Send it once. Then it's gone forever.

Create zero-knowledge encrypted messages that self-destruct after a single view. No accounts, no logs, no way to recover. The ultimate in ephemeral communication.

How Burn-After-Reading Works

1

Paste Your Secret

Type or paste any sensitive content -- passwords, API keys, private notes, or confidential instructions.

2

Encrypted in Your Browser

AES-256-GCM encryption happens entirely client-side. The server never sees your plaintext data.

3

Share the Link

Send the generated URL to your recipient. The decryption key is embedded in the URL fragment (#), never sent to the server.

4

Viewed Once, Then Destroyed

The moment the recipient opens the link, the ciphertext is permanently deleted from the database. No second chances.

What Happens Server-Side

Server only stores ciphertext

Your message is encrypted before it leaves your browser. The server receives and stores only indecipherable ciphertext -- it has no ability to read your content.

Permanent deletion on first view

When the recipient opens the link, the ciphertext is permanently deleted from the database. It is not merely marked as read or soft-deleted -- the record is removed entirely.

Encryption key never touches the server

The decryption key lives exclusively in the URL fragment (the part after #). Browsers never send URL fragments to web servers -- this is enforced by the HTTP specification itself.

When to Use Burn-After-Reading

Sharing Credentials

Send login credentials, database passwords, or SSH keys to a colleague without leaving them sitting in a Slack channel or email thread forever.

One-Time Codes

Share 2FA backup codes, recovery phrases, or temporary access tokens. The self-destruct ensures they cannot be retrieved by a third party after the intended recipient reads them.

Sensitive Instructions

Deliver deployment procedures, server configurations, or private operational details that should not persist beyond their immediate use.

Whistleblowing

Transmit sensitive information with the assurance that no server-side copy remains after the recipient views it. Zero-knowledge encryption means even CloakBin cannot read the content.

How CloakBin Compares

CloakBin BurnSignal DisappearingOne Time Secret
Encryption typeZero-knowledge (client-side AES-256)End-to-end (Signal Protocol)Server-side encryption
Self-destruct methodDeleted from DB on first viewTimer-based auto-deleteDeleted after first view
Requires accountNoYes (phone number)Optional
Open sourceYesYesYes
Custom expiryYes (time + burn)Timer onlyLimited

Frequently Asked Questions

Can you recover a burned paste?

No. Once a burn-after-reading paste is viewed, the ciphertext is permanently deleted from the database. There are no backups, no audit logs, and no recovery mechanism. This is by design.

Is the link reusable?

No. The link works exactly once. After the first view, any subsequent visit to the same URL will show a "paste not found" message. The data no longer exists on the server.

What about screenshots?

Burn-after-reading protects data at rest (on the server) and in transit (via encryption). It cannot prevent a recipient from taking a screenshot or copying the decrypted text. No digital tool can prevent that.

Send a Self-Destructing Message Now

Zero-knowledge encryption. One-time viewing. No accounts required.

Create Burn-After-Reading Paste

Related Pages