Post-quantum encryption

Send files instantly

Drop a file, get a link. Up to 2 GB, no signup needed.

AES-256 + ML-KEMAuto-expiresNo account required

Drop files hereTap to browse files

Get a link instantly. No signup needed.

Auto-expires

~1s

Ready to share

2 GB

File size limit

0

Data we see

30d

Max retention

How it works

Four steps, start to finish.

01

Drop your file

Any type, up to 2 GB.

02

Encrypted locally

Before anything leaves your browser.

03

Split and stored

Sharded across multiple locations.

04

Share the link

Only people with the link can access it.

Under the hood

What actually happens to your file.

Key generation

A 256-bit AES key is generated entirely in your browser. Optional ML-KEM post-quantum encapsulation wraps it.

Client-side encryption

Your file is encrypted with AES-256-GCM before any data leaves your device. The key never touches our servers.

Shard distribution

The encrypted blob is split into 4 shards and uploaded to separate storage nodes. No single node holds a complete file.

Zero-knowledge link

The decryption key lives in the URL fragment (#). It never reaches our servers. Only the person you share the link with can decrypt.

The difference

You deserve better than this.

Google Drive

  • Scans every file you upload for ad targeting
  • Google holds the encryption keys, not you
  • Files live on their servers permanently
  • Tied to your Google account, everything is tracked

Dropbox

  • Employees can access your files if requested
  • Encryption keys are controlled by Dropbox, not you
  • History of data breaches (68M accounts in 2012)
  • Shares data with third parties for analytics

WeTransfer

  • Files sit on their servers completely unencrypted
  • Anyone with the link can download, zero access control
  • Free tier deletes after 7 days but keeps metadata
  • No end-to-end encryption on any plan

Email attachments

  • 25 MB limit, useless for real files
  • Stored in plaintext on every server it touches
  • Your ISP, their ISP, and both email providers can read it
  • Stays in inboxes forever with no expiration

Snow

Encrypted before it leaves your device
You hold the key, we never see your files
Auto-deletes on your schedule
No account, no analytics, no logs

Use cases

Built for people who care about what they share.

Whistleblowing & leaks

Submit documents to journalists or oversight bodies. Auto-delete ensures nothing persists.

Edward Snowden had to set up an elaborate encrypted pipeline just to get NSA documents to journalists. With Snow, one link would have done it.

Medical records

Share lab results, prescriptions, or insurance docs without worrying who else can read them.

In 2015, Anthem's breach exposed 78.8 million medical records stored on unencrypted servers. Client-side encryption would have made the stolen data useless.

Contracts & legal

Send NDAs, signed agreements, or sensitive business documents to clients securely.

The Sony Pictures hack in 2014 leaked thousands of contracts, salary sheets, and internal emails. All stored in plaintext on their servers.

Source code

Transfer proprietary code, SSH keys, or config files between teams without exposing them.

In 2021, Twitch's entire source code and payout data leaked from an unprotected internal server. Zero-knowledge storage would have prevented the exposure.

Personal files

Send tax returns, ID scans, or private photos to family. No account required on either end.

The 2014 iCloud breach leaked private photos from hundreds of accounts. The images were stored without end-to-end encryption, making them readable by anyone with server access.

Research & journalism

Share unpublished papers, datasets, or source material that needs to stay confidential.

The Panama Papers source leaked 11.5 million documents to journalists using encrypted channels. Self-destructing links would have added another layer of protection.

Why Snow

Fast, simple, gone when you want it.

Instant links

Upload finishes, link is ready. Share it anywhere.

Works everywhere

No app, no account, no install. Just a browser.

Auto-expires

Files delete themselves. Pick 1 hour to 30 days.

Post-quantum ready

ML-KEM key encapsulation on top of AES-256. Future-proof.

File tools

More than just file sharing.

View all

Your files. Your keys. Your rules.

No account, no analytics, no compromise. Start encrypting in seconds.

Security policy