About GeckoShare

Powered by PrivacyGecko — We're on a mission to make secure file sharing accessible to everyone. Privacy shouldn't be a luxury—it should be a fundamental right in the digital age.

Zero-Knowledge
End-to-End Encrypted
Open Source

Our Story

In 2024, as data breaches became commonplace and privacy concerns reached an all-time high, a small team of security experts and privacy advocates came together with a simple belief: file sharing shouldn't require sacrificing your privacy.

We witnessed too many services that claimed to be "secure" but still had backdoors, stored unencrypted data, or sold user information. We decided to build something different—a service that literally cannot access your files, even if we wanted to.

GeckoShare was born from this frustration and our commitment to true privacy by design.

Privacy by Design
Every decision we make prioritizes your privacy and security above all else

Our Core Principles

These fundamental beliefs guide every decision we make and every line of code we write.

Privacy First

We believe privacy is a fundamental human right, not a premium feature. Our entire architecture is designed around protecting your data.

Transparency

Our code is open source and auditable. We believe in earning trust through transparency, not requiring blind faith.

User Empowerment

You should have complete control over your data. No complex settings, no hidden terms—just straightforward, user-centric design.

Security Architecture

Our security model is built on the principle of zero-knowledge encryption. We've designed our system so that we literally cannot access your files, even with full server access.

Client-Side Encryption

Files are encrypted in your browser using AES-256-GCM before any data leaves your device. The encryption key never touches our servers.

Encryption Standard
AES-256-GCM + PBKDF2

Key Management

Encryption keys are generated using cryptographically secure random number generation and embedded in the share link fragment.

Key Generation
crypto.getRandomValues()

Secure Storage

Encrypted files are stored on Hetzner's secure cloud infrastructure with automatic deletion and no metadata logging.

Infrastructure
Hetzner Cloud (Germany)

Automatic Cleanup

Files are automatically purged after expiration with secure deletion methods. No recovery is possible after deletion.

Deletion Method
Secure Overwrite + Shredding

Built by Privacy Advocates

Our diverse team of security engineers, privacy researchers, and user experience designers are united by a shared commitment to protecting digital privacy. We come from backgrounds in cybersecurity, cryptography, and distributed systems.

Every team member has experienced the frustration of compromised privacy online, and we're determined to build tools that put control back in users' hands.

Excellence
We hold ourselves to the highest standards of security and user experience
Innovation
We continuously push the boundaries of what's possible in secure file sharing
User-Centric
Every feature we build is designed with real user needs and privacy in mind

Join the Privacy Revolution

Ready to experience file sharing the way it should be? Secure, private, and completely under your control.