Trusted Transfer Infrastructure

Share sensitive files with controlled access, EU data residency, and built-in security hardening.

SkillPlan Secure File Transfer is based on Uploader, a self-hosted service running on European cloud infrastructure from European providers. Data is encrypted in transit and encrypted at rest, with authenticated uploads, encrypted download tokens, and automatic lifecycle cleanup.

Explore Features

Overview

How the service works

  1. Authorized users authenticate via username/password and receive a short-lived session token.
  2. Files are uploaded via secure TLS API endpoints and stored in Europe with per-user isolation.
  3. Stored files remain encrypted at rest on European cloud infrastructure.
  4. An encrypted 24-hour download link is generated for controlled file retrieval.
  5. Files are automatically cleaned up on expiry, with a recovery portal for authenticated re-downloads.

Benefits

Why teams choose this service

Security by default

Uses encryption in transit, encryption at rest, JWT session auth, encrypted download tokens, strict response headers, and path traversal protections.

European data residency

Data is stored in European cloud regions with European providers, helping teams keep file transfer data within Europe for residency and governance requirements.

Operational confidence

Large file support, controlled link expiry, automatic cleanup, and hardened deployment posture with least-privilege runtime defaults.

Architecture Visuals

Data flow and security diagrams

EU data flow diagram showing client upload, encrypted storage, and secure download link flow
EU data flow: authenticated upload over TLS, encrypted at-rest storage in Europe, and secure time-limited download links.
Security model diagram showing layered controls for perimeter, identity, data protection, and operations
Security model: layered controls across perimeter, identity, data protection, and operations.
Lifecycle and recovery diagram showing upload, active link, expiry, cleanup, and authenticated recovery
Lifecycle model: link activation, expiry, cleanup, and authenticated recovery before deletion.

Private Beta

Request access for your team

Complete the form and our team will review your use case and onboarding requirements.