A long time ago, internet was a single space…
Until recently, internet was full of enthusiasts who believed in freedom of expression.
Time inevitably absorbs entropy, structuring any environment. This is the case with Internet.
At this time, Internet is torn apart by inter-corporate and government conflicts.
Large corporations consume any initiative that could provide an advantage in cyber conflicts.
The level of technological penetration has changed the very essence of the worldview.
In an effort to defend against impending threats, network segment operators are building barriers to protect information.
Information... which never becomes the highest value, freely convertible into any benefits of civilization.
We have implemented a method that allows you to transfer data from device to device with a high degree of security, bypassing barriers and intermediate servers.
Our service creates a p2p portal for direct file transfer from computer to computer, tablet or smartphone. There is no need for additional programs, everything happens here and now.
Press the button Create new tunnel - and you will receive a unique code for entering.
The person on the other hand enters the same code - and an ephemeral tunnel is established between you, through which files are directly transferred.
The lifetime of the code for creating a tunnel is 30 minutes, after which it becomes invalid.
Each tunnel is protected with a one-time password and PAKE is a specific password-authenticated key exchange method to establish an encrypted connection. In this case, the password itself is not transmitted over the network in any form.
Verification is similar to zero knowledge proof, in which the recipient can verify the validity of a statement without any other information from the sender.
To generate a common encryption key, session descriptions are exchanged with DTLS certificate fingerprints, which are used to encrypt connections.
Transferring files via peer-to-peer tunnel is faster and safer than mail, FTP, Dropbox, link shortening service, USB stick or SSH/scp or other methods.
Information about your data transfer cannot be intercepted by providers, certification authorities, and others. It is impossible to brute force or accidentally find the code It is not possible to wedge into the transmission.
No restrictions. No control.
We did our best to make the portal work safely and reliably, but ... using any service on Internet you take the risks and consequences of such actions in full and our service is no exception.
Good luck and may a stable connection be with you!