Access a document
Enter the document ID you received. You'll be asked for your key on the next page.
How it works
Three simple steps to secure your documents with threshold encryption.
Write your document
Create your secret document with our rich text editor. The content is encrypted client-side before it ever leaves your browser.
Split the key
Choose how many keys to create and how many are needed to unlock. The encryption key is split using Shamir's Secret Sharing.
Share with your pack
Distribute keys to your trusted key holders. When they gather enough shares, they decrypt the document together in the browser.
Built for trust
Every design decision puts your security first.
End-to-end encrypted
Your document is encrypted in the browser. The server never sees the unencrypted content or the full encryption key.
Threshold unlocking
No single person can unlock the document. You choose how many key holders must cooperate — 3 of 5, 2 of 7, whatever you need.
Simple key sharing
Key holders receive a link — no sign-up, no app to install. When enough holders cooperate, the document unlocks instantly in the browser.
Open source
Furlock is fully open source under AGPL-3.0. Inspect the code, verify the crypto, trust but verify. No funny business.