CipherOnce
CipherOnce
FeaturesHow it worksSecurity
CipherOnce
CipherOnce

Built for privacy-conscious users. Zero-knowledge architecture designed from day one — your secrets stay yours, permanently.

AES-256-GCM EncryptedZero Server KnowledgeOpen SourceNo Data Retention
Open source on GitHub

Product

  • How it works
  • Features
  • Security
  • Create Secret
  • User Manual

Company

  • About
  • Privacy Policy
  • Terms of Service
  • Security Disclosure

© 2026 CipherOnce. All rights reserved.

All systems operational
Use Case · Ephemeral Messaging

Self-Destructing Messages with Real Privacy

Disappearing messages are only as good as the architecture behind them. Many apps offer a 'disappearing' toggle — but the messages pass through servers unencrypted before they're 'deleted.' CipherOnce's approach is fundamentally different.

What Makes a Message Truly Self-Destruct?

Most disappearing message features work like this: the message is sent to a server, delivered to the recipient, and then the server deletes the record after the set time. The problem? That message existed in plaintext on the server. Deletion is administrative — not cryptographic.

True self-destruction means the content was never accessible to the platform in the first place. When CipherOnce "deletes" a secret, we're removing encrypted ciphertext that we could never decrypt anyway. The meaningful deletion happened conceptually when the key was embedded in the URL instead of stored on our server.

"Deleting" a message we could read is a favor. Deleting a message we never could read is a guarantee.

How CipherOnce Achieves True Ephemerality

  • Encrypted before transmission: Your message is locked in your browser using AES-256-GCM. The server receives ciphertext — data that looks like random noise without the key.

  • Key never stored: The decryption key is only in the URL fragment. It's in your recipient's browser when they open the link. It has never been on our server.

  • Burned on access: The moment the view limit is reached, the encrypted record is permanently deleted from our database with no soft-delete, no archive, and no recovery.

  • Time-bound expiry: Even if the link is never opened, the secret expires on schedule. No secret persists indefinitely.

  • Configurable destruction: You control whether destruction triggers after 1 view, 5 views, 1 hour, or 30 days. The destruction logic is deterministic and enforced server-side.

Self-Destructing Messages in Practice

Legal & compliance teams

Share privileged information that must not persist in email archives or discovery processes.

Temporary access codes

Share 2FA backup codes, one-time PINs, or session tokens that should expire immediately after use.

Sensitive HR communications

Share performance feedback, compensation details, or personal information without creating a paper trail in chat apps.

Security incident response

Coordinate incident response credentials and access information with a guaranteed expiry, limiting exposure windows.

The Limits of Self-Destruction (Honest Disclosure)

We believe in honest security. Self-destructing messages cannot prevent a recipient from copying text or taking a screenshot before the view window closes. What we can do — and do — is minimize the exposure window dramatically, ensure the content never persists on our infrastructure, and make the link useless the moment the view limit is reached.

The goal is to reduce your attack surface. You cannot control what a recipient does with information they have received — but you can ensure the information doesn't linger in systems you don't control after delivery is complete.

No account required · Free forever · Open source