
crypt.fyi
Zero-knowledge one-time secret transmission tool
Crypt.fyi is an open-source zero-knowledge secret sharing platform that uses cutting-edge ML-KEM post-quantum encryption to secure sensitive data transmission. Designed for the quantum computing era, this platform ensures your confidential information remains protected even against future quantum computer attacks that could break traditional encryption methods.
The platform operates on a strict zero-knowledge architecture where all encryption happens directly in your browser, meaning servers never access unencrypted data or decryption keys. This client-side encryption model guarantees that your sensitive information remains completely private throughout the entire sharing process.
Built for security-conscious professionals, developers, and organizations who need to share passwords, API keys, confidential documents, or other sensitive data, Crypt.fyi addresses the growing need for quantum-resistant cryptography. The platform features burn-after-reading functionality with provisions to prevent erroneous burns from bots or URL introspection, ensuring secrets are automatically deleted after viewing.
Key Features
- Post-Quantum ML-KEM Encryption: Uses NIST-standardized Module-Lattice-based Key Encapsulation Mechanism for quantum-resistant security
- Zero-Knowledge Architecture: Browser-based encryption ensures servers never see unencrypted data or decryption keys
- Burn After Reading: Automatic secret deletion after viewing with bot protection mechanisms
- Open Source Transparency: Fully auditable codebase for security verification and community contributions
- Content Security Policy: Strict CSP implementation to prevent XSS attacks and unauthorized resource loading
Who This Is For
- Security Professionals: Teams requiring quantum-resistant encryption for sensitive data sharing
- Software Developers: Engineers sharing API keys, database credentials, and configuration secrets securely
- IT Administrators: Organizations needing compliant, auditable secret transmission for compliance requirements
Common Questions
Q: How does post-quantum encryption differ from traditional encryption? A: ML-KEM encryption resists attacks from both classical and quantum computers, unlike traditional methods vulnerable to quantum computing.
Q: Can the service provider access my shared secrets? A: No, all encryption occurs in your browser before transmission, implementing true zero-knowledge architecture.
Q: What happens to secrets after they're viewed? A: Secrets are automatically and permanently deleted from servers after viewing, with safeguards against accidental deletion from bots.
Q: Is the code available for security auditing? A: Yes, Crypt.fyi is completely open-source, allowing full security audits and community contributions.
Pricing Model
Free
Tech Stack
Similar Products
-
ReAlarm
Smart Alarm Clock with Interval QR...
-
torrra
Search and download torrents straig...
-
/clean for Slack
Clean Slack history directly from y...