auth gated could work also, ultimately whoever is trusted can leak anyway. the URL won't be guessable if it's made with a hash.
auth gated could work also, ultimately whoever is trusted can leak anyway. the URL won't be guessable if it's made with a hash.