Security Basics
Understanding 25cent.cloud's core security features. Estimated read time: 3 minutes.
The 25cent.cloud Security Model
25cent.cloud is built on the principle of ephemeral storage—files that exist temporarily and then automatically disappear. This fundamental design creates a baseline security advantage: even if someone breached our systems, the data wouldn't exist for long.
Password Protection
Password protection is your first line of defense. When you set a password on a share link:
- Recipients must enter the correct password before accessing the file
- The password is never stored in plain text on our servers
- Passwords are hashed using industry-standard algorithms (bcrypt)
- You can change or remove the password anytime (if you have an account)
Expiration Times
Every 25cent.cloud share has an expiration time. After this time expires:
- The share link becomes completely inaccessible
- The file is automatically and permanently deleted from our servers
- No recovery is possible—the deletion is permanent by design
- Recipients cannot re-access even if they downloaded it previously
Expiration options range from:
- 1 hour (ideal for highly sensitive, time-critical information)
- 24 hours (default, works for most use cases)
- 3 days (for collaborative projects)
- 7 days (maximum on free tier)
- Longer periods available by request
One-Time Links
One-time links provide maximum security for critical files:
- The link can be accessed exactly once, by exactly one recipient
- After the first access, the link permanently expires
- Perfect for sharing login credentials, API keys, or confidential documents
- Prevents accidental re-sharing or unauthorized access
Self-Destruct & Anti-Screenshot
Self-Destruct lets you set a countdown timer so a page is no longer viewable after a specific time. This applies to web page views and one-time messages only.
- Set a time window before content burns
- Works best for sensitive notes or one-time messages
- Anti-screenshot protections are a deterrent, not a guarantee
How one-time links work:
- You create a share with one-time link enabled
- Recipient receives the link and accesses it once
- System records the download and marks the link as used
- Link becomes completely inaccessible to anyone else forever
Encryption in Transit and at Rest
Your files are protected at multiple layers:
| Layer | Protection | Standard |
|---|---|---|
| In Transit | HTTPS/TLS encryption during upload and download | TLS 1.2+ |
| At Rest | Files encrypted on server storage | AES-256 |
| Database | Metadata encrypted in database | AES-256 |
Access Control and Logging
We keep logs only for the service we provide and for your analytics:
- System logs related to service reliability and security
- IP logs used for customer analytics
- Download timestamps you can view in analytics
- No logs are stored about your data, file type, file size, or file names
What About My Privacy?
Beyond file security, your privacy is important to us:
- No Account Required: Share files without signup
- No Tracking: We don't track users or sell data
- Limited Metadata: We store minimal personal information
- Logs Policy: Only system logs and IP logs for analytics are kept
- No File Metadata: We do not log file names, types, sizes, or contents
What 25cent.cloud Does NOT Provide
It's important to understand the limits of our security:
- Once downloaded, we cannot control what recipients do with the file
- Passwords can be weak if chosen poorly (use strong passwords!)
- Anti-screenshot protections are a deterrent, not a guarantee
- If a recipient's device is compromised, their files could be too
- We cannot guarantee 100% security (no service can)
Security Best Practices
Follow these guidelines for maximum security:
- Use passwords for sensitive files — Always protect important documents
- Set appropriate expiration — Shorter times for more sensitive data
- Share passwords separately — Never in the same message as the link
- Check analytics — Monitor who accessed your files
- Use one-time links — For critical credentials or documents
- Educate recipients — Warn them not to re-share critical files
- Review regularly — Check your share history for unexpected access
Learn More
Ready to dive deeper into security features?