A Stateless Client-based Privacy-first Application With Zero Servers, Zero Dependencies, Zero Data Collection, and Zero Knowledge of Your Data • Symmetric Encryption • Asymmetric Encryption • Plausible Deniability • Decoy File Generator • Offline
Military-grade AES-256-GCM + ECDH P-384 asymmetric encryption that runs entirely in your browser.
No accounts. No uploads. No telemetry. No trust required.
Just open the file and it works offline.
https://github.com/ZeroDeadDrop/ZeroDeadDrop.git
- You get true forward secrecy (asymmetric mode) without needing Signal, PGP, or any app install
- You can give someone your public key once and they can encrypt for you forever, no passphrase sharing ever again
- Plausible deniability is built in (symmetric mode): the decoy password shows innocent files, the real password shows your actual data
- Everything is wiped from RAM after 5 minutes of inactivity or page close (5-pass overwrite + memory pressure)
- Single HTML file approximately 1.4 MB — save it, air-gap it, burn it to USB, email it, whatever
- Works in Chrome and Firefox with limited mobile support and more coming (Standard and Safer security levels)
| Feature | Symmetric (passphrase) | Asymmetric (public key) | Notes |
|---|---|---|---|
| AES-256-GCM | Yes | Yes | Per-chunk unique IV + salt |
| PBKDF2 key derivation | Yes | No | 300k to 10M iterations, SHA-256/512 |
| ECDH P-384 + forward secrecy | No | Yes | Ephemeral keys destroyed after encrypt |
| Multiple recipients | No | Yes | Encrypt once, many can decrypt |
| Compression (gzip) | Yes | Yes | Applied before encryption |
| Chunked processing (4 MB max) | Yes | Yes | Large-file friendly |
| Manifest + bundle system | Yes | Yes | Auto-split for huge payloads |
| Plausible deniability / decoys | Yes | No | Hidden volume + fake files |
| Memory sanitization | Yes | Yes | 8-32 MB adaptive pressure + 5-pass wipe |
| Auto-purge after inactivity | Yes | Yes | 5 minutes default |
| CSP | Partial | Partial | unsafe-inline required (single-file design) |
| Offline | Yes | Yes | No network at all |
In Plausible Deniability mode, the app generates one real encrypted set and one fake encrypted set. A forensic analyst can see two encrypted payload structures. They cannot distinguish which is real, but they can detect that two exist.
So: plausible deniability works psychologically, not cryptographically, for now. For normal use you still have a seamless experience. But in PD mode specifically it is not technically a single hidden container internally. This is something being actively worked on.
- Open ZeroDeadDrop.html
- Click Generate Asymmetric Keypair
- Save your private key somewhere very safe (password manager or offline storage)
- Copy your public key and send it to anyone who should be able to encrypt files for you
You never need to do this step again.
Asymmetric mode (recommended — no passphrase hassle)
- Paste the receiver's public key
- Enable Asymmetric Mode
- Optionally add more recipients
- Add files or text and click Start Encryption
- Send the manifest and bundle(s) via any channel, even an insecure one
Symmetric mode (classic passphrase)
- Enter a strong passphrase (16+ characters recommended)
- Add files or text and click Start Encryption
- Send the manifest, bundle(s), and passphrase via separate channels
- Open the same HTML file
- Import the manifest and bundle(s)
- Paste your private key (asymmetric) or passphrase (symmetric)
- Decrypt and download your files immediately
✅ Strong primitives (Web Crypto AES-GCM + ECDH P-384)
✅ Forward secrecy in asymmetric mode
✅ Memory sanitization + auto-purge
✅ No external dependencies, no network calls ever
Use for non-state-level-threat data until an independent audit is completed.
Licensed under the ZeroDeadDrop Software License v1.0
(see LICENSE.md for full terms)
Free for personal and non-commercial use. Attribution required. No warranty.
Commercial use, redistribution, or derivative works: contact ZeroDeadDrop@gmail.com
🐦 X / Twitter: @TheRedDressNeo (main announcements and general chaos because it is a conspiracy account)
📧 Email: ZeroDeadDrop@gmail.com
Love it? Hate it? Found a bug? Want to sponsor an audit? Just say hi.
Kerckhoffs's principle: a system should remain secure even if everything about it is known except the key.