Upload once. Set your rules. DGR enforces download limits, device locks, and time restrictions automatically—no recipient software required.
DGR combines server-side tracking, device fingerprinting, and file-level encryption to create an unbreakable protection chain.
Every download is logged with device fingerprint, IP address, and timestamp. The server enforces your copy limit before serving any file.
Each unique device can download once. Files are bound to device fingerprints using AES-256 encryption—making link sharing impossible.
Set expiration times (hours or days). Files become permanently inaccessible after the deadline—even if already downloaded.
Upload any file type. Set your download limit (1-1000+), enable watermarking, and optionally enable device locking with expiration time. DGR encrypts your file with AES-256-GCM and generates a unique share link.
Send the link via email, Slack, or any channel. The link works for anyone—no login required. But DGR tracks every download attempt with device fingerprinting (IP + browser signature + MAC address hash).
Each new device gets a functional, lightly watermarked copy with a unique copy number (e.g., "Copy 3 of 50"). The watermark is subtle—images get a small badge, documents get a header comment, models get metadata tags. Files work perfectly.
If someone tries to share their link with a friend, the friend's device is flagged as "duplicate" and receives a completely corrupted file—even if the limit isn't reached yet. This makes link sharing worthless.
Once you've hit your download limit (e.g., 50/50), every subsequent download receives a file that's corrupt at the binary level. Images show error screens, PDFs display access-denied notices, AI models have NaN-poisoned weights, videos show static. The corruption is permanent and irreversible.
As the owner, you can download unlimited times and always receive the pristine original file. You can also grant explicit access to specific colleagues by email—they bypass all limits.
The protection happens server-side. Recipients need zero software, extensions, or apps. They click the link, download the file, and open it normally. The enforcement is invisible until someone tries to exceed your limits.
DGR uses a multi-factor device fingerprint to create unique device IDs:
This creates a fingerprint like: 7f3a9d2e8b4c1f6a...
Alice downloads your file on her MacBook (Device A). She shares the link with Bob. Bob tries to download on his Windows PC (Device B). Bob's device fingerprint doesn't match Device A, so Bob receives a corrupted file—even if only 1 of 100 copies have been used. This prevents link sharing entirely.
Grant explicit access to specific people by email. They bypass device locks and copy limits entirely.
Use case: Grant "owner" permission to your engineering team (10 people). They all get unlimited access to the original file. Everyone else who gets the public link receives watermarked, device-locked copies subject to your 50-download limit.
When limits are exceeded, DGR applies intelligent corruption that preserves file format validity but destroys usability:
The corruption is permanent and irreversible. We don't encrypt or obfuscate—we physically destroy the data at the binary level. There's no "uncorrupt" function, no recovery tool, no workaround. The file's content is gone forever.
Send client previews with 3-download limit. Clients can review on their devices, but can't share with unauthorized parties. You control distribution.
Share your portfolio or resume with 10-download limit. Track which companies accessed it and prevent unlimited redistribution of your work.
Send photo proofs to clients with copy limits. They can't share the full-res files with friends or use them without paying for rights.
Distribute course materials with student-specific device locks. Each enrolled student gets one copy—no sharing or piracy possible.
Share board reports or financial data with 20-person limit. Each executive gets tracked access. After the board meeting, further downloads are corrupted.
Distribute research papers or patent applications to 50 reviewers. Track every access. Prevent leaks to competitors or press.
Share fine-tuned models with enterprise clients. Set 100-download limit for their team. Beyond that, model weights are NaN-poisoned and unusable.
Send sensitive documents to potential investors with time limits. Files expire 48 hours after the call. No long-term exposure risk.
Start with 2 free file uploads. No credit card required.