git-crypt VS nixpkgs

Compare git-crypt vs nixpkgs and see what are their differences.

Our great sponsors
  • WorkOS - The modern identity platform for B2B SaaS
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • SaaSHub - Software Alternatives and Reviews
git-crypt nixpkgs
50 972
7,964 15,581
- 4.9%
0.0 10.0
3 months ago 6 days ago
C++ Nix
GNU General Public License v3.0 only MIT License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

git-crypt

Posts with mentions or reviews of git-crypt. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-04-11.
  • Why Can't My Mom Email Me?
    2 projects | news.ycombinator.com | 11 Apr 2024
    https://github.com/AGWA/git-crypt

    And occasionally to encrypt files, or receive encrypted files.

    These are practical things which are non-theoretical.

    > Using multiple keys don't offer added security or secrecy.

    Depends on how careful you are or want to be, with your private key. My house key isn't the same as my car key isn't the same as my bike key.

    > This is nothing like data harvesting

    Alright fair, bad example. What I was grumbling about was more the lack of any clear communication that you've been auto-opted-in to a feature on protonmail, with no user interface signal indicating so, leading to confusion for a couple months like in TFA. I definitely wasn't casting shade on the opengpg keyserver, nor protonmail. It's the "hey! I didn't check a box for this, and it's not mentioned anywhere in the protonmail docs" hidden functionality which could do with some clarification.

    I'm a forgetful creature. If I intentionally put my key on a keyserver, because I'm playing around and learning about PGP, will I make the connection between it and protonmail a few months down the line if I move my email account to them? Unlikely.

    It's a nice automated feature. Protonmail-to-protonmail e2e encryption makes a lot of sense. I just think protonmail-to-non-protonmail e2e needs a tooltip in the UI, and the option to opt out, potentially with the ability to opt out for specific email addresses. I wouldn't at all assume it would be on by default even IF I've been actively using PGP in my email clients, because it's something you usually have to manually set up yourself, very explicitly. That, and 99.9% of emails are plaintext.

    Anyhoo, one thing I forgot which kind of negates the "what if I have multiple encryption keys tied to my email" is the fact that the opengpg keyserver does tie 1 email address to 1 key so you can't publish multiple encryption keys, fair enough. Git-crypt and file encryption, I set my associated email address to use +tags eg [email protected], so as far as protonmail etc are concerned there's only one key per logical email address.

  • Is it safe to commit a Terraform file to GitHub?
    4 projects | /r/Terraform | 24 Jun 2023
    Apart from a few exceptions (like ansible for example, which supports native encryption), we moved away from encrypted secrets in git repos and use external things, depending on the platform (like parameter store / secrets manager for AWS or keyvault for Azure - both of these do track changes, btw), so I haven't looked for quite a while. Back in ye olden days we used https://github.com/AGWA/git-crypt which worked quite nicely, but the key management is cumbersome and it's based on GPG, which in itself is a bit of a light redish flag these days.
  • GitHub Private Repos Considered Private-­Ish
    3 projects | news.ycombinator.com | 4 Jun 2023
    How about encryption?

    https://github.com/AGWA/git-crypt has been solid for me

  • Codeship jet alternative
    1 project | /r/webdev | 18 May 2023
    You might want to check out git-crypt. It allows you to encrypt and decrypt files in a git repo without needing an external account, and supports .env files. That said, trying your hand at making one as a personal project could be a fun and rewarding experience!
  • Ask HN: Privacy-Conscious GitHub?
    1 project | news.ycombinator.com | 1 Apr 2023
    I hesitate to append this but one option I have seen thrown around and also debated is git-crypt [1] There are many caveats to doing this as any integrations that would need to read the file contents would also need to be able to decrypt the files so this may not be entirely useful and may add many levels of complexity and fragility.

    [1] - https://github.com/AGWA/git-crypt

  • Vaults vs. Cryptomator? Security, Cloud syncing, integration?
    2 projects | /r/kde | 30 Mar 2023
    The most interesting approach I've seen for this is https://github.com/AGWA/git-crypt
  • How can I Make this binary statically-linked?
    1 project | /r/learnprogramming | 9 Feb 2023
    Here is the Makefile.
    1 project | /r/cpp_questions | 8 Feb 2023
    I use git-crypt to encrypt files in git repositories quite a lot and I find that it doesn't work on RHEL-based distros because of some missing or out-of-date library. I need to build a statically linked binary.
  • How to Deploy and Scale Strapi on a Kubernetes Cluster 1/2
    13 projects | dev.to | 3 Feb 2023
    Store the Secrets in a repo using gitcrypt or another encryption tool.
  • I moved all my input files to a private repo and used it as a submodule
    4 projects | /r/adventofcode | 17 Jan 2023
    Consider using git-crypt for transparent encryption instead.

nixpkgs

Posts with mentions or reviews of nixpkgs. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-04-22.
  • Eelco Dolstra's leadership is corrosive to the Nix project
    6 projects | news.ycombinator.com | 22 Apr 2024
    I see two signers in the top 6 displayed on https://github.com/NixOS/nixpkgs/graphs/contributors
  • 3rd Edition of Programming: Principles and Practice Using C++ by Stroustrup
    6 projects | news.ycombinator.com | 19 Apr 2024
    For a single file script, nix can make the package management quite easy: https://github.com/NixOS/nixpkgs/blob/master/doc/languages-f...

    For example,

    ```

  • NixOS/nixpkgs: There isn't a clear canonical way to refer to a specific package
    1 project | news.ycombinator.com | 9 Apr 2024
  • NixOS Is Not Reproducible
    1 project | news.ycombinator.com | 7 Apr 2024
    Yes, Nix doesn't actually ensure that the builds are deterministic. In fact it works just fine if they aren't. There are packages in nixpkgs that aren't reproducible: https://github.com/NixOS/nixpkgs/issues?q=is%3Aopen+is%3Aiss...
  • The xz attack shell script
    5 projects | news.ycombinator.com | 2 Apr 2024
    I'm not familiar with Bazel, but Nix in it's current form wouldn't have solved this attack. First of all, the standard mkDerivation function calls the same configure; make; make install process that made this attack possible. Nixpkgs regularly pulls in external resources (fetchUrl and friends) that are equally vulnerable to a poisoned release tarball. Checkout the comment on the current xz entry in nixpkgs https://github.com/NixOS/nixpkgs/blob/master/pkgs/tools/comp...
  • Debian Git Monorepo
    4 projects | news.ycombinator.com | 2 Apr 2024
    NixOS uses a monorepo and I think everyone's love it.

    I love being able to easily grep through all the packages source code and there's regularly PRs that harmonizes conventions across many packages.

    Nixpkgs doesn't include the packaged software source code, so it's a lot more practical than what Debian is doing.

    https://github.com/NixOS/nixpkgs

  • From xz to ibus: more questionable tarballs
    5 projects | news.ycombinator.com | 1 Apr 2024
    In this specific case, nix uses fetchFromGitHub to download the source archive, which are generated by GitHub for the specified revision[1]. Arch seems to just download the tarball from the releases page[2].

    [1]: https://github.com/NixOS/nixpkgs/blob/3c2fdd0a4e6396fc310a6e...

    [2]: https://gitlab.archlinux.org/archlinux/packaging/packages/ib...

  • GitHub Disabled the Xz Repo
    5 projects | news.ycombinator.com | 29 Mar 2024
    True, but irrelevant -- _some packages_, _somewhere_, do depend on xz, which, if built, requires pulling the source from GitHub (see the default.nix: https://github.com/NixOS/nixpkgs/blob/nixos-23.11/pkgs/tools...)

    It's not the vulnerability that's a problem right now (NixOS was protected by a couple of factors) but rather GitHub's hamfisted response.

    That is the problem.

  • Combining Nix with Terraform for better DevOps
    4 projects | dev.to | 19 Mar 2024
    We’ve noticed that some users have been asking about how to use older versions of Terraform in their Nix setups [1, 2]. This is an example of the diverse needs of people and the importance of maintaining backward compatibility. We hope that nixpkgs-terraform will be a useful tool for these users.
  • Nix is a better Docker image builder than Docker's image builder
    21 projects | news.ycombinator.com | 15 Mar 2024
    I think whateveracct was referring to is this link:

    https://github.com/NixOS/nixpkgs/blob/master/pkgs/developmen...

    What that file is doing, is building a package, and it essentially is a combination of what Makefile and what RPM spec file does.

    I don't know if you're familiar with those tools, but if you aren't it takes some time to know them enough to understand what is happening. So why would be different here?

What are some alternatives?

When comparing git-crypt and nixpkgs you can also consider the following projects:

git-secrets - Commit files with sensitive information like environment secrets safely encrypted in GitHub

asdf - Extendable version manager with support for Ruby, Node.js, Elixir, Erlang & more

sops - Simple and flexible tool for managing secrets

Home Manager using Nix - Manage a user environment using Nix [maintainer=@rycee]

sealed-secrets - A Kubernetes controller and tool for one-way encrypted Secrets

git-lfs - Git extension for versioning large files

age - A simple, modern and secure encryption tool (and Go library) with small explicit keys, no config options, and UNIX-style composability.

easyeffects - Limiter, compressor, convolver, equalizer and auto volume and many other plugins for PipeWire applications

dendron - The personal knowledge management (PKM) tool that grows as you do!

spack - A flexible package manager that supports multiple versions, configurations, platforms, and compilers.

helm-secrets - A helm plugin that help manage secrets with Git workflow and store them anywhere

waydroid - Waydroid uses a container-based approach to boot a full Android system on a regular GNU/Linux system like Ubuntu.