Secret creation
- You provide a secret phrase to share and a password
- Your password is hashed once with a random generated salt
- Your password's hash is used to perform AES-256 authentication with a randomlgenerated salt
- Your password is hashed a second time using the same method
- We now have your password hashed twice, the encrypted secret and the random salt
- The result is then stored on a redis database with a limited TTL (Time to live)
- You receive a unique link reprensing the above entry.
Using the link
- You send the link to someone and they visit it
- They input the password to access the data
- The password is hashed twice and compared to the stored version for this entry.
- If the password hash matches the hash of the entry then we can proceed
- Now we hash the provided password and use it to decrypt the encrypted secret
- The result is sent to the user and displayed
- We also check if the entry has reached max usage and delete it if so
Privacy
- Nothing is stored unencrypted
- Everything gets removed when the link reaches its TTL (That you set, defaults to 10 minutes)
Crafted with ❤️ by Ben Afonso