Zero Server Knowledge
Self-Destructs on Access
No Tracking · No Logs
The Problem

Your tools were never
built for secrets.

Every time you paste a password into Slack or email an API key, you're creating a permanent record that lives in server logs, backups, and breach databases — invisible to you, accessible to attackers.

Real-World Breach Scenario

A developer shares database credentials via Slack. Six months later, an attacker gains access to the workspace. The message was "deleted" — but message retention exports are recoverable. Full database compromise follows within hours.

Email Inboxes

Messages persist indefinitely across backups, servers, and third-party integrations — long after you think they're gone.

Chat & Slack

Workspace breaches expose years of message history. Deleted messages are recoverable by platform administrators.

Cloud Storage

Shared drives retain version history. A single permission misconfiguration can expose sensitive data to anyone.

CipherOnce eliminates the attack surface entirely.

Secrets expire. Links self-destruct. Nothing persists.

How It Works

Three steps. Absolute security.

Military-grade protection that takes seconds to set up.

01

Encrypt Locally

Your secret is encrypted directly in your browser using AES-256-GCM before any data leaves your device. The server receives only ciphertext — never plaintext.

02

Share the Link

A unique, time-limited URL is generated. The decryption key is embedded in the URL fragment (#) — never transmitted to our servers. Only the link holder can decrypt.

03

Self-Destructs

After the recipient views the secret — or upon expiration — the encrypted payload is permanently deleted from all storage. No recovery. No residue.

Technical Implementation

Built on cryptographic fundamentals

AES-256-GCM Encryption

Industry-standard authenticated encryption with 256-bit keys and a unique IV per secret.

Client-Side Key Derivation

Encryption keys are generated locally and embedded in the URL fragment, never sent to any server.

Zero Server-Side Knowledge

Our infrastructure stores only ciphertext. Without the URL fragment, no one — including us — can decrypt your data.

Guaranteed Deletion

Atomic deletion on first access. Database entries are purged immediately; no soft-deletes or recovery paths exist.

Features

Enterprise-grade security.
Zero friction.

Every feature engineered for security professionals and teams who can't afford to compromise.

Core Security

AES-256-GCM Encryption

Every secret is encrypted client-side with the gold standard in authenticated encryption — the same algorithm used by the U.S. government for classified data.

Privacy

Zero-Knowledge Architecture

Our servers receive only ciphertext. The decryption key travels exclusively in your URL fragment, invisible to our infrastructure and network logs.

View Source →
Control

Flexible Expiration

Set secrets to expire in 1 hour, 24 hours, 7 days, or on first view. Choose what fits your threat model. Expired data is deleted automatically.

Ephemeral

One-Time Access

Configure any secret for single-view destruction. The moment someone opens it, the ciphertext is purged from storage — unrecoverable by anyone.

Versatile

File & Text Sharing

Share plaintext messages, passwords, API keys, or encrypted file attachments up to 100MB. Full end-to-end protection for every format.

Awareness

Access Notifications

Receive an instant alert the moment your secret is accessed. Know exactly when your data was viewed without compromising zero-knowledge guarantees.

Anonymous

No Registration Required

Start sharing in seconds with no account, no email, no tracking. Your identity is never linked to your secrets.

Transparent

Open Source

Our encryption implementation is fully open-source and independently auditable. Trust through verification, not promises.

View Source →
Developer

API Access

Integrate CipherOnce into your CI/CD pipeline, secret rotation workflows, or custom tooling via our clean REST API.

Use Cases

Trusted across industries.
Built for professionals.

From solo developers to Fortune 500 security teams, CipherOnce handles the secrets that matter most.

Developers & DevOps

Ship secrets safely.

  • Share API keys and tokens during onboarding without email traces
  • Rotate credentials securely across distributed teams
  • Pass database passwords through CI/CD without logging exposure
  • Send SSH private keys with guaranteed single-use destruction
  • Deliver environment variables for staging and production
Enterprises & Compliance

Meet your audit requirements.

  • Enforce least-privilege access with time-bounded secrets
  • Satisfy SOC 2, HIPAA, and ISO 27001 data handling policies
  • Replace insecure email attachments with encrypted ephemeral links
  • Provide auditable, access-logged secret delivery
  • Reduce insider threat exposure with automatic expiration
Teams & Individuals

Privacy for everyone.

  • Share Wi-Fi passwords without messaging history risk
  • Send confidential documents to contractors or partners
  • Distribute account credentials during transitions
  • Exchange sensitive personal information without permanence
  • Share temporary access codes with zero residue
Security Architecture

Transparency is
our security model.

We don't ask you to trust us. We show you the architecture and let you verify it yourself.

01

Client-Side Encryption

Encryption happens entirely within your browser using the Web Crypto API before any data is transmitted. We use AES-256-GCM — an authenticated encryption mode that guarantees both confidentiality and integrity. A unique 256-bit key and 96-bit IV are generated for every single secret.

https://cipheronce.com/s/abc123xyz#AES256GCM-key-never-sent-to-server
02

Zero Server-Side Knowledge

The decryption key is embedded exclusively in the URL fragment (the # portion). URL fragments are never transmitted to web servers by design — it's a browser standard. Our infrastructure receives only ciphertext that it cannot decrypt under any circumstance, including lawful government requests.

03

Immutable Audit Trail

Every access event is cryptographically logged — not to surveil you, but to ensure atomic deletion. The moment a one-time secret is accessed, the deletion is executed in the same database transaction as the read. There is no window where both reading and retention can coexist.

04

Guaranteed Ephemeral Storage

CipherOnce uses strict TTL (time-to-live) enforcement at the storage layer. Expired secrets are purged during the next cleanup cycle with no soft-delete or recovery path. Our data retention policy is zero for expired content — this is enforced at the infrastructure level, not application logic.

Independently Auditable

Our complete encryption implementation is open-source. Security researchers, auditors, and curious developers are welcome to review and verify every claim.

Comparison

Why not just use
email or chat?

General-purpose communication tools were not designed with secrets in mind. The difference is architectural, not cosmetic.

Security Feature
Email / Chat
CipherOnce
End-to-end encryption
Zero server-side knowledge
Self-destructing messages
No data retention after expiry
No registration required
Immune to server-side breaches
One-time access enforcement
URL-embedded decryption key
Access notifications
Open-source & auditable

CipherOnce was built exclusively for secrets — not retrofitted from a general-purpose tool.

FAQ

Questions worth asking
before you share.

AES-256
Encryption standard
0
Data retained after expiry
100%
Client-side encryption
Open
Source & auditable

Your secrets deserve better
than an inbox.

Join thousands of developers, security teams, and privacy-conscious professionals who use CipherOnce to share what matters — once, safely, without a trace.

No signup required
No tracking
Free forever