In the world of cybersecurity, there is a mantra: "Trust, but verify".

When you use an online tool to send a password or an API key, you are placing trust in that company. But have you ever wondered who holds the key to decrypt that message?

The answer defines the difference between a "secure" tool and a private tool. This is where the battle between Server-Side Encryption and Client-Side Encryption comes in.

Today we are going to explain client side encryption and why, if you take security seriously, it is the only acceptable architecture.

The Traditional Model: Server-Side Encryption

Most web applications work like this:

  1. You write your secret in a form.
  2. You click "Send".
  3. The data travels via HTTPS (secure in transit) to the company's server.
  4. The server receives the data, encrypts it, and saves it in its database.

The Problem: The server has the key.

In this model, the company managing the service could technically read your data if they wanted to, if a rogue employee accessed the database, or if a court order forced them to hand over the keys.

Is OneTimeSecret safe?

This is a common question. Classic tools like OneTimeSecret have worked under the model where the link is generated on the server. While they are respectable tools and generally secure against external attackers, they are not "Zero Knowledge". Technically, they process your secret on their servers before saving it. This introduces a single point of failure: trust in the provider.

The Evolution: Client-Side Encryption

This is where Nurbak changes the game through Zero Knowledge Sharing.

In this model, encryption happens in your browser, before any data leaves your computer.

How the Nurbak flow works:

  1. You write your secret in the browser.
  2. Nurbak uses your browser's Web Crypto API to generate a unique encryption key.
  3. Your secret is encrypted locally. It turns into unintelligible text.
  4. Nurbak sends only the encrypted text to the server. The decryption key is never sent to the server.
  5. The key is added to the link as a "fragment" (the part after the # in the URL).

Technical Fact: Web browsers never send the "hash" (#) part of a URL to the server. This mathematically guarantees that Nurbak never sees the key needed to read your secret.

Why "Zero Knowledge" is Superior

By using a Client-Side architecture like Nurbak's, you get three insurmountable advantages:

1. Subpoena-Proof Privacy

If an authority demanded Nurbak to reveal the content of your notes, we couldn't do it. We only have encrypted garbage data. We don't have the key; you have the key (in the link).

2. Protection Against Data Breaches

If hackers managed to enter Nurbak's servers and steal the entire database, they would get nothing useful. Without the keys (which never touched the server), the data is mathematically impossible to read.

3. Technical Trust, Not Blind Trust

You don't need to take our word for it. Being client-side encryption, you can inspect the Javascript code in your browser and verify that the data leaves encrypted.

Technical Comparison

FeatureServer-Side (Traditional)Client-Side (Nurbak)
Who encrypts the data?The Company's ServerYour Browser
Who has the key?The company (and you)Only you (in the link)
Can the provider read it?Technically, yesMathematically, no
Privacy LevelTrust in the companyZero Knowledge

Conclusion: Demand Client-Side Encryption

In 2025, using a tool that encrypts data on the server to share secrets is an unnecessary risk. Current web technology allows for robust encryption directly in the browser.

When you use a tool to share passwords, ask yourself this question: "If the owners of this website wanted to read my secret, could they?"

  • If the answer is "yes" (or "maybe"), look for an alternative.
  • If the answer is "no, because they don't have the key", then you are in the right place. You are on Nurbak.

Want to try true Zero Knowledge?

Generate an encrypted link in your browser right now. We can't read it, and neither can hackers.