Skip to content

The Dummy Programmer

Stories of daily programming

  • Home
  • My other dummy projects
  • Games
    • Space Y: An Asteroids clone
  • Services
    • What’s my user agent
    • What’s my IP address
  • About
  • Toggle search form

One shot secret function: what’s that?

Posted on December 4, 2020December 4, 2020 By

Good morning everyone!

One shot secret function…. I’m hearing you saying… what?

To talk about this function I have to talk about a nice website I discovered in the past days. The site is the following:

https://www.underkey.com/en

In this site you can find some online encryption services, as the following:

  • encrypt a text message
  • encrypt a file (of course, you have to upload the file!)
  • generate a password
  • share a one shot secret

I believe that the most interesting is the last one… Let’s see how it works.

Suppose you have this need: you need to communicate to someone the credentials to access to a certain online service. You could use, for example, a simple email, but there are some drawbacks:

  • the message could be intercepted
  • the message could be read by other people that may have access to your email or to recipient’s email
  • if you forget to delete the message, it will remain in your inbox and still be read by other people

The “One shot secret” function can, to some extent, solve these problems.

Click on the link “One shot secret” to reach the page in which you can use the service. You will see the following page:

One shot secret function page

Now enter your secret and choose the option to indicate how long you want to keep the stored message. I configured the page as follow:

One shot secret function page (inserting data)

Click on the “Get the link” button. A link to read the message will be shown, as you can see in the following screenshot:

One shot secret function page (link generated)

Now you can send the link to your recipient, using for example an email.

In this way you have these advantages:

  • the message is deleted immediately the first time the link is accessed, so you can detect if someone other than the correct recipient has accessed, because the recipient will not be able to read the message
  • UnderKey.com is under https, so your communication while reading the message is encrypted
  • If the recipient forget to delete the email, the secret message is no more accessible because the link is no more valid

Have a nice day!

Encryption

Post navigation

Previous Post: Splitting a big file in multiple small files
Next Post: Sql Server Instant File Initialization

Related Posts

Lock a Bitlocker drive again after unlocking Bitlocker
Encrypt a Windows drive with Bitlocker Bitlocker

Search

Related posts

  • SQL Server LEN function return 0 passing a string…
  • Sql Server: apply an aggregate function to fields…

Categories

  • .NET 6 (1)
  • .NET 7 (1)
  • AJAX (1)
  • Android (2)
  • Apache (4)
  • ASP.NET (9)
  • ASP.NET MVC (3)
  • Avalonia UI (1)
  • BCP (1)
  • Bitlocker (2)
  • C# (14)
  • CentOS (4)
  • ClosedXML (1)
  • CLR (1)
  • DNS (1)
  • Encryption (3)
  • Excel (2)
  • FuelPHP (3)
  • Games (2)
  • Google Chrome (1)
  • GSuite (1)
  • HTML (1)
  • Imagick (2)
  • Javascript (1)
  • Kindle (1)
  • LAMP (3)
  • Linux (7)
  • MariaDB (2)
  • Mathematics (2)
  • MySql (4)
  • NPOI (1)
  • Office 365 (1)
  • Perl (1)
  • PHP (6)
  • Programming (1)
  • Remote desktop (1)
  • SFTP (2)
  • Sockets (3)
  • Sql Server (20)
  • Sql Server 2016 (14)
  • Sql Server 2019 (1)
  • SSL (4)
  • Task scheduler (1)
  • Telerik ASP.NET AJAX (2)
  • The Dummy Programmer Chat (2)
  • Threading (5)
  • Tools (1)
  • TPL (3)
  • TypeScript (3)
  • Ubuntu (4)
  • Virtualization software (3)
  • Visual Studio (1)
  • Visual Studio Code (2)
  • VueJS (1)
  • Web fonts (1)
  • Web programming (6)
  • Windows (12)
  • Windows 10 (15)
  • Windows Forms (1)
  • Windows Server (6)

Copyright © 2024 The Dummy Programmer | Privacy Policy | Terms of use |

Powered by PressBook Masonry Dark

Manage Cookie Consent
This site doesn’t collect user personal data and doesn’t install profiling or analytical cookies, either its own or from third parties. Read our privacy policy for more info.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}