You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
Go to file
yflory c2c5dbdb64 Remove hash when joining a team with a link 5 years ago
config set a default value and describe disableIntegratedTasks in the example config 5 years ago
customize.dist Merge branch 'staging' into inviteUI 5 years ago
docs Fix broken link in cryptpad-docker.md 5 years ago
lib guarantee asynchronous execution for batch reads and write queues 5 years ago
scripts lint compliance 5 years ago
storage guard against invoking a method of an undefined attribute, resulting in a memory puddle 5 years ago
www Remove hash when joining a team with a link 5 years ago
.bowerrc Added cryptsheet to cryptpad suite! 10 years ago
.dockerignore Add docker build to travis tests 7 years ago
.env adding docker and docker-compose 8 years ago
.flowconfig Fix flow, which tries reading random .json files, including test files which are invalid json :D 7 years ago
.gitignore ignore custom configs 6 years ago
.jshintignore lint compliance 5 years ago
.jshintrc check for invalid typeof checks 7 years ago
.lesshintrc lesshint compliance 7 years ago
.travis.yml disable flow 6 years ago
CHANGELOG.md update changelog for v3.8.0 5 years ago
CODE_OF_CONDUCT.md Update CODE_OF_CONDUCT.md 6 years ago
Dockerfile Bump NodeJS version to 10 to fix #447 5 years ago
LICENSE #2 added license 10 years ago
and_so_it_begins.png Compressed images: PNG recompressed pixel identical, JPGs recompressed visually identically. Saving about 9.8%≈580kB overall, to speed up initial and repeating client connections. 7 years ago
bower.json address jquery version conflict 5 years ago
container-start.sh Fix docker issues 6 years ago
cryptofist.png Compressed images: PNG recompressed pixel identical, JPGs recompressed visually identically. Saving about 9.8%≈580kB overall, to speed up initial and repeating client connections. 7 years ago
docker-compose.yml do some things with docker which I don't really understand 6 years ago
docker-install-tini.sh refactor docker to support arm32/arm64/amd64 all in one build 6 years ago
historyKeeper.js use nacl-fast in history keeper 5 years ago
import add import script so admins can migrate lvl to files 8 years ago
package-lock.json bump footer version 5 years ago
package.json bump footer version 5 years ago
readme.md Fix link to Docker wiki page on readme.md 5 years ago
rpc.js mkAsync getFileSize and getChannelList 5 years ago
screenshot.png Compressed images: PNG recompressed pixel identical, JPGs recompressed visually identically. Saving about 9.8%≈580kB overall, to speed up initial and repeating client connections. 7 years ago
server.js trim leading spaces from domains 5 years ago

readme.md

An XWiki Labs Project

CryptPad screenshot

CryptPad is the Zero Knowledge realtime collaborative editor.

Encryption carried out in your web browser protects the data from the server, the cloud and the NSA. It relies on the ChainPad realtime engine.

Installation

Installing CryptPad is pretty straightforward. You can read all about it in the installation guide.

It also contains information on keeping your instance of CryptPad up to date.

Current version

The most recent version and all past release notes can be found here.

Setup using Docker

See Cryptpad-Docker and the community wiki's Docker page for details on how to get up-and-running with Cryptpad in Docker.

Setup using Ansible

See Ansible Role for Cryptpad.

Security

CryptPad is private, not anonymous. Privacy protects your data, anonymity protects you. As such, it is possible for a collaborator on the pad to include some silly/ugly/nasty things in a CryptPad such as an image which reveals your IP address when your browser automatically loads it or a script which plays Rick Astleys's greatest hits. It is possible for anyone who does not have the key to be able to change anything in the pad or add anything, even the server, however the clients will notice this because the content hashes in CryptPad will fail to validate.

The server does have a certain power, it can send you evil javascript which does the wrong thing (leaks the key or the data back to the server or to someone else). This is however an active attack which makes it detectable. The NSA really hates doing these because they might get caught and laughed at and humiliated in front of the whole world (again). If you're making the NSA mad enough for them to use an active attack against you, Great Success Highfive, now take the battery out of your computer before it spawns Agent Smith.

Still there are other low-lives in the world so using CryptPad over HTTPS is probably a good idea.

Translations

We'd like to make it easy for more people to use encryption in their routine activities. As such, we've tried to make language-specific parts of CryptPad translatable. If you're able to translate CryptPad's interface, and would like to help, please contact us!

You can also see our translation guide.

Contacting Us

You can reach members of the CryptPad development team on Twitter, via our GitHub issue tracker, on our Matrix channel, or by e-mail.

Team

CryptPad is actively developed by a team at XWiki SAS, a company that has been building Open-Source software since 2004 with contributors from around the world. Between 2015 and 2019 it was funded by a research grant from the French state through BPI France. It is currently financed by NLnet PET, subscribers of CryptPad.fr and donations to our Open-Collective campaign.

Contributing

We love Open Source and we love contribution. Learn more about contributing.

If you have any questions or comments, or if you're interested in contributing to Cryptpad, come say hi on IRC, #cryptpad on Freenode.

License

AGPL logo

This software is and will always be available under the GNU Affero General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. If you wish to use this technology in a proprietary product, please contact sales@xwiki.com.