Skip to main content

Transfer.sh is an instant sharing tool for programmers

File sharing tools are a dime a dozen these days. There’s Dropbox, Google Drive, and iCloud. But what if you want to share something quickly and easily from the command line? That’s why programmer Remco Verhoef created Transfer.sh. The service has basically a file dump. You send a file to transfer.sh via curl and it […]

File sharing tools are a dime a dozen these days. There’s Dropbox, Google Drive, and iCloud. But what if you want to share something quickly and easily from the command line? That’s why programmer Remco Verhoef created Transfer.sh.

The service has basically a file dump. You send a file to transfer.sh via curl and it stays there for fourteen days until its automatically deleted. For example, I uploaded this picture by adding a bit of code to my .bashrc.

The system is one of those small, clever tools that just works. Verhoef created it because he needed to be able to upload files on the fly.

“I created this application when I needed to share log data from within a ssh shell with someone else,” he said. “So I created a web application where I can easily upload files using curl (which is available on almost every platform) just using the command line and modify the file on the fly, like encrypting the contents, applying grep etc. The application has been made open source because it could be usable for many other people and I’d encourage them to run their own server.”

“We don’t have a business model, and we are keeping the site running as courtesy. It is getting a bit difficult to keep it running, because of the popularity and usage,” he said. He also runs a dev shop and is releasing a number of other products including ICO security.

Verhoef doesn’t promise security on his platform, only convenience. He recommends piping files through gpg before uploading them.

Not everyone is using the product for good, however, which frustrates his team.

“It is being used by a lot of people,” he said. “Some are using it for uploading log files, others are exporting complete video surveillance to us. Sometimes it is being abused, by distributing malware, botnets and other malicious tools, but we try to stop it as soon as possible. One time a porn website was serving porn photos through us, and when we found out we had all photos replaced by dogs and kittens.”

Data & News supplied by www.cloudquote.io
Stock quotes supplied by Barchart
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms and Conditions.