Collaborative office suite, end-to-end encrypted and open-source.
Find a file
ansuz f40b798d88 Merge pull request #30 from xwiki-labs/reconnect
Ability to reconnect after a connection failure
2016-08-25 17:57:45 +02:00
customize.dist lock options by default 2016-08-19 11:26:48 +02:00
storage add removeChannel documentation to storage/README 2016-05-14 13:50:25 +02:00
www Merge pull request #30 from xwiki-labs/reconnect 2016-08-25 17:57:45 +02:00
.bowerrc Added cryptsheet to cryptpad suite! 2015-01-29 17:55:18 +01:00
.gitignore Added testing and auto-testing with selenium 2016-04-20 18:58:02 +02:00
.jshintignore remove unused files from fs and jshintignore 2016-08-02 11:59:54 +02:00
.jshintrc jshint ignore external code 2016-02-15 16:51:54 +01:00
.travis.yml don't repeat travis calling npm install but do use https for https urls 2016-04-20 20:20:29 +02:00
and_so_it_begins.png and so it begins 2014-10-31 16:42:58 +01:00
ARCHITECTURE.md Add a working picture 2016-04-15 18:19:46 +02:00
bower.json depend on scrypt-async. you should update your bower deps 2016-08-22 11:40:01 +02:00
config.js.dist implement optional channel removal hooks 2016-05-14 13:04:05 +02:00
cryptofist.png now fix the logo again 2014-11-06 13:04:39 +01:00
LICENSE #2 added license 2014-12-05 11:01:43 +01:00
NetfluxWebsocketSrv.js If there are no checkpoints, the document fails to sync 2016-05-30 12:29:58 +02:00
package.json implement simple build system for static html 2016-08-16 17:58:30 +02:00
readme.md clarify how mitm attack is mitigated 2016-08-22 08:54:42 +08:00
server.js Support files other than index.html at server root 2016-08-16 17:28:49 +02:00
TestSelenium.js Remove the request to SauceLab's broken rest API which seems to explode when you hit it while a job is ongoing 2016-04-20 20:37:48 +02:00
WebRTCSrv.js Replace the Netflux old client (netflux.js) by the Netflux2 client. 2016-04-08 16:54:03 +02:00

XWiki labs logo

Unity is Strength - Collaboration is Key

and_so_it_begins.png

CryptPad is the zero knowledge realtime collaborative editor. Encryption carried out in your web browser protects the data from the server, the cloud and the NSA. This project uses the CKEditor Visual Editor and the ChainPad realtime engine. The secret key is stored in the URL fragment identifier which is never sent to the server but is available to javascript so by sharing the URL, you give authorization to others who want to participate.

To install:

git clone <this repo>
cd cryptpad
npm install
npm install -g bower ## if necessary
bower install

## copy config.js.dist to config.js
cp config.js.dist config.js

## modify configuration to use your own mongodb instance
## for example aon the default mongodb port `mongodb://localhost:27017/demo_database`
$EDITOR config.js

node ./server.js

Maintenance

To get access to the most recent codebase:

cd /your/cryptpad/instance/location;
git pull

To update dependencies:

# clientside dependencies
bower update;

# serverside dependencies
npm update;

To reset your instance of Cryptpad and remove all the data that is being stored:

If you are using the leveldb adaptor, this is as simple as deleting the folder which contains your leveldb datastore:

# change into your cryptpade directory
cd /your/cryptpad/instance/location;

# delete the datastore
rm -rf ./cryptpad.db

If you are using the mongodb adaptor, drop the relevant collection.

Testing

To test CryptPad, go to http://your.server:3000/assert/

You can use WebDriver to run this test automatically by running TestSelenium.js but you will need chromedriver installed. If you use Mac, you can brew install chromedriver.

Security

CryptPad is private, not anonymous. Privacy protects your data, anonymity protects you. As such, it is possible for a collaborator on the pad to include some silly/ugly/nasty things in a CryptPad such as an image which reveals your IP address when your browser automatically loads it or a script which plays Rick Astleys's greatest hits. It is possible for anyone who does not have the key to be able to change anything in the pad or add anything, even the server, however the clients will notice this because the content hashes in ChainPad will fail to validate.

The server does have a certain power, it can send you evil javascript which does the wrong thing (leaks the key or the data back to the server or to someone else). This is however an active attack which makes it detectable. The NSA really hates doing these because they might get caught and laughed at and humiliated in front of the whole world (again). If you're making the NSA mad enough for them to use an active attack against you, Great Success Highfive, now take the battery out of your computer before it spawns Agent Smith.

Still there are other low-lives in the world so using CryptPad over HTTPS is probably a good idea.

Contributing

We love Open Source and we love contribution. It is our intent to keep this project available under the AGPL license forever but in order to finance more development on this and other FOSS projects, we also wish to sell other licenses to this software. Before making a pull request, please read and sign the Commons Management Agreement.

If you have any questions or comments, or if you're interested in contributing to Cryptpad, come say hi on IRC, #cryptpad on Freenode.

License

This software is and will always be available under the GNU Affero General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. If you wish to use this technology in a proprietary product, please contact sales@xwiki.com