Client-side encryption
Files are sealed with AES-256 in your browser. Only recipients with your shared keys can decrypt—servers never see plaintext.
Wisteria is a privacy-first file platform: files are encrypted before they leave your device, keys never touch our servers, and smart anomaly detection flags suspicious downloads and logins.
Built to feel familiar, designed to be private.
Files are sealed with AES-256 in your browser. Only recipients with your shared keys can decrypt—servers never see plaintext.
We can’t access your content or keys. RSA/ECC key exchange distributes access without exposing secrets to our infrastructure.
SHA-256 hashing confirms every byte. Recipients automatically verify files before opening to prevent silent corruption.
Role-based permissions, expiring links, and one-click revoke. Share confidently with clients, classmates, or your team.
We surface unusual behaviour—bulk downloads, odd hours, or risky locations—so you can react before data walks.
Drag-and-drop uploads, instant link sharing, previews, and comments. Powerful security without the friction.
We generate a unique AES-256-GCM key per file and encrypt before upload.
The file key is wrapped with the recipient’s public key (RSA/ECC) and stored as ciphertext.
SHA-256 hashes ensure what’s downloaded is exactly what you uploaded.
Revoke links, set expiries, limit devices, and track access in real-time.
AI flags unusual logins, bulk downloads, or risky locations before data walks.
AES-256-GCM for file data, per-file keys, PBKDF for passphrases, secure RNG.
RSA-OAEP or X25519 for fast, safe sharing. Keys never leave the client in plaintext.
Readable activity trails, download counts, and sign-ins. Export for compliance.
Cloudflare edge + Wisteria origin, updated in real time.
Checking Cloudflare…
Ping to your site every 10s
Checking application health…
Create a free account and upload your first encrypted file in under a minute.
No. Files are encrypted in your browser with AES-256-GCM. The keys never reach our servers in plaintext.
We generate an encrypted file key and wrap it with the recipient’s public key (X25519/RSA-OAEP). You can set expiry and revoke anytime.
Because of zero-knowledge design, we can’t recover it. Add recovery options (hardware key, recovery codes) in account settings.