Documentation

ionSECRET allows for the encryption and transmission of confidential information. The information self-destructs after a single access. The application's use is intuitive. Simply enter the secret and encrypt it. Then, transmit the link to the encrypted message via email or chat. The link is designed for single use only.

What should be considered when transmitting confidential information?

  • If a more secure method for the transfer of information (e.g., an in-person meeting, an end-to-end encrypted message, or a shared password management system) is available, this method should be given preference.
  • ionSECRET can be used to transmit information independently of the sender and recipient.
  • Procedure:
    1. Enter the confidential information into the text field and click Encrypt message .
    2. You are provided with a URL. Transmit this via email or text message to the individual intended to receive the confidential information.
  • Transmit the URL containing the confidential information to a single recipient only.
  • Do not access the URL yourself, as the confidential information will then self-destruct and be no longer accessible for the individual intended to receive the information.
  • Ensure that the individual intended to receive the confidential information has successfully retrieved it. If this has not occurred, the confidential information should be considered compromised. In this case, refer to the section What to do if confidential information has been compromised?.

What to consider when receiving confidential information?

  • You have received a URL through which the confidential information is retrievable exactly one single time.
  • Document the confidential information in an appropriate manner (e.g., in a password management system).
  • In the event that the information at the URL transmitted to you is not accessible, the confidential information is to be considered compromised. Please inform the individual who intended to share the confidential information with you immediately. → What to do if confidential information has been compromised?.

What to do if confidential information has been compromised?

The confidential information has been compromised by unauthorized parties. The following steps are to be initiated immediately:

  1. Any of the transmitted credentials must be changed immediately to prevent future unauthorized access.
  2. The access logs of the affected systems should be reviewed for unauthorized access. The integrity of the systems must be restored.
  3. If confidential data (e.g., personal data) has been compromised, the affected individuals or organizations must be informed.
  4. Where applicable, it is to be determined if a data breach requires reporting.