Secure Message Sharing
with proof that a sensitive secret was retrieved, by the right person, just once, and securely.
How It Works
1. Encrypt the Secret
You enter a secret and a decrypt key. It's encrypted in your browser — we never see it.
2. Share the Link
We give you a one-time link. You send it and the decrypt key via trusted channels (e.g. Signal, email).
3. Recipient Unlocks
They open the link, enter the key, and decrypt the secret — all in their browser.
4. Logged & Burned
We log the time and IP. The secret is deleted after one view. You get a receipt as proof it was accessed.
🔑 Use Cases
Domain AUTH Code Transfer
Share domain transfer codes with buyers — and get proof they accessed it.
Handing Over Passwords or Logins
Send credentials to clients, teammates, or vendors — safely, with a log of when they were retrieved.
Sending Gift Card Codes
Share digital gift card codes securely with recipients and get confirmation when they've been claimed.
Software License Keys
Distribute premium software licenses to customers with verification of delivery and activation.
Legal or Financial Document Unlock Codes
Send document passwords (e.g. PDF encryption) and verify when they've been opened.
Temporary Access for Contractors
Share a password, PIN, or SIM unlock code with short-term workers — with one-time view and audit trail.