ITYLOS Guide: share a password or file via an ephemeral secure link
How to transmit a confidential secret with local encryption, single-read access and verifiable destruction.
2. Share: You send a unique link, impossible to guess.
3. Pulverize: Upon first reading, the data is physically shredded from our servers. The erasure is total.
Why not send a password by email ?
Traditional channels (Email, Slack)
- Emails stored in sent and received folders
- Slack or Teams messages indexed by search
- Messaging synced across multiple devices (Cloud)
- History kept for years
Ephemeral Link (ITYLOS)
- The secret is encrypted before leaving your device
- The generated link is valid only once
- The server destroys the file upon opening
- No plaintext trace is left on the network
Communication tools retain messages.
ITYLOS deliberately reduces the secret's lifespan.
How to use ITYLOS (Step by Step)
The ITYLOS process always follows the same confidential transmission cycle:
Create a capsule
- Set a time-based expiration (e.g.: 1 hour, 1 day).
- Optionally add an optional opening password.
- Click generate. Encryption is performed locally by your browser.
Share the secure link
https://itylos.../#cle-secrete).
Security note : The decryption key is included in the URL fragment (after the
#), which by definition is never sent to the server by the browser.
- Copy this link and send it via your usual channel (Email, Messaging, Support ticket).
Single read
- Access is temporary. As soon as the page is closed, the secret disappears from the screen.
Destruction & Proof
- If you wish, you can download a cryptographic proof attesting to this destruction for your audits.
A secret is not meant to become an archive.
When to use ITYLOS ?
Access & Credentials
Transmit an administrator password (Root, DB) or proceed with secure password sharing with an external provider.
Infrastructure
Ensure secure API key sharing, an access token (JWT), an .env file or an SSL certificate between developers.
Technical support
Temporarily transmit a client password or troubleshooting access without ever leaving a permanent trace in a software support ticket.
Confidential Files
Send a secure secret (sensitive legal document, ID scan or contract) via a secure ephemeral link.
Architecture & Security Guarantees
Confidential transmission via ITYLOS relies on strict cryptographic standards widely used in the industry (AES-256-GCM, Ed25519) :
- Local encryption : Executed by the browser (Zero-Knowledge)
- Ed25519 signatures : Used to generate tamper-proof audit proofs
- Single-read secret : Physical deletion of the server file upon opening
- Transport vector : We are a conveyor, not a cloud storage space
Limitations of any secret sharing system
- Screenshot or monitor photo by the recipient
- Manual copy-paste of the secret by the recipient into an unsecured local file
- Prior compromise of the user's workstation (e.g.: Keylogger malware)
The ITYLOS ecosystem
ITYLOS is not limited to capsule sharing. The ecosystem includes several complementary tools to manage the lifecycle of your data end-to-end.
Frequently Asked Questions (FAQ)
What is an ephemeral link ?
What is the difference between ITYLOS and a password manager ?
ITYLOS is exclusively used to transmit them to a third party securely without creating an account. Both tools are perfectly complementary.
Does ITYLOS replace Signal or Proton Mail ?
Does ITYLOS store secrets ?
How long does a capsule last ?
Can a sensitive file be sent ?
Do secrets pass in plaintext through the servers ?
# in the URL) is by definition never sent to the server by the browser.
Can a destruction be verified ?
Ready to transmit your secrets securely ?
Try ITYLOS. Create a single-read link, share it and guarantee the confidentiality of your exchanges.