CipherOnce
CipherOnce
FeaturesHow it worksSecurity
CipherOnce
CipherOnce

Built for privacy-conscious users. Zero-knowledge architecture designed from day one — your secrets stay yours, permanently.

AES-256-GCM EncryptedZero Server KnowledgeOpen SourceNo Data Retention
Open source on GitHub

Product

  • How it works
  • Features
  • Security
  • Create Secret
  • User Manual

Company

  • About
  • Privacy Policy
  • Terms of Service
  • Security Disclosure

© 2026 CipherOnce. All rights reserved.

All systems operational
Privacy Policy

We Cannot See Your Secrets

Most services say they protect your privacy. CipherOnce is built so that protecting your privacy isn't a choice we make — it's a constraint we can't override. Here's exactly what we log, what we don't, and why that matters.

What 'No Content Logging' Actually Means

"We don't log your data" is a promise that requires trust. Our approach is different: we have designed our system so that logging your secret content is technically impossible, not merely against policy.

By the time your secret reaches our servers, it has already been encrypted by your browser. We receive a string of bytes that looks like random data. We don't have the decryption key. We cannot log what we cannot read.

We don't choose not to log your secrets. We architecturally cannot.

What We Store vs. What We Don't

We store (encrypted only)

  • Encrypted ciphertext blob
  • Random initialization vector
  • Expiry timestamp
  • View counter (integer)
  • Optional: file MIME type

We never store

  • Decryption keys (ever)
  • Plaintext secret content
  • Your identity (no account required)
  • Analytics tied to content
  • Backups of deleted secrets

Why This Protects You in the Real World

  • Data breach immunity: Attackers who compromise our database find only AES-256 ciphertext. Without the keys — which we don't store — it is cryptographically worthless.

  • Legal request resistance: We cannot be compelled to produce content we do not possess. A subpoena or court order requesting 'the plaintext of secret X' simply cannot be fulfilled.

  • No advertising surface: We have zero insight into what you are sharing. We could not build an advertising profile of your usage if we tried.

  • Ephemeral by default: All secrets have a hard expiry. After that point, even the encrypted record is permanently deleted — not soft-deleted, not archived.

No account required · Free forever · Open source