TECHPRO SECURE SHARE
Techpro internal tool

Send secrets and files securely, without email.

One-time links with identity verification, strong encryption, and malware scanning. Built for Techpro Security staff to exchange sensitive material with customers and partners.

Encrypted at rest
Malware scanned
One-time links
Identity verified
How it works

Three steps, nothing to install

A staff member creates a link, the recipient verifies their identity, and the content is revealed one time. The link burns after use.

1
Staff creates a link

Techpro staff creates a one-time link for a secret, a file, or a secure request. They pick a verification method — email code, text message code, or both — and optionally add a shared passphrase.

2
Recipient verifies

The recipient opens the link and enters a verification code sent to their email or phone. No account needed, no app to install.

3
Content is delivered

The secret is revealed, or the file is scanned and delivered. The link is consumed. No one can access it again.

Five ways to exchange

Built for every kind of sensitive handoff

Same security model across every flow. Staff picks what fits the job.

Send a secret

Passwords, API keys, recovery codes. Encrypted per-exchange; burns after the first successful reveal.

Send a file

Deliver up to 4 GB — scanned first, released when clean, downloaded via a short-lived signed link.

Request a secret

Give a customer a one-time link to submit a password or credential. Encrypted before it ever lands in our DB.

Request a file

Support-bundle uploads up to 4 GB. Scanned before internal access, quarantined if blocked.

Mixed request

Combine a file upload with a secret field and a note. One link, one submission, everything signed for together.

Passphrase gate

Layer an extra passphrase on top of OTP — shared out-of-band — for the highest-risk handoffs.

Secure by default

The security isn't optional

Every secret is encrypted with a unique per-exchange key. The master key lives outside the database entirely. Files are scanned for malware before anyone internal can open them.

Activity is audited row-by-row. Nothing is retained longer than necessary — terminal exchanges are purged after 30 days while their metadata stays for the audit trail.

PyNaCl + envelope encryption

Per-exchange data-encryption key, wrapped by a master key kept offline. Compromise of the database alone doesn't decrypt anything.

One-time links

Secrets burn after the first successful reveal. Files can be capped at N downloads.

Identity verification

Email OTP, SMS OTP, or both — layered with an optional passphrase share.

Files scanned

Every upload is scanned by our own ClamAV. Infected files are destroyed immediately.

Fully audited

Every view, verification, override, and delivery is logged — with a per-exchange timeline.

No raw secrets in the audit

Replayable identifiers (tokens, OTP codes, passphrases) never appear in audit rows.

Backups are hashed

Daily SQLite snapshots to a separate R2 bucket, SHA-256 verified weekly.

4 GB
Max file size
5 min
Download URL TTL
30 days
Max retention
0
Secrets in email body

Need to send something to Techpro?

This isn't a self-signup service. If a member of Techpro staff asked you to send or receive something here, they've already sent you the link. Otherwise, please contact your Techpro representative.

Contact Techpro