I built Encrypter, a static browser-only text encryption tool that turns secrets into shareable ciphertext (links/QR), keeps crypto in the Web Crypto API, and never sends your plaintext to a server.I built Encrypter, a static browser-only text encryption tool that turns secrets into shareable ciphertext (links/QR), keeps crypto in the Web Crypto API, and never sends your plaintext to a server.

I Built a Tiny Browser-Only Encryption Tool Because I Don’t Trust Your Backend

2025/12/09 04:35
9 min read
For feedback or concerns regarding this content, please contact us at [email protected]

\ We copy secrets into random websites way more often than we like to admit.

API keys. Recovery phrases. Draft contracts. Love letters. \n And every time, there’s that little voice in your head:

I got tired of that voice. So I built Encrypter, a tiny static site that lets you encrypt and decrypt text entirely in your browser, with no backend, no database, no login, and no tracking.

This post is the story behind it, how it works, and some of the trade-offs I made along the way.

The Problem: “Just paste your secret here…”

I live in a world of:

  • crypto wallets and seed phrases
  • API keys and webhooks
  • private notes I don’t want to park in some random SaaS

When you google “encrypt text online”, you’ll find plenty of existing tools, and many of them are perfectly fine for a lot of people. They just make different trade-offs: some are integrated with accounts and cloud storage, some rely on a backend service, some focus on rich features and collaboration rather than being as small and transparent as possible.

I realized that my personal ideal looked a bit different:

  • Client-side only: all crypto in JavaScript, in my browser.
  • No backend at all: static hosting, no database to leak.
  • Zero accounts: you show up, paste, encrypt, leave.
  • Shareable by design: ciphertext should be easy to share as text, link, or QR.

So I turned this into a tiny side project: Encrypter.

What Encrypter Actually Does

The one-sentence version:

No servers touching your plaintext. No login. No account history.

The flow is intentionally minimal.

1. Encrypt

  • Go to the Encrypt tab.
  • Paste or type any text:
  • a private note
  • a recovery phrase (ideally split across multiple tools or contexts)
  • a config snippet
  • Choose a password (this is your key; if you lose it, it’s gone).
  • Click Encrypt.

You get:

  • A block of ciphertext (random-looking characters).
  • Depending on your implementation options:
  • copy the ciphertext as text
  • turn it into a shareable link
  • encode it into a QR code

At no point does the plaintext leave your browser.

2. Decrypt

  • Go to the Decrypt tab.
  • Paste the ciphertext (or open a link that pre-fills it for you).
  • Type the password.
  • Click Decrypt.

If the password and ciphertext match, you get your original text back. If not, you get an error and your secret stays secret.

There’s also a separate “Decrypt from QR code” route, which lets you upload a QR image containing ciphertext and then decrypt it with a password — again, all locally.

Why Being “Just a Static Site” Matters

Encrypter runs as a static website:

  • Hosted on a static host (like Vercel/Netlify/etc.).
  • No application server.
  • No database.
  • No user state.

From a threat-model perspective, that’s surprisingly powerful:

  • There’s no “encryption API” endpoint to intercept.
  • There’s no database cluster full of everyone’s secrets.
  • If someone compromises the backend, there’s nothing valuable to steal except the static files themselves.

You can still attack the static files, of course. If someone tampers with the JavaScript, they could, in theory, exfiltrate plaintext or passwords. So the security story still includes:

  • Using HTTPS
  • Trusting DNS / hosting
  • Inspecting the source or self-hosting if you’re paranoid

But at least you’re not trusting a mysterious backend process that you can’t inspect at all.

Under the Hood: Browser Crypto, Not Custom Math

There’s an important rule when building anything that touches security:

Encrypter uses the browser’s Web Crypto API under the hood, instead of rolling some “fun little cipher” in JavaScript.

A simplified version of the flow looks like this (pseudo-code):

// 1) Turn a password into a key using a KDF (e.g. PBKDF2) async function deriveKeyFromPassword(password, salt) { const enc = new TextEncoder(); const baseKey = await crypto.subtle.importKey( "raw", enc.encode(password), { name: "PBKDF2" }, false, ["deriveKey"] ); return crypto.subtle.deriveKey( { name: "PBKDF2", salt: salt, iterations: 100000, hash: "SHA-256", }, baseKey, { name: "AES-GCM", length: 256, }, false, ["encrypt", "decrypt"] ); } // 2) Encrypt a text string async function encryptText(plaintext, password) { const enc = new TextEncoder(); const data = enc.encode(plaintext); const salt = crypto.getRandomValues(new Uint8Array(16)); const iv = crypto.getRandomValues(new Uint8Array(12)); const key = await deriveKeyFromPassword(password, salt); const ciphertext = await crypto.subtle.encrypt( { name: "AES-GCM", iv: iv, }, key, data ); // Encode salt + iv + ciphertext into a single string (e.g. Base64) return encodeToString({ salt, iv, ciphertext }); }

On decrypt:

  1. Parse the encoded package.
  2. Re-derive the key from password + salt.
  3. Call crypto.subtle.decrypt with AES-GCM.
  4. Turn bytes back into a string.

The password never leaves the browser. The plaintext never leaves the browser. Only the encoded salt + iv + ciphertext might be copied, shared, or turned into a link/QR.

Links and QR Codes: Sharing Ciphertext, Not Secrets

One of my goals was: “make secrets easy to share without sharing secrets”.

That’s where links and QR codes come in.

The idea is simple:

  • The ciphertext (the random-looking blob) gets URL-encoded and put into a query parameter, e.g.:

https://encrypter.site/#/decrypt?c=ENCRYPTED_BLOB_HERE

  • When someone opens that URL:
  • The site reads the c parameter from the URL.
  • It pre-fills the “Ciphertext” textarea on the Decrypt screen.
  • The user still has to type the password manually.

So the URL is useless without the password, but extremely convenient with it.

QR codes

QR codes are just another way to carry the ciphertext (or the link that contains it).

  • Encrypt → generate a QR code from the ciphertext (or from the shareable link).
  • Later → Decrypt from QR code: upload/scan the QR, extract ciphertext, ask for password, decrypt locally.

This is handy in a few scenarios:

  • You want to move a secret between offline/online devices.
  • You want to give someone a printed QR but never send the plaintext over chat.
  • You are allergic to typing long ciphertext strings by hand.

Again, the guarantee is: no server ever sees your plaintext. The server only ever needs to serve static JS, CSS, and HTML.

Why Not Use PGP, Signal, or ?

Important confession: \n Encrypter isnot trying to replace mature, audited tools like:

  • PGP/GPG
  • Signal
  • Keybase
  • age, sops, etc.

Those tools have much deeper security properties, community scrutiny, and feature sets.

Encrypter is intentionally:

  • Small in scope: text in, ciphertext out.
  • UX-first: dead simple for non-technical people to use.
  • Infrastructure-minimal: just a static site.
  • Perfect for “I need something right now” scenarios.

If your threat model includes:

  • Nation-state adversaries,
  • Physical device compromise,
  • Targeted supply-chain attacks on the hosting,

…you’ll still want the full power of mature cryptographic tools.

But if your threat model is closer to:

  • “I’m tired of throwing my secrets into random web forms”
  • “I need a quick way to share something sensitive with a friend or colleague”
  • “I want to store notes in a place I don’t fully trust, but encrypt them first”

…then Encrypter sits in a nice spot between “do nothing” and “set up a full PGP workflow”.

What I Learned Building It

A few things this side project reinforced for me:

1. Web Crypto is good enough for real things

The Web Crypto API is a bit verbose, but it’s:

  • standardized
  • implemented natively
  • significantly safer than using random NPM “crypto” packages

Once you wrap it with a small utility layer, it’s perfectly usable for tools like this.

2. Static sites are underrated for security tools

We love shipping “APIs for everything”, but for some categories, no backend is the best backend.

Static hosting + client-side logic means:

  • less code
  • fewer moving parts
  • fewer opportunities to leak

It doesn’t solve everything, but it’s a great baseline for this kind of tool.

3. UX matters, especially for security

If encryption feels heavy or confusing, people will:

  • reuse weak passwords
  • copy plaintext into convenient but unsafe places
  • bypass protections entirely

A simple interface (“Encrypt”, “Decrypt”, password, done) lowers the friction enough that people might actually use it in everyday life.

Limitations and Honest Disclaimers

No tool is magic, and Encrypter is no exception. A few honest disclaimers:

  • If you forget your password, your data is gone. There’s no “reset password” link. That’s the point.
  • If your device is compromised, your secrets are, too. Keyloggers, screen recorders, and malicious browser extensions — client-side tools can’t protect against an already-owned machine.
  • If the site is ever tampered with, that’s a risk. You’re trusting DNS, hosting, and that the JavaScript you load is the one I actually wrote. \n (If you’re paranoid: save the page locally and run it offline.)
  • It’s focused on text. You can copy/paste anything that’s text, but this isn’t a full “encrypted file storage” solution (at least not yet).

I’d Love Your Feedback

Encrypter started as “I just want something I can trust for my own secrets,” but now that it’s live, I’d genuinely love feedback from other developers, security folks, and anyone who cares about privacy.

If you try it and think:

  • “This piece of UX is confusing.”
  • “This threat model assumption is naive.”
  • “You should really support use case X.”

—I want to hear it.

Suggestions on features, crypto defaults, copywriting, or even visual design are all welcome. My goal is not to build a giant platform, but to make a small, understandable, view-sourceable tool that people actually feel comfortable using.

Try It Yourself

If you’ve ever hesitated before pasting a secret into a random website, this tool is for you.

  • Visit: https://encrypter.site (or whatever URL you configure).
  • Paste something you care about.
  • Give it a strong password.
  • Encrypt it, copy the ciphertext, and send that instead.

Whether you adopt Encrypter, fork it, or roll your own, I hope this story nudges you to think a bit more carefully about where your secrets live — and who really needs to see them.

\

Market Opportunity
Threshold Logo
Threshold Price(T)
$0.006079
$0.006079$0.006079
-2.58%
USD
Threshold (T) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

WOW Activities Centre Emerges as Bintan’s Premier Family Destination

WOW Activities Centre Emerges as Bintan’s Premier Family Destination

Discover WOW Activities Centre in Bintan's Lagoi Bay, offering premier family-friendly water sports and land adventures in a safe, scenic lake setting. Perfect
Share
Citybuzz2026/03/27 19:40
Lovable AI’s Astonishing Rise: Anton Osika Reveals Startup Secrets at Bitcoin World Disrupt 2025

Lovable AI’s Astonishing Rise: Anton Osika Reveals Startup Secrets at Bitcoin World Disrupt 2025

BitcoinWorld Lovable AI’s Astonishing Rise: Anton Osika Reveals Startup Secrets at Bitcoin World Disrupt 2025 Are you ready to witness a phenomenon? The world of technology is abuzz with the incredible rise of Lovable AI, a startup that’s not just breaking records but rewriting the rulebook for rapid growth. Imagine creating powerful apps and websites just by speaking to an AI – that’s the magic Lovable brings to the masses. This groundbreaking approach has propelled the company into the spotlight, making it one of the fastest-growing software firms in history. And now, the visionary behind this sensation, co-founder and CEO Anton Osika, is set to share his invaluable insights on the Disrupt Stage at the highly anticipated Bitcoin World Disrupt 2025. If you’re a founder, investor, or tech enthusiast eager to understand the future of innovation, this is an event you cannot afford to miss. Lovable AI’s Meteoric Ascent: Redefining Software Creation In an era where digital transformation is paramount, Lovable AI has emerged as a true game-changer. Its core premise is deceptively simple yet profoundly impactful: democratize software creation. By enabling anyone to build applications and websites through intuitive AI conversations, Lovable is empowering the vast majority of individuals who lack coding skills to transform their ideas into tangible digital products. This mission has resonated globally, leading to unprecedented momentum. The numbers speak for themselves: Achieved an astonishing $100 million Annual Recurring Revenue (ARR) in less than a year. Successfully raised a $200 million Series A funding round, valuing the company at $1.8 billion, led by industry giant Accel. Is currently fielding unsolicited investor offers, pushing its valuation towards an incredible $4 billion. As industry reports suggest, investors are unequivocally “loving Lovable,” and it’s clear why. This isn’t just about impressive financial metrics; it’s about a company that has tapped into a fundamental need, offering a solution that is both innovative and accessible. The rapid scaling of Lovable AI provides a compelling case study for any entrepreneur aiming for similar exponential growth. The Visionary Behind the Hype: Anton Osika’s Journey to Innovation Every groundbreaking company has a driving force, and for Lovable, that force is co-founder and CEO Anton Osika. His journey is as fascinating as his company’s success. A physicist by training, Osika previously contributed to the cutting-edge research at CERN, the European Organization for Nuclear Research. This deep technical background, combined with his entrepreneurial spirit, has been instrumental in Lovable’s rapid ascent. Before Lovable, he honed his skills as a co-founder of Depict.ai and a Founding Engineer at Sana. Based in Stockholm, Osika has masterfully steered Lovable from a nascent idea to a global phenomenon in record time. His leadership embodies a unique blend of profound technical understanding and a keen, consumer-first vision. At Bitcoin World Disrupt 2025, attendees will have the rare opportunity to hear directly from Osika about what it truly takes to build a brand that not only scales at an incredible pace in a fiercely competitive market but also adeptly manages the intense cultural conversations that inevitably accompany such swift and significant success. His insights will be crucial for anyone looking to understand the dynamics of high-growth tech leadership. Unpacking Consumer Tech Innovation at Bitcoin World Disrupt 2025 The 20th anniversary of Bitcoin World is set to be marked by a truly special event: Bitcoin World Disrupt 2025. From October 27–29, Moscone West in San Francisco will transform into the epicenter of innovation, gathering over 10,000 founders, investors, and tech leaders. It’s the ideal platform to explore the future of consumer tech innovation, and Anton Osika’s presence on the Disrupt Stage is a highlight. His session will delve into how Lovable is not just participating in but actively shaping the next wave of consumer-facing technologies. Why is this session particularly relevant for those interested in the future of consumer experiences? Osika’s discussion will go beyond the superficial, offering a deep dive into the strategies that have allowed Lovable to carve out a unique category in a market long thought to be saturated. Attendees will gain a front-row seat to understanding how to identify unmet consumer needs, leverage advanced AI to meet those needs, and build a product that captivates users globally. The event itself promises a rich tapestry of ideas and networking opportunities: For Founders: Sharpen your pitch and connect with potential investors. For Investors: Discover the next breakout startup poised for massive growth. For Innovators: Claim your spot at the forefront of technological advancements. The insights shared regarding consumer tech innovation at this event will be invaluable for anyone looking to navigate the complexities and capitalize on the opportunities within this dynamic sector. Mastering Startup Growth Strategies: A Blueprint for the Future Lovable’s journey isn’t just another startup success story; it’s a meticulously crafted blueprint for effective startup growth strategies in the modern era. Anton Osika’s experience offers a rare glimpse into the practicalities of scaling a business at breakneck speed while maintaining product integrity and managing external pressures. For entrepreneurs and aspiring tech leaders, his talk will serve as a masterclass in several critical areas: Strategy Focus Key Takeaways from Lovable’s Journey Rapid Scaling How to build infrastructure and teams that support exponential user and revenue growth without compromising quality. Product-Market Fit Identifying a significant, underserved market (the 99% who can’t code) and developing a truly innovative solution (AI-powered app creation). Investor Relations Balancing intense investor interest and pressure with a steadfast focus on product development and long-term vision. Category Creation Carving out an entirely new niche by democratizing complex technologies, rather than competing in existing crowded markets. Understanding these startup growth strategies is essential for anyone aiming to build a resilient and impactful consumer experience. Osika’s session will provide actionable insights into how to replicate elements of Lovable’s success, offering guidance on navigating challenges from product development to market penetration and investor management. Conclusion: Seize the Future of Tech The story of Lovable, under the astute leadership of Anton Osika, is a testament to the power of innovative ideas meeting flawless execution. Their remarkable journey from concept to a multi-billion-dollar valuation in record time is a compelling narrative for anyone interested in the future of technology. By democratizing software creation through Lovable AI, they are not just building a company; they are fostering a new generation of creators. His appearance at Bitcoin World Disrupt 2025 is an unmissable opportunity to gain direct insights from a leader who is truly shaping the landscape of consumer tech innovation. Don’t miss this chance to learn about cutting-edge startup growth strategies and secure your front-row seat to the future. Register now and save up to $668 before Regular Bird rates end on September 26. To learn more about the latest AI market trends, explore our article on key developments shaping AI features. This post Lovable AI’s Astonishing Rise: Anton Osika Reveals Startup Secrets at Bitcoin World Disrupt 2025 first appeared on BitcoinWorld.
Share
Coinstats2025/09/17 23:40
Vietnam has arrested several suspects accused of manipulating the prices of ONUS-related tokens.

Vietnam has arrested several suspects accused of manipulating the prices of ONUS-related tokens.

PANews reported on March 27 that, according to Cointelegraph, the Vietnamese Ministry of Public Security has arrested several suspects linked to the cryptocurrency
Share
PANews2026/03/27 19:50