AES-256-GCM encryption • Key generated locally • Key stored only in URL fragment (#k=) • We never see the encryption key
Already encrypted secret sent securely • Second layer of encryption during transmission
AES-256-GCM encryption (different key) • Double-encrypted in database • Protected even if database is compromised
Server decrypts outer layer only • Browser decrypts with key from URL • Secret displayed to recipient
The encryption key is stored in the URL fragment (after #k=), which is never sent to our servers. We have zero knowledge of your secret's contents—we literally cannot read it, even if legally compelled to do so.
This service requires modern browsers with Web Crypto API support for secure client-side encryption.
July 2014 or newer
December 2014 or newer
September 2017 or newer
January 2020 or newer (Chromium-based)
September 2014 or newer
Chrome Mobile • Safari iOS • Samsung Internet • Firefox Mobile
Web Crypto API is not supported in any version of IE
Chrome <37 • Firefox <34 • Safari <11 • Edge Legacy • Opera <24
Approximately 97% of global internet users have a browser that supports this service. If you see a warning when creating or viewing a secret, please upgrade to a modern browser.
This service uses the Web Crypto API to perform AES-256-GCM encryption directly in your browser before transmitting data to our servers.
This ensures zero-knowledge encryption - we never see your unencrypted secrets. Older browsers lack this critical security feature.