01
Local encryption first
Secrets are encrypted in the CLI with AES-256-GCM before any network request is made.
Yanki encrypts your secret on your machine, uploads only encrypted data, and burns the note on read.
Terminal flow
$ yanki create "secret"
-> share link
$ yanki read "<url>"
-> note destroyed
curl -fsSL https://useyanki.dev/install | bash
yanki create "my secret"
Yanki generates a random key and IV on your machine, then encrypts with AES-256-GCM.
https://useyanki.dev/n/<id>#<key>
The API stores only encrypted ciphertext. The decryption key stays in the URL hash fragment.
yanki read "https://useyanki.dev/n/<id>#<key>"
On first read, the API returns the encrypted payload and immediately deletes the note.
Yanki is built around a zero-knowledge flow: encrypt locally, share safely, and burn on first successful read.
01
Secrets are encrypted in the CLI with AES-256-GCM before any network request is made.
02
The server only stores ciphertext, IV, and auth tag.
03
Decryption keys remain in the URL hash fragment and never hit server logs.
04
A successful read returns once and immediately deletes the stored note.