Multi-platform transparent client-side encryption of your files in the cloud
Go to file
2021-04-11 02:25:16 +02:00
.github allow use of reflection in codacy coverage reporter 2021-03-17 08:19:58 +01:00
.idea update to JDK 16 2021-03-17 08:16:26 +01:00
main Renamed errorComponent vars to genericErrorBuilder 2021-04-11 02:25:16 +02:00
.crowdin.yml more crowdin fine tuning 2019-10-01 15:26:18 +02:00
.gitignore Added .idea/uiDesigner.xml to .gitignore 2021-04-10 23:16:00 +02:00
cryptomator.png updated logo [ci skip] 2020-03-06 16:11:29 +01:00
LICENSE.txt Changed license to GPLv3 [ci skip] 2017-06-21 12:56:40 +02:00
README.md Update README.md 2021-03-26 10:46:49 +01:00

cryptomator

Build Known Vulnerabilities Codacy Badge Twitter Crowdin Latest Release Community

Supporting Cryptomator

Cryptomator is provided free of charge as an open-source project despite the high development effort and is therefore dependent on donations. If you are also interested in further development, we offer you the opportunity to support us:

Gold Sponsors

gee-whiz Proxy-Hub

Silver Sponsors

TheBestVPN

Introduction

Cryptomator offers multi-platform transparent client-side encryption of your files in the cloud.

Download native binaries of Cryptomator on cryptomator.org or clone and build Cryptomator using Maven (instructions below).

Features

  • Works with Dropbox, Google Drive, OneDrive, ownCloud, Nextcloud and any other cloud storage service which synchronizes with a local directory
  • Open Source means: No backdoors, control is better than trust
  • Client-side: No accounts, no data shared with any online service
  • Totally transparent: Just work on the virtual drive as if it were a USB flash drive
  • AES encryption with 256-bit key length
  • File names get encrypted
  • Folder structure gets obfuscated
  • Use as many vaults in your Dropbox as you want, each having individual passwords
  • Two thousand commits for the security of your data!! 🎉

Privacy

  • 256-bit keys (unlimited strength policy bundled with native binaries)
  • Scrypt key derivation
  • Cryptographically secure random numbers for salts, IVs and the masterkey of course
  • Sensitive data is wiped from the heap asap
  • Lightweight: Complexity kills security

Consistency

  • HMAC over file contents to recognize changed ciphertext before decryption
  • I/O operations are transactional and atomic, if the filesystems support it
  • Each file contains all information needed for decryption (except for the key of course), no common metadata means no SPOF

Security Architecture

For more information on the security details visit cryptomator.org.

Building

Dependencies

  • JDK 16 (e.g. adoptopenjdk)
  • Maven 3
  • Optional: OS-dependent build tools for native packaging (see Windows, OS X, Linux)

Run Maven

cd main
mvn clean install -Prelease,windows
# or mvn clean install -Prelease,mac
# or mvn clean install -Prelease,linux

This will build all the jars and bundle them together with their OS-specific dependencies under main/buildkit/target. This can now be used to build native packages.

Start Cryptomator

If you unzip the buildkit for your OS, you will find a launcher script with some basic settings. You might want to adjust these to your needs. To start Cryptomator, simply execute the launcher script from a terminal, e.g. launcher-linux.sh, if you're on a Linux system.

License

This project is dual-licensed under the GPLv3 for FOSS projects as well as a commercial license for independent software vendors and resellers. If you want to modify this application under different conditions, feel free to contact our support team.