mountpoint-s3
gocryptfs
mountpoint-s3 | gocryptfs | |
---|---|---|
17 | 56 | |
4,017 | 3,303 | |
1.8% | - | |
9.5 | 6.8 | |
6 days ago | 5 days ago | |
Rust | Go | |
Apache License 2.0 | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
mountpoint-s3
-
Row Zero and Viewport Data Streaming
... or does "S3 file system" mean https://github.com/awslabs/mountpoint-s3 - a Rust project by AWS Labs that provides "a simple, high-throughput file client for mounting an Amazon S3 bucket as a local file system" ?
- s3m: A CLI for streams of data in S3 buckets
-
S3 Express Is All You Need
Looks like support for S3 Express was merged in with version 1.30 just a few hours ago https://github.com/awslabs/mountpoint-s3/pull/642
-
Gcsfuse: A user-space file system for interacting with Google Cloud Storage
mountpoint-s3 is AWS’ first party solution for mounting s3 buckets as file systems: https://github.com/awslabs/mountpoint-s3
Haven’t used it but it looks cool, if a bit immature.
- Mountpoint for S3
- When would something like this come to ADLS Gen 2?
-
Running Amazon S3 Mountpoint Inside a Container
FROM rust:1.68.0 as Build RUN apt-get update && apt-get install -y \ clang\ cmake \ curl \ fuse \ git \ libfuse-dev \ pkg-config \ && apt-get clean \ && rm -rf /var/lib/apt/lists/* \ && git clone --recurse-submodules https://github.com/awslabs/mountpoint-s3.git \ && cd mountpoint-s3 \ && cargo build --release FROM debian:bullseye-slim RUN apt-get update && apt-get install -y \ ca-certificates \ libfuse-dev \ sudo \ && apt-get clean \ && rm -rf /var/lib/apt/lists/* COPY --from=build /mountpoint-s3/target/release/mount-s3 /usr/local/bin/mount-s3 RUN chmod 777 /usr/local/bin/mount-s3 RUN useradd -ms /bin/bash mount-s3-user \ && echo '%sudo ALL=(ALL) NOPASSWD:ALL' >> /etc/sudoers \ && adduser mount-s3-user sudo USER mount-s3-user
- GitHub - awslabs/mountpoint-s3: A simple, high-throughput file client for mounting an Amazon S3 bucket as a local file system.
-
The inside story on Mountpoint for Amazon S3, a high-performance open source file client
This might be useful with a MinIO server, although not directly supported
gocryptfs
-
Syncthing: Untrusted Device Encryption
I'm looking to improve my documents syncing setup. Currently I'm using owncloud, but that seems overkill for just files syncing and it requires maintenance, so I gave Syncthing a look. The "Untrusted device encryption" was not appealing to me because I'm not convinced by the security aspects yet, and also because it is in beta for now. I used gocryptfs [1] in the past and was quite happy with it, so I'm planning to use it on top of Syncthing to have files synced encrypted. As far as I have read this setup (Syncthing + gocryptfs) seems to be used by several people and has already been discussed by gocryptfs' author, who recommended a `-sharedstorage` flag for such use case [2]. Reading [3] I think gocryptfs is more suited for files syncing than cryfs. I'm aware that the metadata (file size, structure, …) of my files are not encrypted but that's a compromise I'm ready to make.
I would be happy to hear about opinions about this approach.
[1] https://nuetzlich.net/gocryptfs/
[2] https://github.com/rfjakob/gocryptfs/issues/549#issuecomment...
[3] https://www.cryfs.org/comparison
- Gocryptfs – An encrypted overlay filesystem written in Go
-
My Mother Found Out I was Installing Linux...
If you want selective encryption, rather than full drive encryption, to be less conspicuous: gocryptfs (Linux)/cppcryptfs (Windows).
-
Hertzner or other cloud encryption question
https://github.com/rfjakob/gocryptfs might be a solution. I dont use it, tried to for some backups but ran into some issues unrelated to the solution itself but with my backup solution.
-
Mountpoint – file client for S3 written in Rust, from AWS
JungleDisk was backup software I used ~2008 that allowed mounting S3. They were bought by Rackspace and the product wasn't updated. Seems to be called/part of Cyberfortress now.
Later I used Panic's Transmit Disk but they removed the feature.
Recently I'd been looking at s3fs-fuse to use with gocryptfs but haven't actually installed it yet!
https://github.com/s3fs-fuse/s3fs-fuse
https://github.com/rfjakob/gocryptfs
-
Does btrfs send/receive provide any benefit for moving new, non-incremental data?
I think the fundamental issue seem to maybe be the changing inode numbers with things like gocryptfs. Git annex needs those to be static as far as I can tell.
-
Is veracrypt still the best option
Veracrypt is stil a fine option but if you want to have regular backups, it's not that great imo. Say you want to automatically backup your files to some cloud without having to trust their promises of privacy, you could use something like gocryptfs. It creates a folder of your files but in encrypted form. You then copy / sync that folder using any backup program.
-
Enigma: A simple cross-platform encrypted filesystem in Golang
A comparison gocryptfs would be appreciated, since this software, at first glance, has no differentiating features from it.
https://nuetzlich.net/gocryptfs/
-
A simple cross-platform encrypted filesystem in Golang
There is a pretty nice project gocryptfs that instead of encrypting container, it substitute on the fly virtual filesystem that encrypts content and file objects. So, if you would share to cloud that virtual filesystem, you don't sacrifice a byte on your system.
- Dropbox Buys Boxcryptor
What are some alternatives?
s3fs-fuse - FUSE-based file system backed by Amazon S3
cryfs - Cryptographic filesystem for the cloud
PosixSyncFS - PosixSyncFS is a set of Bash scripts that allow users to create a real POSIX filesystem and sync it to a remote storage bucket for backup and recovery purposes.
Cryptomator - Multi-platform transparent client-side encryption of your files in the cloud
goofys - a high-performance, POSIX-ish Amazon S3 file system written in Go
DroidFS - Encrypted overlay filesystems implementation for Android. Also available on gitea: https://forge.chapril.org/hardcoresushi/DroidFS
aws-eks-iam-auth-controller - Kubernetes operator which consolidates custom resources into `aws-auth` ConfigMap.
syncthing-android - Wrapper of syncthing for Android.
usbd - User-Space Block Device (USBD) Framework (written in Go)
encfs - EncFS: an Encrypted Filesystem for FUSE.
rclone - "rsync for cloud storage" - Google Drive, S3, Dropbox, Backblaze B2, One Drive, Swift, Hubic, Wasabi, Google Cloud Storage, Azure Blob, Azure Files, Yandex Files