CipherOnce
CipherOnce
FeaturesHow it worksSecurity
CipherOnce
CipherOnce

Built for privacy-conscious users. Zero-knowledge architecture designed from day one — your secrets stay yours, permanently.

AES-256-GCM EncryptedZero Server KnowledgeOpen SourceNo Data Retention
Open source on GitHub

Product

  • How it works
  • Features
  • Security
  • Create Secret
  • User Manual

Company

  • About
  • Privacy Policy
  • Terms of Service
  • Security Disclosure

© 2026 CipherOnce. All rights reserved.

All systems operational
vs. OneTimeSecret

A Safer One-Time Secret Alternative

One-time secret sharing is a great idea. But most implementations leave a critical gap: your secret exists in plaintext on the provider's server, even briefly. CipherOnce closes that gap entirely through true zero-knowledge architecture.

The Gap in Traditional One-Time Secret Services

Services like OneTimeSecret popularized the concept of ephemeral sharing — send a secret, it's gone after viewing. For its time, this was a significant improvement over email. But it has a fundamental architectural limitation that many users don't realize.

In most traditional implementations, you submit your plaintext to the service. The service then encrypts it — server-side, using a key the service controls. This means there is a window, however brief, where your unencrypted secret exists on someone else's infrastructure. And the encryption key is held by the provider.

Server-side encryption with provider-held keys is not zero-knowledge. It is trust-based security.

What CipherOnce Does Differently

  • Browser-first encryption: Your secret is encrypted in your browser before submission. Our server receives only ciphertext — never plaintext, not even transiently.

  • Keys we never see: The AES-256 decryption key is embedded in the URL fragment (#). Browsers never transmit URL fragments to servers. We are structurally unable to access your key.

  • Verifiable open source: You don't have to trust our claims. Our encryption logic is open source — read it, audit it, fork it. Zero-knowledge by code, not by promise.

  • Breach-proof architecture: If our servers were compromised, attackers would find encrypted blobs without the keys needed to decrypt them. The data is useless without the URL.

  • No account required: Anonymous use is a first-class feature, not an afterthought. Sharing secrets should never require your identity.

Side-by-Side Comparison

FeatureTraditionalCipherOnce
Encryption locationServer-sideBrowser (client-side)
Key storageProvider holds keyNever stored server-side
Plaintext on serverYes (briefly)Never
Open sourceUsually notYes
Breach impactSecrets exposedUseless ciphertext only
Account requiredSometimesNever required

No account required · Free forever · Open source