a clipboard you can trust.
Wispr moves text, code, and files between your devices and to other people — encrypted in your browser before it leaves. The server only sees ciphertext for Link, Pair, and My clips. PIN is the one explicit non-ZK mode, and it’s gated to members.
how it works
- You paste. Your browser generates a fresh key.
- The key encrypts your content right in the tab.
- The ciphertext goes to the server. The key does not.
- You hand the key to the receiver (URL fragment, PIN, or live channel).
- The receiver decrypts in their tab. Server stays blind.
four modes
- Link — one-shot URL, burned after a read. Anyone can make one.
- PIN — 4 digits. Members only. Convenient. Not zero-knowledge.
- Pair — two devices, live, peer-to-peer. Nothing persisted.
- My clips — your own history. Members only. Zero-knowledge.
the security model, in plain English.
in scope
- A snooping operator can’t read your content for Link, Pair, or My clips.
- A DB leak is useless without the keys (Links/Pair/My clips).
- Short-PIN brute force is rate-limited and self-invalidating.
out of scope
- If your browser is owned, you’re owned.
- A malicious extension can read the DOM. We can’t stop that.
- If you forget your passphrase, your My clips history is gone. By design.
invite-only, for v1
Accounts unlock PIN and My clips. Sign-up is by invite while we shake out the build. Anonymous Link and Pair stay free forever.