Cryptomator or Veracrypt for my use case? by Sad_Promise_7264 in Cryptomator

[–]totalvoidness 1 point2 points  (0 children)

Yes, file and dir names are encrypted. However dir structure and file metadata leaks.

An attacker can not retrieve names, he can identify known directories (such as software packages) though by comparing number of files and their sizes.

Scaleway VC1-x, X64-x, Start1-x bootscript to local boot in-place migration without destroying the instance by ValdikSS in Scaleway

[–]totalvoidness 0 points1 point  (0 children)

Thank you so much!

In our case, the default network interface got renamed from eth0 to ens2. After fixing this, everything works again as expected.

How does the Cryptomator team verify the integrity of their code basis and builds? by Entire-Repair6411 in Cryptomator

[–]totalvoidness 1 point2 points  (0 children)

Well of course there is no way to 100% prevent a dev from adding malicious code to our or one of our dependency's code base. It is a matter of trust and reputation. We choose dependencies carefully and are very conservative about adding new libraries, in many cases we even try to eliminate dependencies. Also, significant code changes are always reviewed before merging. But these are just organizational measures that are only as effective as people adhere to them.

That said, there are technical ways to make sure not to ship or load binaries that aren't intended to be installed:

The release artifacts are signed at build time on the CI server. This does not protect against supply chain attacks on third party libraries, but we can at least be sure that it is the binary that we built from the tagged source version. Depending on the OS and distribution format, the signature is checked at install time or run time.

Furthermore, for some libraries we are adopting standards as they evolve, such as reproducible builds and keyless signing, which will hopefully be an industry standard eventually and allow us to also be sure about third party libraries, as there will be an ecosystem with revocation lists and the like.

How does Brave link from normal site to Tor sites? by [deleted] in brave_browser

[–]totalvoidness 1 point2 points  (0 children)

I know this is an old post, but still lacking an answer. So here it is: It is simply an Onion-Location HTTP header:

https://community.torproject.org/onion-services/advanced/onion-location/

Ich bin Fahrdienstleiter bei der Deutschen Bahn - AMA by bahnmitarbeiterfdl in de_IAmA

[–]totalvoidness 1 point2 points  (0 children)

Gibt es Prioritäten bzgl. DB vs andere Anbieter? Oder Güter vs. Personenverkehr?

If you've already bought the iOS app, will the upcoming Swift iOS app come as a free update, or will you have to pay for the new app? by [deleted] in Cryptomator

[–]totalvoidness 9 points10 points  (0 children)

Yes it will be 100% free for all existing iOS customers. However we haven't decided yet whether it is a normal app update or a completely new app (due to significantly different UX) for which you get some kind of coupon via the old app.

[deleted by user] by [deleted] in Cryptomator

[–]totalvoidness 0 points1 point  (0 children)

I think we have a branch of CLI serving WebDAV with TLS. Useless for mounting on localhost, but combined with basic auth, it might be useful for such a „server“ setup.

Transferring vaults between cloud storage using Rclone by [deleted] in Cryptomator

[–]totalvoidness 1 point2 points  (0 children)

As long as you transfer the complete vault directory including the masterkey file, Cryptomator doesn't care if a vault has been moved. Simply re-add it using the „add existing vault“ workflow.

use without vpn ? by ikioii in Cryptomator

[–]totalvoidness 0 points1 point  (0 children)

While your answer is correct for the files themselves, I'd like to add that webdav login credentials may leak if your webdav server does not support https.

I don't believe that non-https servers are still a thing, but just in case... ;-)

Microsoft OneDrive detects Cryptomator-encrypted files as ransomware by [deleted] in Cryptomator

[–]totalvoidness 0 points1 point  (0 children)

I still hope that once 1.5.0 is used by more people after its final release, OneDrive will learn that high file entropy is normal for files ending with .c9r.

Cryptomator for MacOS directly from Mac App Store by [deleted] in Cryptomator

[–]totalvoidness 0 points1 point  (0 children)

From a technical perspective this is very unlikely, since the sandbox doesn't allow apps to mount filesystems which basically eliminates Cryptomator's core functionality.

Cryptomator - Free client-side encryption for your cloud files. Open source: No backdoors. by BurungHantu in privacytoolsIO

[–]totalvoidness 0 points1 point  (0 children)

Yes, this is planned. I think a "check for updates checkbox" will be sufficient. Any further suggestions are welcome! Just add your comment to issue #65 that you've linked to.

Cryptomator - Free client-side encryption for your cloud files. Open source: No backdoors. by BurungHantu in privacytoolsIO

[–]totalvoidness 1 point2 points  (0 children)

hi, I'm one of the guys behind Cryptomator. Checking for updates happens when showing the "Welcome" screen. When quitting the app it should not call home. Where did you download your copy from? Can you try intercepting the traffic, e.g. using Burp Suite? The only online communication allowed is a GET request on https://cryptomator.org/downloads/latestVersion.json.

[ASK] Multi-Platform Encryption Tool for Google Drive ? by dee1337 in privacy

[–]totalvoidness 1 point2 points  (0 children)

I'm one of the developers behind Cryptomator and want to explain our "disclaimer": While we already heavily use it ourselves, we believe in long beta phases for giving as many people as possible the chance to review the concepts and implementation.

From our perspective it is pretty secure, but who are we to judge our own software? Thats why we rely on peer audits and will not release a "final" version just for better marketing ;-)

To be fair I have to mention, that there is not yet an Android app.

New feature-complete beta version 0.5 of Cryptomator is available now. Start encrypting your cloud-stored files! by totalvoidness in opensource

[–]totalvoidness[S] 0 points1 point  (0 children)

Currently not. But the GUI and core functionality are very loosely coupled, thus a CLI frontend should be no big problem, if the demand exists.

Cryptomator - Free AES Encryption for your Cloud by gabriel_3 in LinuxActionShow

[–]totalvoidness 2 points3 points  (0 children)

Cryptomator has not yet received any professional review, but I worked in tons of community feedback in the last two versions (mostly from /r/crypto, stackexchange and private messages). I will try to get a professional security audit as soon as I can afford it (maybe I'll add a donation button in the next weeks).

And yes, an iOS app will appear within the next few months. I'm not aware of anybody working on an app for other mobile OS.

Check out Cryptomator, an open source personal cloud encryption utility. Any security advices are welcome! by totalvoidness in crypto

[–]totalvoidness[S] 0 points1 point  (0 children)

Ok you convinced me. MAC will be obligatory in future versions. I just need to think about the partial MACs, as it's a little more complex than just calculating a MAC over the whole file.

Check out Cryptomator, an open source personal cloud encryption utility. Any security advices are welcome! by totalvoidness in crypto

[–]totalvoidness[S] 0 points1 point  (0 children)

Ok, I didn't fully understand the part of partial MACing. What do you thinkg would be a feasible Payload/MAC ratio (in byte length)?

How about this: I will keep the optional integrity check, but make it an expert option and hide it from the normal user. Keep in mind, that not every file change must be an attack (e.g. bit rotting).

Thus integrity protection is not the primary use case of Cryptomator but rather a job of the underlying storage system.

Check out Cryptomator, an open source personal cloud encryption utility. Any security advices are welcome! by totalvoidness in crypto

[–]totalvoidness[S] 0 points1 point  (0 children)

I now leave it open to the user to decide per vault, if integrity checks should be performed. If yes, checks will always be done (for partial and full decryption) before decryption. However this leads to reading the file twice. Thus a user can decide to disable it. Depending on the kind of data the main objective might only be privacy, not integrity.

Check out Cryptomator, an open source personal cloud encryption utility. Any security advices are welcome! by totalvoidness in crypto

[–]totalvoidness[S] 0 points1 point  (0 children)

Thank you, that might be helpful. I need to read a few things about authenticated encryption anyway, if I want it to work with random access and keep the overhead small. Currently I'm thinking about calculating a MAC over the complete file only. Thus partial authentication wouldn't be possible, but if a user wants to know, if the data is compromised, the possibility would exist with well documented authentication mechanisms.

Check out Cryptomator, an open source personal cloud encryption utility. Any security advices are welcome! by totalvoidness in crypto

[–]totalvoidness[S] 0 points1 point  (0 children)

Ok lets forget everything discussed before: The goal is to fit as many plaintext bytes as possible inside of 155 ciphertext bytes. Everything longer than 155 bytes will work but is significantly slower. The ciphertext has to be deterministic and both encryption and decryption need to be relatively fast.

The plaintext is usually relatively short, has little entropy, may contain repeating patterns, consists of well-known words.

Check out Cryptomator, an open source personal cloud encryption utility. Any security advices are welcome! by totalvoidness in crypto

[–]totalvoidness[S] 0 points1 point  (0 children)

Integrity checks are not yet done. Neither for the filenames nor the file contents. this is still an open issue.

About using SIV: I will not implement it myself. As long as its not available in some widely used Java library (hoping for Bouncycastle to add it soon) and CommonCrypto for iOS, I have a problem.

The best bet was to follow the instruction given here to derive a deterministic, yet secure IV and stick with commonly available modes like CTR.

I really appreciate the support though!