Send secrets and files securely, without email.
One-time links with identity verification, strong encryption, and malware scanning. Built for Techpro Security staff to exchange sensitive material with customers and partners.
Three steps, nothing to install
A staff member creates a link, the recipient verifies their identity, and the content is revealed one time. The link burns after use.
Techpro staff creates a one-time link for a secret, a file, or a secure request. They pick a verification method — email code, text message code, or both — and optionally add a shared passphrase.
The recipient opens the link and enters a verification code sent to their email or phone. No account needed, no app to install.
The secret is revealed, or the file is scanned and delivered. The link is consumed. No one can access it again.
Built for every kind of sensitive handoff
Same security model across every flow. Staff picks what fits the job.
Passwords, API keys, recovery codes. Encrypted per-exchange; burns after the first successful reveal.
Deliver up to 4 GB — scanned first, released when clean, downloaded via a short-lived signed link.
Give a customer a one-time link to submit a password or credential. Encrypted before it ever lands in our DB.
Support-bundle uploads up to 4 GB. Scanned before internal access, quarantined if blocked.
Combine a file upload with a secret field and a note. One link, one submission, everything signed for together.
Layer an extra passphrase on top of OTP — shared out-of-band — for the highest-risk handoffs.
The security isn't optional
Every secret is encrypted with a unique per-exchange key. The master key lives outside the database entirely. Files are scanned for malware before anyone internal can open them.
Activity is audited row-by-row. Nothing is retained longer than necessary — terminal exchanges are purged after 30 days while their metadata stays for the audit trail.
Per-exchange data-encryption key, wrapped by a master key kept offline. Compromise of the database alone doesn't decrypt anything.
Secrets burn after the first successful reveal. Files can be capped at N downloads.
Email OTP, SMS OTP, or both — layered with an optional passphrase share.
Every upload is scanned by our own ClamAV. Infected files are destroyed immediately.
Every view, verification, override, and delivery is logged — with a per-exchange timeline.
Replayable identifiers (tokens, OTP codes, passphrases) never appear in audit rows.
Daily SQLite snapshots to a separate R2 bucket, SHA-256 verified weekly.
Need to send something to Techpro?
This isn't a self-signup service. If a member of Techpro staff asked you to send or receive something here, they've already sent you the link. Otherwise, please contact your Techpro representative.
Contact Techpro