Encrypt documents and split the key into multiple shares. No single person can unlock it alone — your pack holds the key.

Access a document

Enter the document ID you received. You'll be asked for your key on the next page.

You'll be asked for your master key or key shares on the document page.

How it works

Three simple steps to secure your documents with threshold encryption.

1

Write your document

Create your secret document with our rich text editor. The content is encrypted client-side before it ever leaves your browser.

2

Split the key

Choose how many keys to create and how many are needed to unlock. The encryption key is split using Shamir's Secret Sharing.

3

Share with your pack

Distribute keys to your trusted key holders. When they gather enough shares, they decrypt the document together in the browser.

Built for trust

Every design decision puts your security first.

End-to-end encrypted

Your document is encrypted in the browser. The server never sees the unencrypted content or the full encryption key.

Threshold unlocking

No single person can unlock the document. You choose how many key holders must cooperate — 3 of 5, 2 of 7, whatever you need.

Simple key sharing

Key holders receive a link — no sign-up, no app to install. When enough holders cooperate, the document unlocks instantly in the browser.

Open source

Furlock is fully open source under AGPL-3.0. Inspect the code, verify the crypto, trust but verify. No funny business.

Ready to secure your secrets?

No account needed. No tracking. Just encryption.