Privacy Tools Guide

Traditional file sharing (Dropbox, Google Drive, OneDrive) logs server-side metadata. Even with password protection, service providers see file names, access patterns, and IP addresses. For sensitive documents (medical records, legal files, financial data, NDAs), end-to-end encryption is required.

This guide compares five E2E encrypted file sharing tools: OnionShare, Tresorit Send, Wormhole (Magic Wormhole), Firefox Send alternatives, and open-source options. We focus on security implementation, usability, CLI support, file size limits, and pricing.

OnionShare

OnionShare is an open-source tool for securely sharing files via Tor. Files are encrypted, hosted locally on your machine, accessible only over Tor with a unique URL and password.

Security Model:

Pricing:

File Size Limits:

CLI Usage:

# Install
brew install onionshare-cli

# Share a file (starts local Tor server)
onionshare-cli --auto-start share /path/to/secret-document.pdf

# Output:
# OnionShare 2.6 | https://[onionaddress].onion/share/[code]
# Password: [random]

# Configure options
onionshare-cli --auto-start \
  --no-slugs \
  --auto-stop \
  --timer 3600 \
  share /path/to/file

# Share multiple files
onionshare-cli --auto-start share file1.pdf file2.docx file3.zip

# Receive files (reverse share)
onionshare-cli --auto-start receive
# Output: https://[onionaddress].onion/receive/[code]

Workflow Example:

# Sender
onionshare-cli --auto-start share contract.pdf
# Output: https://abc123def456.onion/share/abc123
# Password: secure_random_password

# Recipient (copy URL and password)
# 1. Open Tor Browser
# 2. Paste URL
# 3. Enter password
# 4. Download file

# Server stops after download (--auto-stop enabled)

Strengths:

Weaknesses:


Tresorit Send

Tresorit Send is a commercial E2E encrypted file sharing service owned by Tresorit (a zero-knowledge cloud provider). Files are encrypted client-side, uploaded to Tresorit servers, encrypted link generated.

Security Model:

Pricing:

File Size Limits:

CLI Usage: No native CLI. Web API available for integrations.

Web Workflow:

1. Visit tresorit.com/send
2. Upload file (encrypted client-side)
3. Set expiration (1, 7, 30, 90 days)
4. Optional: Add password, set download limit
5. Get shareable link (https://send.tresorit.com/[id])
6. Send link + password separately

Browser Extension Workflow (Faster):

1. Right-click file in file explorer
2. Select "Send with Tresorit"
3. Configure expiration/password
4. Link automatically copied to clipboard
5. Paste in chat/email

Strengths:

Weaknesses:


Wormhole (Magic Wormhole)

Wormhole is an open-source CLI tool for secure file transfer using encryption and the Rendezvous protocol. Files are encrypted with a passphrase, transferred directly between sender and recipient.

Security Model:

Pricing:

File Size Limits:

CLI Usage:

# Install
brew install magic-wormhole

# Send a file
wormhole send /path/to/secret.pdf

# Output:
# Sending 1.2 MB file named 'secret.pdf'
# On the other computer, please run: wormhole receive
# Wormhole code is: 7-saturn-giddy
# (Run Ctrl-C to cancel)

# Recipient (on different machine)
wormhole receive

# Output:
# Enter receive wormhole code: 7-saturn-giddy
# Receiving file (1.2 MB) named 'secret.pdf' from sender
# ok? (Y/n): Y
# Receiving (1.2 MB)...............................
# Received file written to ./secret.pdf

Advanced Examples:

# Send and specify filename
wormhole send --text "my secret data"
# Output: Wormhole code: 7-saturn-giddy

# Receive text instead of file
wormhole receive 7-saturn-giddy

# Send with custom passphrase (not recommended)
# wormhole send --code="sunny-machine" /file.pdf

# Use specific transit relay (for NAT issues)
wormhole --transit-relay ws://relay.example.com send /file.pdf

# Batch transfer (directory)
wormhole send /path/to/directory/
# Automatically zips and transfers as single file

Workflow Example:

Sender (Terminal 1):
$ wormhole send contract.pdf
Sending 0.3 MB file named 'contract.pdf'
On the other computer, please run: wormhole receive
Wormhole code is: 3-boil-muffin
(Run Ctrl-C to cancel)

Recipient (Terminal 2):
$ wormhole receive
Enter receive wormhole code: 3-boil-muffin
Receiving file (0.3 MB) named 'contract.pdf' from sender
ok? (Y/n): Y
Received file written to ./contract.pdf

Sender:
All done; waiting for the next one. (Run Ctrl-C to cancel)

Strengths:

Weaknesses:


Firefox Send Alternatives

Firefox Send shut down in 2020, but similar E2E encrypted services emerged. We compare top alternatives.

Best Alternative: CryptDrop

CryptDrop is a privacy-focused file sharing service (uses Mozilla’s older Firefox Send code).

Security:

Pricing:

File Size:

Usage:

1. Visit cryptdrop.org
2. Select file (encrypted client-side)
3. Set password, expiration, download limit
4. Get link
5. Share link, password separately

Other Firefox Send Alternatives:

Service Provider Encryption Size Limit Price
CryptDrop Cryptpad Labs AES-GCM 500 MB free, 20 GB paid Free/$5/mo
SnapDrop Robin Linus E2E (peer-to-peer) Unlimited (LAN) Free
FilePizza Scalabull WebRTC (P2P) Unlimited (browser memory) Free
Transfer.sh [Community] Client-side encryption (optional) 20 GB Free/$15/mo

Transfer.sh Example (CLI):

# Upload with encryption (client-side)
curl --upload-file ./document.pdf https://transfer.sh/document.pdf
# Output: https://transfer.sh/[id]/document.pdf

# Delete after 14 days (default)
# Or specify retention:
curl --upload-file ./document.pdf https://transfer.sh/document.pdf?expire=1440
# Expires in 24 hours (1440 minutes)

Comparison Table

Tool Encryption Server Price Size Limit CLI Speed
OnionShare AES-256 Local (Tor) Free Unlimited Yes Slow (500KB/s)
Tresorit Send AES-256 Cloud (zero-knowledge) Free/$99yr 2GB free, 10GB paid No Fast (10+ MB/s)
Wormhole Salsa20-Poly1305 P2P Free Unlimited Yes Fast (50+ MB/s)
CryptDrop AES-GCM Cloud Free/$5mo 500MB free, 20GB paid No Fast (10+ MB/s)
Transfer.sh Optional Cloud Free/$15mo 20 GB Yes Fast (50+ MB/s)

Use Case Recommendations

Legal/Confidential Documents: OnionShare (true anonymity) or Wormhole (fast, no central server)

Medical Records: Tresorit Send (audit logs, compliance features) or CryptDrop (minimal privacy risk)

Technical Collaboration (logs, configs): Wormhole (CLI-friendly, easy automation)

One-off Sharing: OnionShare (no setup) or Tresorit Send (web interface)

Highly Sensitive (foreign governments, journalists): OnionShare only (Tor hidden service)


Security Checklist

Before using any file sharing service:


Practical Workflow Examples

Scenario 1: Lawyer sharing legal document with client

Option 1 (Most Secure):

# Lawyer's computer
onionshare-cli --auto-start --timer 86400 share contract.pdf
# Gives: URL + password

# Phone call: "Go to [URL], password is [word-word-word]"
# Client downloads via Tor Browser
# Document deleted after 24 hours or download

Option 2 (More Convenient):

1. Visit tresorit.com/send
2. Upload contract.pdf
3. Set expiration to 7 days
4. Set optional password
5. Email link with password in separate message

Scenario 2: Developer sharing config file with remote team

# Option 1: Wormhole (fastest, no setup)
wormhole send config.yml
# Sends code to team member
# Team member runs: wormhole receive [code]

# Option 2: Transfer.sh (one-liner)
curl --upload-file config.yml https://transfer.sh/config.yml
# Returns URL for sharing

Scenario 3: Journalist sharing source files with editor (ultra-confidential)

# OnionShare only (most anonymous)
onionshare-cli --auto-start --no-slugs share leaked-docs.zip
# Tor-only access, no logs, no account needed

Key Recommendation

For maximum privacy: OnionShare (Tor, local server, no registration)

For convenience: Tresorit Send (web interface, reliable)

For power users: Wormhole (CLI, fast, flexible)

For compliance: Tresorit Send (audit logs, retention policies)

For one-off sharing: CryptDrop or Transfer.sh (minimal setup)

Start with Wormhole if you’re technical. Start with Tresorit Send if you prioritize ease of use. Upgrade to OnionShare for legally sensitive documents.

Built by theluckystrike — More at zovo.one