Wispr
about

a clipboard you can trust.

Wispr moves text, code, and files between your devices and to other people — encrypted in your browser before it leaves. The server only sees ciphertext for Link, Pair, and My clips. PIN is the one explicit non-ZK mode, and it’s gated to members.

how it works
  1. You paste. Your browser generates a fresh key.
  2. The key encrypts your content right in the tab.
  3. The ciphertext goes to the server. The key does not.
  4. You hand the key to the receiver (URL fragment, PIN, or live channel).
  5. The receiver decrypts in their tab. Server stays blind.
four modes
  • Link — one-shot URL, burned after a read. Anyone can make one.
  • PIN — 4 digits. Members only. Convenient. Not zero-knowledge.
  • Pair — two devices, live, peer-to-peer. Nothing persisted.
  • My clips — your own history. Members only. Zero-knowledge.

the security model, in plain English.

in scope
  • A snooping operator can’t read your content for Link, Pair, or My clips.
  • A DB leak is useless without the keys (Links/Pair/My clips).
  • Short-PIN brute force is rate-limited and self-invalidating.
out of scope
  • If your browser is owned, you’re owned.
  • A malicious extension can read the DOM. We can’t stop that.
  • If you forget your passphrase, your My clips history is gone. By design.

invite-only, for v1

Accounts unlock PIN and My clips. Sign-up is by invite while we shake out the build. Anonymous Link and Pair stay free forever.