crypt.fyi - Secure Secret Sharing with Zero-Knowledge End-to-End Encryption
crypt.fyi - Secure Secret Sharing with Zero-Knowledge End-to-End Encryption
Share sensitive information securely with zero-knowledge AES-256 end-to-end encryption. Features include burn after reading, password protection, and customizable expiration times.
From an author:
I wanted to share crypt.fyi a free, open-source tool I built for securely sharing sensitive data/files. It uses client-side encryption and zero-knowledge architecture.
Key features:
Zero-knowledge architecture
End-to-end encryption using AES-256-GCM (actively investigating post-quantum encryption options)
Self-hostable
Suite of configurations (password, burn after read, max read count, ip/cidr-allow list, webhooks)
Strict rate-limiting
Strict CSP to mitigate supply chain attacks
Web, cli, and chrome-extension clients
Fully open source (Github)
The problems I aimed to solve: Many people share sensitive info (passwords, keys, etc.) through email, Slack, or SMS - which often leaves plaintext copies in multiple places. Existing solutions either require accounts, aren't open source, or have security/privacy/ui/ux/feature/config gaps/limitations.
crypt.fyi is built with privacy-first principles:
No logging of sensitive data
No analytics or tracking
Separation of web and api servers
All encryption/decryption happens client-side using shared cross-platform cryptography primitives from noble cryptography
TLS encryption for all traffic
Encrypted data is automatically destroyed after being read with strong guarantees around once-only reads
The entire codebase is open source and available for review. I'd love to get feedback from the privacy community on how to make it even better!