Go to file
ansuz 98df612eb4 ignore shell scripts in the project root 2021-08-04 13:25:48 +05:30
.github/ISSUE_TEMPLATE reorder one section of the initial instance configuration issue template 2021-05-06 12:01:36 +05:30
config provide installMethod detail in server telemetry 2021-06-22 16:32:33 +05:30
customize.dist Merge branch 'staging' into collapse-toolbar 2021-08-03 14:30:37 +05:30
docs check COOP headers for multiple endpoints 2021-07-01 16:42:09 +05:30
lib remove hardcoded translations and defer non-blocking issues till the next release 2021-07-27 03:40:03 +05:30
scripts remove local benchmarking test with hardcoded values 2021-07-06 15:47:34 +05:30
www implement main toolbar collapse button 2021-08-03 16:19:50 +05:30
.bowerrc Added cryptsheet to cryptpad suite! 2015-01-29 17:55:18 +01:00
.flowconfig Fix flow, which tries reading random .json files, including test files which are invalid json :D 2017-12-08 16:37:33 +01:00
.gitignore ignore shell scripts in the project root 2021-08-04 13:25:48 +05:30
.jshintignore ignore onlyoffice/v4 when linting 2021-03-18 10:42:05 +05:30
.jshintrc check for invalid typeof checks 2017-12-05 15:08:01 +01:00
.lesshintrc lesshint compliance 2018-07-18 14:31:01 +02:00
CHANGELOG.md update changelog 2021-08-04 11:37:45 +05:30
CODE_OF_CONDUCT.md Update CODE_OF_CONDUCT.md 2019-04-17 13:14:48 +02:00
LICENSE #2 added license 2014-12-05 11:01:43 +01:00
and_so_it_begins.png Compressed images: PNG recompressed pixel identical, JPGs recompressed visually identically. Saving about 9.8%≈580kB overall, to speed up initial and repeating client connections. 2017-10-14 00:31:31 +02:00
bower.json strict semver for bootstrap-tokenfield 2021-04-20 13:30:55 +05:30
cryptofist.png Compressed images: PNG recompressed pixel identical, JPGs recompressed visually identically. Saving about 9.8%≈580kB overall, to speed up initial and repeating client connections. 2017-10-14 00:31:31 +02:00
package-lock.json update version string to 4.9.0 2021-07-27 05:27:05 +05:30
package.json update version string to 4.9.0 2021-07-27 05:27:05 +05:30
readme.md Add information to Readme introduction 2021-06-16 09:23:51 +01:00
screenshot.png Update readme and screenshot 2020-08-06 14:51:30 +01:00
server.js check COOP headers for multiple endpoints 2021-07-01 16:42:09 +05:30

readme.md

CryptPad

CryptPad is a collaboration suite that is end-to-end-encrypted and open-source. It is built to enable collaboration, synchronizing changes to documents in real time. Because all data is encrypted, the service and its administrators have no way of seeing the content being edited and stored.

CryptPad screenshot

Installation

For development

Our developer guide provides instructions for setting up a local instance without HTTPS or our more advanced security features.

For production

Configuring CryptPad for production requires a little more work, but the process is described in our admin installation guide. From there you can find more information about customization and maintenance.

Current version

The most recent version and all past release notes can be found here.

Setup using Docker

See Cryptpad-Docker repository for details on how to get up-and-running with Cryptpad in Docker. This repository is maintained by the community and not officially supported.

Security

CryptPad offers a variety of collaborative tools that encrypt your data in your browser before it is sent to the server and your collaborators. In the event that the server is compromized the database holds encrypted data that is not of much value to attackers.

The code which performs the encryption is still loaded from the host server like any other web page, so you still need to trust the administrator to keep their server secure and to send you the right code. An expert can download code from the server and check that it isn't doing anything malicious like leaking your encryption keys, which is why this is considered an active attack.

The platform is designed to minimize what data is exposed to its operators. User registration and account access is based on a cryptographic key that is derived from your username and password so the server never needs to see either and you don't need to worry about whether they are being stored securely. It is impossible to verify whether a server's operators are logging your IP or other activity, so if you consider this information sensitive it is safest to assume it is being recorded and access your preferred instance via Tor browser.

A correctly configured instance has safeguards to prevent collaborators from doing some nasty things like injecting scripts into collaborative documents or uploads. The project is actively maintained and bugs that our safeguards don't catch tend to get fixed quickly. For this reason it is best to only use instances that are running the most recent version, which is currently on a three-week release cycle. It is difficult for a non-expert to determine whether an instance is otherwise configured correctly, so we are actively working on allowing administrators to opt in to a public directory of servers that meet our strict criteria for safety.

Translations

CryptPad can be translated with nothing more than a web browser via our Weblate instance. More information about this can be found in our translation guide.

Contacting Us

You can reach members of the CryptPad development team on Twitter, via our GitHub issue tracker, on our Matrix channel, or by e-mail.

Team

CryptPad is actively developed by a team at XWiki SAS, a company that has been building Open-Source software since 2004 with contributors from around the world. Between 2015 and 2019 it was funded by a research grant from the French state through BPI France. In the years since we have been funded by NLnet PET, NGI TRUST, NGI DAPSI, subscribers of CryptPad.fr, and donations to our Open-Collective campaign.

Contributing

We love Open Source and we love contribution. Learn more about contributing.

If you have any questions or comments, or if you're interested in contributing to Cryptpad, come say hi in our Matrix channel.

License

AGPL logo

This software is and will always be available under the GNU Affero General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. If you wish to use this technology in a proprietary product, please contact sales@xwiki.com.