File transfer without the file storage.
Files burn after one read. Use the relay, or run your own.
A free account tracks your sends, keeps them longer, and lets you send more per month. Or drop one file anonymously in 30 seconds.
- ▸No password — TOTP only
- ▸Burns after read, or on timer
- ▸AES-256-GCM in-browser
Self-hosters on Raspberry Pi. OT teams deploying sector-isolated relays. Blockchain nodes needing ciphertext passthrough. Developers integrating encrypted transfer into their own products.
- ▸BUSL-1.1 source
- ▸docker compose up -d
- ▸NIS2, IEC 62443, NEN 7510
Four steps. Nothing stored.
┌───────────────────┐ ┌───────────────────────────┐ ┌───────────────────┐ │ file.pdf │ │ RAM only — no disk writes │ │ file.pdf │ │ │ │ burn-on-read │ │ ▲ │ │ │ │ │ 5 MB fixed padding │ │ │ │ │ ▼ │ │ hash → Merkle CT log │ │ │ │ │ encrypt(ML-KEM) │ ───► │ blob destroyed │ ────► │ decrypt(ML-KEM) │ │ X-Api-Key header │ │ on read │ │ X-Api-Key header │ └───────────────────┘ └───────────────────────────┘ └───────────────────┘
plaintext · encryption keys · filenames · recipient identity
fixed-size 5 MB ciphertext blobs · blob hashes · API key identifiers
Under the hood.
Browser-generated key in URL fragment — never sent to relay. Prove-by-design that we cannot decrypt what we relay.
Post-quantum hybrid key exchange. FIPS 203. ML-DSA-65 signed receipts (FIPS 204). All math client-side.
The relay loads 3 KEMs and 18 signatures from FIPS 203, 204, 205, and 206. Clients pick, the relay validates against the live registry, unsupported algorithms get HTTP 415. The official SDKs produce wire format v1 today.
Full cryptography spec →Verifiable.
Every transfer hashed into a Merkle tree. Content never stored.
No passwords. Ever.
Paramant has no login form. No username. No password to phish, steal, or breach. Authentication is a cryptographic key and an optional TOTP code — nothing else.
Generated once on account creation. Shown once. Store it in your password manager or secret vault. Rotate instantly if compromised.
RFC 6238, SHA-256, 30-second codes. Works with Aegis, Authy, 1Password. Each code is single-use — replay attacks have no window.
Credential stuffing, dictionary attacks, and phishing require a password to target. With no password those attack vectors don't exist.
Run your own relay.
Source-available under BUSL-1.1. Free for up to 5 users. Works on a Raspberry Pi. If the managed service ever closes, every self-hosted relay keeps running indefinitely.
Every Paramant product.
Drop a file, share link, burns after one read. No account, no trace.
send a file →ML-KEM-768 hybrid with ML-DSA-65 signed receipts. Proof of who sent what.
try ParaShare →AirDrop alternative across iOS, Android, Windows, Linux. QR or 6-digit code.
use ParaDrop →Create an account on our relay. 30 seconds to your first send. EU-hosted.
create account →BUSL-1.1 source. Docker compose. Free up to 5 users. Raspberry Pi supported.
deploy guide →Dedicated relay with SLA. Compliance docs, single-tenant. NIS2, IEC 62443, NEN 7510.
see enterprise plan →