[{"data":1,"prerenderedAt":248},["ShallowReactive",2],{"CMS_en_solutions_tech":3,"$fpvYB5ZQ0zDdQca4M84IPE9embVf8j_1bW42rUc9F_ik":140,"mdc--ba03dv-key":148,"mdc--wq06vz-key":160,"mdc--18ywb0-key":168,"mdc--9bnl3p-key":176,"mdc-n9nc8x-key":184,"mdc-rdd83g-key":192,"mdc--2j0iqc-key":200,"mdc-gy7blu-key":208,"mdc--37qavt-key":216,"mdc--69ehvu-key":224,"mdc--bptdqv-key":232,"mdc--malb1q-key":240},{"id":4,"title":5,"body":6,"description":7,"extension":8,"faq":6,"features":6,"hero":9,"meta":23,"navigation":13,"path":24,"sections":25,"seo":137,"stem":138,"table_cards":6,"__hash__":139},"cms\u002Fen\u002Fsolutions\u002Ftech.yml","Retyc for Technical Teams – DevOps Security",null,"Securely transfer secrets, SQL dumps, certificates, and sensitive logs. End-to-end encryption and automatic expiration for your DevOps operations.","yml",{"links":10},[11,16],{"label":12,"isRegister":13,"icon":14,"size":15},"Try for free",true,"i-lucide-shield-check","xl",{"label":17,"to":18,"icon":19,"size":15,"color":20,"variant":21,"target":22},"Use our CLI","https:\u002F\u002Fgithub.com\u002Fretyc\u002Fretyc-cli","i-lucide-terminal","secondary","outline","_blank",{},"\u002Fen\u002Fsolutions\u002Ftech",[26,52,75,101,126],{"id":27,"headline":28,"title":29,"description":30,"orientation":31,"reverse":32,"features":33,"image":50},"use-cases","Use cases","Use cases for devs and ops","Stop sending secrets via Slack or SQL dumps through S3. Retyc secures your most sensitive transfers with automatic encryption and scheduled destruction.","horizontal",false,[34,38,42,46],{"title":35,"description":36,"icon":37},"Secret and credential transfers","API keys, OAuth tokens, root passwords, SSH access… Ultra-short expiration available (1h to 24h).","i-lucide-key",{"title":39,"description":40,"icon":41},"Database exports","SQL dumps, PostgreSQL\u002FMySQL backups, NoSQL exports. Large files (multiple GB) automatically encrypted. GDPR-compliant handling of personal data.","i-lucide-database",{"title":43,"description":44,"icon":45},"Certificates and private keys","SSL\u002FTLS certificates, SSH keys, GPG keys, signing keys. Encrypted transfer with instant revocation if a compromise is suspected.","i-lucide-file-key",{"title":47,"description":48,"icon":49},"Logs and configuration files","Application logs containing tokens, stack traces with internal IPs, .env files, kubeconfigs. Automatic encryption of embedded sensitive data.","i-lucide-scroll-text",{"src":51},"\u002Fimg\u002Femployees_box.png",{"id":53,"headline":54,"title":55,"description":56,"orientation":31,"reverse":13,"features":57,"image":72},"security","Security","Advanced technical security","Architecture designed for the most sensitive use cases. Encrypt before upload, no cleartext traces, scheduled destruction on expiration.",[58,62,65,68],{"title":59,"description":60,"icon":61},"Local encryption before upload","Your secrets and dumps are encrypted on your device before any network transfer. We never see your data in cleartext, not even encrypted server-side with our keys.","i-lucide-shield",{"title":63,"description":64,"icon":14},"Your CISO will appreciate it","Designed to meet the strictest security requirements. Compliant with security best practices, with encryption key rotation available on all plans.",{"title":66,"description":67,"icon":45},"Automatic recipient-key encryption","If your recipient has an account, we automatically use their public key to encrypt the data. Only they can decrypt it, even if the link leaks.",{"title":69,"description":70,"icon":71},"Emergency revocation","Instant kill switch: revoke access at any time if you suspect a compromise. The link becomes immediately inaccessible.","i-lucide-alert-octagon",{"src":73,"width":74},"\u002Fimg\u002Fe2ee_en.png",550,{"id":76,"headline":77,"title":78,"description":79,"orientation":31,"reverse":13,"features":80,"image":96},"integration","Integration","Integration and automation","Available today via web interface and CLI. Soon with an SDK to integrate directly into your scripts and CI\u002FCD pipelines. Retyc adapts to your workflow, not the other way around.",[81,85,89,92],{"title":82,"description":83,"icon":84},"Web interface with no installation","Upload from any browser. Drag and drop your dump or secret, generate an encrypted link in one click. No tools to install.","i-lucide-globe",{"title":86,"description":87,"icon":88},"Automated secure intake","Create intake links to automate the collection of logs, dumps, or backups from your production servers. Direct sending from scripts.","i-lucide-inbox",{"title":90,"description":91,"icon":19,"to":18},"CLI","Transfer files and receive directly from your terminal or your CI. Compatible with Linux, FreeBSD, NetBSD, OpenBSD, macOS and... Windows. Official Docker image available. Open-source on GitHub.",{"title":93,"description":94,"icon":95},"SDK (coming soon)","Integrate Retyc into your applications! Automate secret transfers during rotations or dump sharing for debugging. In development.","i-lucide-code",{"src":97,"width":98,"sizes":99,"modifiers":100},"\u002Fimg\u002Fcli\u002Fdemo_0.0.2.gif",450,"100vw lg:450px",{"animated":13},{"id":102,"headline":103,"title":104,"description":105,"orientation":31,"reverse":32,"features":106,"image":124},"technical-benefits","Highlights","Why technical teams choose Retyc","Built to solve real problems for devs, ops, and sysadmins. No marketing fluff—just features that matter.",[107,111,115,119],{"title":108,"description":109,"icon":110},"No real size limits","Transfer SQL dumps of tens of GB without issues. No need to split backups or configure temporary S3 storage.","i-lucide-hard-drive",{"title":112,"description":113,"icon":114},"Post-quantum hybrid keys encryption","Protection against future threats. Your production secrets remain confidential even against theoretical quantum computers.","i-lucide-lock",{"title":116,"description":117,"icon":118},"Zero configuration","No S3 bucket to create, no VPN to set up, no FTP to secure. Just a link. It works immediately.","i-lucide-zap",{"title":120,"description":121,"icon":122,"to":123},"Open-source cryptography","We use AGE, a well-known open-source standard for file encryption. Audited and trusted by the security community.","i-lucide-code-2","https:\u002F\u002Fage-encryption.org\u002Fv1",{"src":125},"\u002Fimg\u002Fupload_encrypt.png",{"id":127,"title":128,"description":129,"links":130},"cta","Ready to secure your data?","Join DevOps and IT teams using Retyc to transfer secrets, dumps, and certificates without compromising security.",[131,133],{"label":12,"isRegister":13,"icon":132},"i-lucide-arrow-right-circle",{"label":134,"to":135,"variant":21,"icon":136},"View pricing","\u002Fpricing","i-lucide-tag",{"title":5,"description":7},"en\u002Fsolutions\u002Ftech","rSphulIzQdQwV_hb0WUhss5O5WNfNjQkOvSrvJ5DWmg",{"baseUrl":141,"clientId":141,"redirectUri":141,"scope":142},"",[143,144,145,146,147],"openid","profile","email","roles","organization",{"data":149,"body":150},{},{"type":151,"children":152},"root",[153],{"type":154,"tag":155,"props":156,"children":157},"element","p",{},[158],{"type":159,"value":5},"text",{"data":161,"body":162},{},{"type":151,"children":163},[164],{"type":154,"tag":155,"props":165,"children":166},{},[167],{"type":159,"value":7},{"data":169,"body":170},{},{"type":151,"children":171},[172],{"type":154,"tag":155,"props":173,"children":174},{},[175],{"type":159,"value":29},{"data":177,"body":178},{},{"type":151,"children":179},[180],{"type":154,"tag":155,"props":181,"children":182},{},[183],{"type":159,"value":30},{"data":185,"body":186},{},{"type":151,"children":187},[188],{"type":154,"tag":155,"props":189,"children":190},{},[191],{"type":159,"value":55},{"data":193,"body":194},{},{"type":151,"children":195},[196],{"type":154,"tag":155,"props":197,"children":198},{},[199],{"type":159,"value":56},{"data":201,"body":202},{},{"type":151,"children":203},[204],{"type":154,"tag":155,"props":205,"children":206},{},[207],{"type":159,"value":78},{"data":209,"body":210},{},{"type":151,"children":211},[212],{"type":154,"tag":155,"props":213,"children":214},{},[215],{"type":159,"value":79},{"data":217,"body":218},{},{"type":151,"children":219},[220],{"type":154,"tag":155,"props":221,"children":222},{},[223],{"type":159,"value":104},{"data":225,"body":226},{},{"type":151,"children":227},[228],{"type":154,"tag":155,"props":229,"children":230},{},[231],{"type":159,"value":105},{"data":233,"body":234},{},{"type":151,"children":235},[236],{"type":154,"tag":155,"props":237,"children":238},{},[239],{"type":159,"value":128},{"data":241,"body":242},{},{"type":151,"children":243},[244],{"type":154,"tag":155,"props":245,"children":246},{},[247],{"type":159,"value":129},1775562802571]