Share Secrets. Leave No Trace.
A paranoid-grade, zero-knowledge payload delivery system built for privacy advocates, journalists, and ethical hackers. Send highly secure, geofenced, self-destructing messages and files using purely client-side encryption.
Live Application · Technical Architecture · Report a Vulnerability
Standard messaging apps claim "end-to-end encryption," but they still retain your metadata, link previews, and decryption keys in their proprietary ecosystems.
ZeroKey mathematically eliminates server-side trust. By utilizing the native Web Crypto API, payloads are locked locally in the browser's RAM. Our database only stores randomized, unreadable ciphertext.
- Client-Side AES-256-GCM: Data is scrambled locally before any network request is made. If a single bit is altered in transit, decryption automatically fails.
- Zero-Knowledge Architecture (The Hash Exploit): The decryption key is generated locally and embedded inside the URL fragment (
#hash). Standard web browsers never transmit the fragment to the server. We fundamentally cannot read your data. - Burn After Reading: The exact millisecond a payload is decrypted, it is subjected to a permanent
DELETEcommand on the database. No archives, no backups. - Biometric Bot-Shield: Integrates with WebAuthn (TouchID/FaceID) to require physical human presence, preventing chat-bots (like iMessage or Slack preview bots) from accidentally triggering the payload destruction.
- Geofencing: Lock decryption to a 50-meter GPS radius. If the recipient is not at the physical location, the data self-destructs instantly.
- Frontend: HTML5, TailwindCSS, Phosphor Icons, GSAP (Animations).
- Cryptography: Native browser Web Crypto API (AES-GCM, PBKDF2, SHA-256).
- Backend / Database: Supabase (PostgreSQL & Object Storage).
- Hosting / Routing: Vercel Edge Network.
Want to run ZeroKey on your own machine or deploy your own instance?
git clone [https://github.com/kdippan/zerokey.git](https://github.com/kdippan/zerokey.git)
cd zerokeyYou will need a Supabase project to handle the encrypted blobs.
- Create a new project on Supabase.
- Create a table named secrets with columns for the id (UUID), encryptedBase64, ivBase64, etc.
- Create an open storage bucket named media for encrypted file blobs.
- Set your environment variables in your .env file or directly in your backend API functions:
SUPABASE_URL=your_supabase_url
SUPABASE_ANON_KEY=your_anon_keySince ZeroKey relies heavily on standard HTML/JS, you can serve it locally using any static server:
npx serve
python3 -m http.server 8000Open http://localhost:8000 in your browser.
ZeroKey is open-source. We welcome contributions from cryptographers, developers, and privacy researchers.
- Fork the Project.
- Create your Feature Branch (git checkout -b feature/AmazingFeature).
- Commit your Changes (git commit -m 'Add some AmazingFeature').
- Push to the Branch (git push origin feature/AmazingFeature).
- Open a Pull Request.
If you discover a potential vulnerability in the cryptographic pipeline or backend architecture, please DO NOT open a public issue.
Please contact the developer directly via the Secure Contact Form or email
Dippan.connect@gmail.com
ZeroKey is completely free, ad-free, and open-source. Maintaining the server infrastructure costs money. If this tool helps secure your data, consider supporting my late-night coding sessions.
-
GitHub Sponsors:
@kdippan -
Bitcoin (BTC): 1AV4KnX6qMiiMSUSGMq2M2fuhwLcQEra8U
-
UPI: dippan@fam
Built with ⚡ by Dippan Bhusal
© 2026 ZeroKey. All rights reserved.