π Random links are everywhere β but how secure are they actually?
Whether you use 1Password to share credentials, track a DHL parcel, get a return link from an online shop, or reset your bank password β all of these rely on randomly generated links. But what makes them secure?
π² The short answer: cryptographically generated randomness. These links are not just random-looking β they are produced by a CSPRNG (Cryptographically Secure Pseudo-Random Number Generator), which draws entropy from hardware noise, system events and other unpredictable sources. The result is a link with 128β256 bit of randomness. That means more possible combinations than atoms in the observable universe. Guessing one is not a realistic attack.
β±οΈ The expiry time is your second line of defense. 1Password lets you set a link to expire after one hour or even after a single view. DHL links typically expire after package delivery. The shorter the window, the smaller the attack surface β even if someone intercepts the link, it is worthless shortly after.
π¦ Who uses them?
β‘ Password managers (1Password, Bitwarden) β secure credential sharing
β‘ Parcel services (DHL, UPS, DPD, Evri) β tracking and pickup notifications
β‘ Online shops β order confirmations, return portals
β‘ Cloud storage (Dropbox, WeTransfer) β file sharing
β‘ Banks and services β password resets, identity verification
β οΈ Where it gets tricky: the link itself is nearly unbreakable. The weak point is always the channel you use to send it. Email, SMS, chat β whoever intercepts the message gets the link. Sending via an end-to-end encrypted channel like Signal or Teams significantly reduces that risk.
So: short expiry + encrypted channel = good enough for everyday use. For highly sensitive data, adding email verification on top closes the last gap.
How do you handle sharing sensitive links? Do you think about the channel, or just hit send? π€
