gocryptfs
pass-import
Our great sponsors
gocryptfs | pass-import | |
---|---|---|
56 | 403 | |
3,291 | 768 | |
- | - | |
6.8 | 8.4 | |
7 days ago | 2 months ago | |
Go | Python | |
MIT License | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
gocryptfs
-
Syncthing: Untrusted Device Encryption
I'm looking to improve my documents syncing setup. Currently I'm using owncloud, but that seems overkill for just files syncing and it requires maintenance, so I gave Syncthing a look. The "Untrusted device encryption" was not appealing to me because I'm not convinced by the security aspects yet, and also because it is in beta for now. I used gocryptfs [1] in the past and was quite happy with it, so I'm planning to use it on top of Syncthing to have files synced encrypted. As far as I have read this setup (Syncthing + gocryptfs) seems to be used by several people and has already been discussed by gocryptfs' author, who recommended a `-sharedstorage` flag for such use case [2]. Reading [3] I think gocryptfs is more suited for files syncing than cryfs. I'm aware that the metadata (file size, structure, …) of my files are not encrypted but that's a compromise I'm ready to make.
I would be happy to hear about opinions about this approach.
[1] https://nuetzlich.net/gocryptfs/
[2] https://github.com/rfjakob/gocryptfs/issues/549#issuecomment...
[3] https://www.cryfs.org/comparison
- Gocryptfs – An encrypted overlay filesystem written in Go
-
My Mother Found Out I was Installing Linux...
If you want selective encryption, rather than full drive encryption, to be less conspicuous: gocryptfs (Linux)/cppcryptfs (Windows).
-
Hertzner or other cloud encryption question
https://github.com/rfjakob/gocryptfs might be a solution. I dont use it, tried to for some backups but ran into some issues unrelated to the solution itself but with my backup solution.
-
Mountpoint – file client for S3 written in Rust, from AWS
JungleDisk was backup software I used ~2008 that allowed mounting S3. They were bought by Rackspace and the product wasn't updated. Seems to be called/part of Cyberfortress now.
Later I used Panic's Transmit Disk but they removed the feature.
Recently I'd been looking at s3fs-fuse to use with gocryptfs but haven't actually installed it yet!
https://github.com/s3fs-fuse/s3fs-fuse
https://github.com/rfjakob/gocryptfs
-
Does btrfs send/receive provide any benefit for moving new, non-incremental data?
I think the fundamental issue seem to maybe be the changing inode numbers with things like gocryptfs. Git annex needs those to be static as far as I can tell.
-
Is veracrypt still the best option
Veracrypt is stil a fine option but if you want to have regular backups, it's not that great imo. Say you want to automatically backup your files to some cloud without having to trust their promises of privacy, you could use something like gocryptfs. It creates a folder of your files but in encrypted form. You then copy / sync that folder using any backup program.
-
Enigma: A simple cross-platform encrypted filesystem in Golang
A comparison gocryptfs would be appreciated, since this software, at first glance, has no differentiating features from it.
https://nuetzlich.net/gocryptfs/
-
A simple cross-platform encrypted filesystem in Golang
There is a pretty nice project gocryptfs that instead of encrypting container, it substitute on the fly virtual filesystem that encrypts content and file objects. So, if you would share to cloud that virtual filesystem, you don't sacrifice a byte on your system.
- Dropbox Buys Boxcryptor
pass-import
- End of Life for Twilio Authy Desktop App
-
I Know What Your Password Was Last Summer
> I always tell these people to just sign up for a password manager and they always resist and say no. I must be missing something obvious.
Maybe they don't want to be relying on a random third-party for all their passwords?
Rather than getting them to sign up for a password manager, what about getting them to install a password manager? I use https://www.passwordstore.org/ - it encrypts your passwords with GPG, and shares the storage via a Git repository for synchronisation between different machines.
-
Command Line Interface Guidelines
That way you can delegate the password handling to another program, e.g. a password manager like pass(1) (https://www.passwordstore.org/) or some interactive graphical prompt.
-
Passit: Open-Source Password Manager
I want to move to something compatible with https://www.passwordstore.org/ - an open standard for keeping your passwords in a folder encrypted with OpenPGP.
The problem is that I'm nervous to give an unknown Android app and browser plugin total control of my passwords and access to my github account when I don't have time to review it's code properly. I have a bit more trust ing the command line tools, but I'd like to be sure that more people are looking at the code before I trust my life to it.
-
Ask HN: Best Password Manager without cloud login?
> Create a system or pattern based on url or brand and mentally hash it into a password.
Doesn't sound very secure. Also when you realize that you anyway have to trust cryptography, I believe it starts making a lot of sense to have an actual cryptographic key and encrypt it with one good random password you learn by heart.
I use pass https://www.passwordstore.org/, which encrypts my passwords with my GPG key, which comes from my Yubikey, which I unlock with a password. That means that I only need to remember one password, and it feels a lot more secure than your pattern based on url or brand.
-
Do you trust password mangers?
i use pass and keep my database on a local git repo. it encrypts your passwords with gpg and is a really simple command line program
- Comment gérez-vous vos mots de passe ?
-
Best way to store and Encrypt passwords? Need advice on my method...
If you want portability and simplicity, there's a project called simply pass that uses standard *nix utilities (and git, I believe) to manage passwords from CLI.
-
Bitwarden Broken in Linux
0. Pass is just text files encrypted with gpg. I needed just one password on one work computer, where I had my gpg key, but not all my passwords. Decrypted the file and that was it.
1. There are plugins and web clients: https://www.passwordstore.org/#extensions
-
Bitwarden Adds Support for Passkeys
I've been incredibly happy with https://www.passwordstore.org/ for years. The data store is a file hierarchy, with the files themselves encrypted with GPG. Sync is via git. TOTP support with a plugin.
What are some alternatives?
cryfs - Cryptographic filesystem for the cloud
vaultwarden - Unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs
Cryptomator - Multi-platform transparent client-side encryption of your files in the cloud
gopass - The slightly more awesome standard unix password manager for teams
DroidFS - Encrypted overlay filesystems implementation for Android. Also available on gitea: https://forge.chapril.org/hardcoresushi/DroidFS
Bitwarden - The core infrastructure backend (API, database, Docker, etc).
syncthing-android - Wrapper of syncthing for Android.
rofi-pass - rofi frontend for pass
encfs - EncFS: an Encrypted Filesystem for FUSE.
KeeWeb - Free cross-platform password manager compatible with KeePass
rclone - "rsync for cloud storage" - Google Drive, S3, Dropbox, Backblaze B2, One Drive, Swift, Hubic, Wasabi, Google Cloud Storage, Yandex Files
Pass4Win - Windows version of Pass (http://www.passwordstore.org/)