A self-contained, offline-capable application for creating and distributing encrypted instructions and files. Access requires a consensus of multiple parties, using Shamir’s Secret Sharing.
This tool allows you to create sensitive content (text instructions and file attachments) that is encrypted using a master key. The master key is then split into multiple “shares” (passwords). To decrypt the content, a specified number of these shares must be combined.
Key Features:
This application is designed to be easy to use. The following guide walks you through creating and accessing secured content.
To create new content, open secure-instructions.html in your browser. Navigating to the admin interface (usually by appending #admin to the URL or using a provided link) allows you to manage content.
Click “Create Content” to begin.



Once content is saved, the secure-instructions.html file now contains the encrypted data. You can distribute this single file to all parties (e.g., via email, USB drive, or shared network location).
Note: Ensure you have distributed the password shares securely to the respective key holders.
To view the content, users open the secure-instructions.html file. They will see the list of available encrypted items.


This project is licensed under the MIT License.
This application includes the secrets.js library by amper5and (Alexander Stetsyuk) and others, which implements Shamir’s Secret Sharing.
secrets.js is licensed under the MIT License:
Copyright (c) 2014 Alexander Stetsyuk
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the “Software”), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.