Our concern with our
service is to give you the
opportunity to transmit
your confidential data
securely to the recipient

WHY

In everyday business, you often need to exchange confidential data, such as username, password and/or confidential links or files with business partners or colleagues.

Many use the classic medium of e-mail for this purpose. Even if e-mail traffic is encrypted via SSL, TLS or STARTTLS, in a worst-case scenario your e-mail can be read in the event of an attack on your network or the message recipient, and the data transmitted in can be evaluated and used.

Furthermore, the recipient of message can of course forward it, which may not be desirable.

WHAT

With our service we enable you to send data and files securely and encrypted to a recipient.

You enter your data and/or files into our secure system, they are encrypted with 256 bit and generate a link that you send to the recipient. The recipient opens the link. the data is decrypted and the recipient can access the content.

The link to retrieve the data has to be opened only once. When the link is clicked, the content is displayed and the data record is completely destroyed in the background at the same time. The link is then blind and no more content is displayed.

WAY OF WORKING

Once you have logged in to our system, you can get started right away. The user interface is spartanly designed and focuses on what is necessary.

You enter your data. These are encrypted end-to-end on our server in a database. Even we as the server operator cannot see the content of the data and cannot decrypt it.
The link that decrypts the data is exclusively owned by you.

As soon as the recipient clicks on the link to retrieve the transmitted data, the content you transmitted is removed from the database and irretrievably deleted.

WOW-INSANE

You like our idea ? Just try our service for free: We will be happy to create a free account for you on identitysafe.de without any obligation.

You will be surprised how easy and functional our service works.

You like what you see and would like to use it for your company, with your own logo ? Continue reading.

WELL TRUSTED

What happens if someone hacks the database on the central computer?

Nothing at all, there are only encrypted, hyroglyphic data stored, which can not be decrypted and which even we can not see. This is only possible with the link you generated and in whose unencrypted possession only you are.

What happens it improbably, a “Man in the Middle” intercepts and reads the e-mail?

At the latest when the original recipient receives the mail with the link and no content can be retrieved because the content has already been retrieved, he will contact you.

WANT TO HAVE

We are happy to offer you the possibility to operate this service also with your logo and your design for an extra fee.

The database continues to manage for you on a specially designed server.

The user interface, i.e. the mask through which you can log in to encrypt content, is located in your individual design on the server.

Scroll to Top