Send it once.
Then it's gone forever.
Create encrypted links that self-destruct after one view — or on a schedule you control. Built for teams that need audit trails, compliance, and zero-knowledge security.
Start with 20 free links this month — no credit card required
Trusted by security teams sharing credentials, legal docs, and API keys across
Dashboard
Welcome back
// See It In Action
Watch a secure link in 30 seconds
From secret to ashes. No accounts, no installs, no trace.
Starting demo...
// How It Works
Dead simple. Dead secure.
An old spy technique reimagined for the enterprise. Four steps. Zero accounts for recipients.
Upload Your Secret
Drop files or paste text. The content scanner checks for personal information, health data, and sensitive keywords before anything leaves your browser.
Encrypt
Everything is end-to-end encrypted with AES-256-GCM in your browser. Enterprise organizations can manage their file collection keypair through AWS KMS, Azure Key Vault, or GCP KMS. The server stores only ciphertext — never plaintext.
Share
Send via email or copy the secure link. Share it over any channel. The link itself reveals nothing. No account required for recipients.
Self-Destruct
Set expiry by time, view count, or download limit — the link burns on whichever triggers first. Every destruction produces a signed receipt your auditors can verify offline.
“You know how your employees share passwords, API keys, and legal docs over email? Those emails sit in Exchange forever. Any admin, any compromised account, any subpoena — they're all exposed. CIPH4 gives them a secure link. One view. Then it's gone. Even we can't retrieve it.”
// Security
Trust nothing. Encrypt everything.
A hybrid security architecture: zero-knowledge encryption for sharing, customer-controlled encryption for file collection, and enterprise-grade controls for compliance and monitoring.
Key Management (BYOK)
Two modes for your organization’s file collection keypair: CIPH4-managed or Cloud KMS (AWS KMS, Azure Key Vault, GCP KMS). Shared secrets are always encrypted client-side with AES-256-GCM — keys live in the URL fragment and never reach the server.
Access Restrictions
Apply watermarks, disable printing, block downloads, and disable access at any time. Granular controls ensure your files stay under your authority even after sharing.
Content Scanner
Analyzes your content in your browser before encryption and recommends security settings — passphrase protection for credentials, shorter expiry for sensitive documents, view limits for confidential files. No plaintext ever leaves your device.
Security Alerts & Auto-Disable
Six detection rules on every access: IP scanning, geo-anomaly, brute force, rapid access, link forwarding, and time-zone mismatch. Threats auto-disable the link and alert your team in real time.
SSO Enforcement & SCIM Provisioning
Enforce single sign-on with popular identity providers (Azure AD, Okta, Google, and more). Automatically add and remove users as they join or leave your organization.
Encrypted File Requests
Request files from anyone — no account needed. Share a secure upload link, and recipients upload directly into your encrypted workspace. Inbound file collection with end-to-end encryption.
7 Compliance Framework Templates
Built-in policy templates and health dashboards for SOC 2, HIPAA, GDPR, ISO 27001, NIST 800-53, FedRAMP, and CMMC. Executive-branded PDF reports included.
Tamper-Evident Audit & Deletion Receipts
Every event is SHA-256 hash-chained — tampering with one row breaks the chain, detectable instantly. Enterprise burns produce Ed25519-signed deletion receipts your auditors can verify offline with our public JWKS.
Zero-Knowledge Architecture
Zero-knowledge for shared secrets — we store only ciphertext and cannot decrypt your data. File collection uses envelope encryption where your organization controls the decryption key via BYOK or CIPH4-managed wrapping.
Don't trust us — verify it yourself. Enterprise deletions come with a cryptographic receipt you can independently verify.
// Use Cases
Every department has secrets.
Current solutions are clunky, expensive, or insecure. CIPH4 fixes all three.
Stored forever, accessible by IT admins, subpoena-able
Encrypted ZIP
Clunky — people share the password in the same email
Secure FTP
Expensive, slow onboarding for external users
Signal / WhatsApp
Not auditable, not enterprise-approved
Securely share security reports with external researchers
Send confidential documents to opposing counsel
Securely deliver termination packets and credentials
Share security audit logs with external vendors
Give auditors one-time access to evidence
Share data rooms with bidders — track who viewed what
// Pricing
Simple pricing. No secrets there.
Start free. Upgrade when your team needs audit logs, analytics, compliance, and enterprise security.
Free
Secure Sharing for Individuals
Free forever
Get StartedGET FREE IF YOU:
- •Need to share passwords or keys occasionally
- •Want zero-knowledge encryption without paying
- •Are evaluating CIPH4 for your team
Key Features:
- 20 secure links/month
- 10 MB file size
- 1 GB storage
- 1h or 24h expiry
- Passphrase protection
- Audit log
Teams
End-to-End Security for Growing Teams
Per month
Start NowGET TEAMS IF YOU:
- •Share credentials with team members daily
- •Need analytics and audit trails for compliance
- •Want API access and CSV exports
Everything in Free, plus:
- 250 secure links/month
- 100 MB file size
- 50 GB/seat storage
- 1h, 24h, or 7d expiry
- File requests
- Departments
- API key access
- CSV export
Enterprise
Full Compliance & Access Control Suite
Per month · Minimum 10 users
Start Nowor request a demo →GET ENTERPRISE IF YOU:
- •Must meet SOC 2, HIPAA, or GDPR requirements
- •Need SSO, SCIM, and org-wide policies
- •Require cryptographic deletion receipts
Everything in Teams, plus:
- Unlimited secure links
- 1 GB file size
- 500 GB/seat storage
- SSO (SAML / OIDC)
- SCIM provisioning
- Compliance suite (SOC 2, HIPAA)
- Deletion receipts
- DRM protection
- BYOK key management
- Custom branding & SMTP
- Webhooks
- Dedicated support
The cost of not securing shared secrets
The average data breach costs $4.45M (IBM, 2023). CIPH4 Enterprise for a 50-person team costs $2,450/month — less than the cost of a single compromised credential in an incident response. Every password pasted in Slack is a breach waiting to happen.
All prices are per seat, billed monthly. No annual commitment required.
Need a custom plan? Talk to sales
Built for Developers
Full REST API covering every feature. Automate secure sharing in your pipeline.
REST API
API key authentication. Create and manage drops, file requests, and compliance data programmatically. Endpoints covering every major feature.
Webhooks
Real-time HTTP callbacks when links are viewed, burned, or expire. Trigger your own workflows without polling.
Slack Integration
Create secure links and receive view notifications directly in Slack channels. No context switching.
OpenAPI Spec
Full OpenAPI 3.0 specification. Generate client libraries in any language. Detailed request and response schemas.
Stop pasting secrets into Slack.
Create your first encrypted link in under 10 seconds. One view, then it's gone. No credit card required.