Security at Fairsend
Privacy is not a feature for us — it is the architecture. Every design decision ensures your data stays protected.
🔒 Encryption
What does "End-to-End" mean?
Encryption starts in your browser and only ends in the recipient's browser. Along the entire path — including our servers — the data exists only as unreadable strings. No employee, no administrator and no attacker can decrypt the files.
What does "Zero-Knowledge" mean?
The decryption key is generated exclusively in your browser and only exists in the download link. It is technically never transmitted to our servers. This means: even if someone were to compromise our server, they could not read your files.
🇩🇪 Infrastructure & Data Sovereignty
What we deliberately don't use
No Google Analytics, no Google Tag Manager, no external CDNs, no ad trackers, no social media plugins, no external font services in production. Our entire infrastructure is self-hosted. Every external dependency is a potential data leak — that's why we eliminated them.
Minimal Data Collection
We only store the absolute minimum technically required for file transfer. No movement profiles, no usage tracking, no fingerprinting for advertising. When data is no longer needed, it is automatically and irrevocably deleted.
🛡️ Session Protection
Transport Layer
All communication between your browser and Fairsend is TLS-encrypted. Unencrypted connections are automatically redirected to HTTPS. Modern browser security policies prevent clickjacking, cross-site scripting and unauthorized embedding of our pages.
Session Management
Session cookies are only accessible via encrypted connections and cannot be read by scripts. After a period of inactivity, the session is automatically terminated. A new session identifier is generated upon each login.
Form Protection & Bot Defense
Every form is protected against Cross-Site-Request-Forgery (CSRF). Automated attacks and spam bots are detected and blocked through multi-layer validation before they reach our systems.
🗑️ Data Deletion & Retention
Automatic Deletion
After the selected retention period expires, all files are automatically and irrevocably deleted. There is no recycle bin, no backups of transfer data and no possibility of recovery. In the free plan, files are deleted immediately after the first download.
Proof of Delivery
During download, a cryptographic integrity proof is automatically generated — the mathematically verifiable evidence that the correct files arrived completely and unchanged at the recipient. This proof is admissible in court.
✉️ Encrypted Messages
AES-256-GCM in the browser
Messages are encrypted with AES-256-GCM in the browser. The key is transmitted via #key= in the URL fragment and never reaches the server.
Self-destruct & Zero-Knowledge
After reading, the encrypted content is irreversibly deleted. No copy, no backup, no recovery.
🇪🇺 GDPR & Compliance
Your Rights
Right to information, correction, deletion and data portability — all directly accessible in your profile settings, without waiting or support requests. Your account and all associated data can be completely deleted at any time.
For Enterprises
Teams and Enterprise plans offer a complete audit log, the four-eyes principle for sensitive transfers, geo-locking for regional access control, and role-based permissions. Ideal for industries with elevated requirements: legal, finance, healthcare, public administration.
Our Security Promise
- ✓ We cannot read your files — by design, not by promise.
- ✓ We do not sell data and do not show ads.
- ✓ We do not use external tracking services or cloud providers.
- ✓ We delete data as quickly as technically possible.
- ✓ We only store the absolute minimum needed for the transfer.
👥 Teams & Compliance
Fairsend offers enterprises dedicated security features: the four-eyes principle requires approval by a second person before sensitive transfers are delivered. Team-wide security policies ensure consistent standards — password requirements, geo-lock, and automatic deletion periods can be set centrally. Role-based access control with owner, admin, and member protects against unauthorized changes.