Security

Security

Passwords, tokens, and keys fly through work chats every day. Burnotes lets you hand over a secret once — without leaving a trail in your message history.

The problem

Every day, passwords, tokens, API keys, and server credentials fly through work chats and email. Someone drops a production key into Slack. Someone sends an admin password over Telegram "for five minutes." Someone notes it down to themselves so they won't forget.

It's convenient. But it isn't temporary.

A message in a chat app isn't a note that disappears. It's a record:

Anyone who later gets access to even one of those copies gets the password too. A year from now. Five years. Long after you've forgotten you ever sent it.

The cost of a mistake

Leaks don't happen because of weak passwords. They happen because passwords end up in places they shouldn't be.

You won't move the budget at Microsoft. But you can stop leaving secrets in your message history.

How Burnotes works

The idea is simple: the server should not know what you're sending.

When you create a secret, everything happens in your browser:

  1. Your browser generates a random key. No one but you ever sees it.
  2. It uses that key to encrypt your text with AES-256-GCM. Only the encrypted string travels to the server — without the key, it can't be read.
  3. The server stores two pieces: the encrypted text and a fingerprint of the access token. The third piece — the key itself — is placed in the link after the # symbol.

The link looks like this:

https://burnotes.app/s/abc123#xyz789

The part after # is called the fragment. Browsers are designed so that the fragment is never sent to the server. This isn't our invention — it's been part of how the web works since the late nineties. The fragment stays on your device and is used only locally.

What that means in practice:

When the recipient opens the link, their browser pulls the key out of the #, downloads the encrypted text, and decrypts it locally in the browser. After the first view, the server deletes the record. It cannot be recovered — not by us, not by you.

A password on top of the link

If there's a chance the link could reach the wrong person, put a password on the secret when you create it. Then the link alone isn't enough — without the password, it stays sealed.

How it works:

The point is to send the link and the password through different channels. Link in Slack, password by voice or SMS. If one channel leaks, the attacker is left with encrypted noise.

What Burnotes doesn't do

Technology doesn't replace common sense.

Burnotes removes one specific risk — the trail in your message history. No more, no less.