This temporary encrypted messaging allows exchanging secret messages that automatically disappear after 48 hours. The system uses QR codes to transport encrypted messages, ensuring maximum security since encryption is performed directly in your browser.
Technical operation:
Encryption of your messages operates entirely client-side, meaning your encryption keys never leave your device. Only already encrypted messages transit through the server, making it impossible for third parties to read them. Conversation flows are identified by a name you freely choose, and accessing messages requires simultaneous possession of the flow name and decryption key.
Practical usage:
To create a message, enter your text in the designated area, choose a flow name (for example family, secret-project, meeting) and define an encryption key. The system then generates a QR code containing the flow name and your encrypted message. This QR can be shared with your correspondents through any communication medium (email, SMS, social networks). To read a message, simply scan the QR with this application and enter the corresponding decryption key.
Conversation flows:
Messages sharing the same flow name form a temporary conversation accessible for 48 hours. All participants knowing the flow name and key can contribute to the discussion and view the complete history. This functionality allows creating ephemeral discussion groups without leaving permanent traces.
Security and confidentiality:
No sensitive data is stored in clear text on the server. Encryption keys remain local to your browser or can be saved in encrypted form if you have a user account. The system also supports complete anonymous usage, allowing exchanges without identification. Photos can also be added to flows and benefit from the same level of cryptographic protection.
Use cases:
This solution is perfectly suited for temporary confidential exchanges: communication between loved ones, event coordination, sharing sensitive information, discreet professional discussions, or any other context requiring confidentiality and ephemeral nature of exchanges.