cryptpad/readme.md

51 lines
2.2 KiB
Markdown
Raw Normal View History

2014-10-31 23:42:58 +08:00
# CryptPad
Unity is Strength - Collaboration is Key
## hold on, it's still a prototype...
2014-10-31 23:42:58 +08:00
![and_so_it_begins.png](https://github.com/cjdelisle/cryptpad/raw/master/and_so_it_begins.png "We are the 99%")
2014-11-01 00:05:09 +08:00
CryptPad is the **zero knowledge** realtime collaborative editor.
2014-10-31 23:42:58 +08:00
Encryption carried out in your web browser protects the data from the server, the cloud
2014-10-31 23:44:26 +08:00
and the NSA. This project uses the [CKEditor] Visual Editor and the [ChainPad] realtime
2014-10-31 23:42:58 +08:00
engine. The secret key is stored in the URL [fragment identifier] which is never sent to
the server but is available to javascript so by sharing the URL, you give authorization
2014-10-31 23:44:26 +08:00
to others who want to participate.
2014-10-31 23:42:58 +08:00
2014-10-31 23:44:26 +08:00
To install:
2014-10-31 23:42:58 +08:00
2014-10-31 23:44:26 +08:00
git clone <this repo>
npm install
npm install -g bower ## if necessary
bower install
## copy config.js.dist to config.js and modify configuration (use your own mongodb instance)
2014-10-31 23:44:26 +08:00
node ./server.js
2014-10-31 23:42:58 +08:00
## Security
CryptPad is *private* not *anonymous*. Privacy protects your data, anonymity protects you.
As such, it is possible for a collaborator on the pad to include some silly/ugly/nasty things
in a CryptPad such as an image which reveals your IP address when your browser automatically
loads it or a script which plays Rick Asleys's greatest hits. It is acceptable for anyone
who does not have the key to be able to change anything in the pad or add anything, even the
server.
The server does have a certain power, it can send you evil javascript which does the wrong
thing (leaks the key or the data back to the server or to someone else). This is however an
[active attack] which makes it detectable. The NSA really hates doing these because they might
get caught and laughed at and humiliated in front of the whole world (again). If you're making
the NSA mad enough for them to use an active attack against you, Great Success Highfive, now take
the battery out of your computer before it spawns Agent Smith.
Still there are other low-lives in the world so using CryptPad over HTTPS is probably a good idea.
2014-10-31 23:44:26 +08:00
[ChainPad]: https://github.com/xwiki-contrib/chainpad
[CKEditor]: http://ckeditor.com/
[fragment identifier]: https://en.wikipedia.org/wiki/Fragment_identifier
[active attack]: https://en.wikipedia.org/wiki/Attack_(computing)#Types_of_attacks