PrivateBurn logo
Global Open App
Security model Zero-knowledge, burn-after-read

Encryption happens client-side. The server stores only ciphertext and never sees the key.

Deployment SaaS, private cloud, or on-prem
Operational trust No third-party runtime dependencies
Use cases Passwords, PII, and cryptographic material
Retention Deleted after first access or when the link expires
Why teams choose it

It removes the permanent record created when people send secrets over email, chat, or ticketing systems.

How it works

AES-256-GCM encryption in the browser, link fragment key isolation, and one-time retrieval.

Who it fits

Core value

One product, adapted for different operational needs

Zero-knowledge by design

The decryption key stays in the URL fragment, so the server never receives it.

Ephemeral transfer

Data is deleted after the first access or after the chosen expiry window passes unread.

Auditable deployment

Minimal stack, no runtime package sprawl, and clean deployment paths for managed or sovereign installs.

What matters most

Deployment models

Buy the control model that matches your risk profile

The same product can be delivered as a hosted tool, a managed isolated environment, or an internal deployment.

Hosted SaaS

Fastest route for individuals and small teams that want secure sharing without infrastructure work.

Managed instance

Dedicated isolated environment with updates and uptime handled for you.

On-prem or private cloud

For regulated environments that need network control, internal review, or residency guarantees.

Pricing

FAQ

Questions teams ask before deployment

Does PrivateBurn replace email or chat?

No. It replaces the unsafe act of putting secrets into systems that retain searchable history.

Can we deploy it inside our own environment?

Yes. Private cloud, isolated instances, and on-premise deployment are all part of the model.

What is actually stored on the server?

Only encrypted bytes. The decryption key stays on the client side in the link fragment.

Next step