All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
[TOOL] KRYPTON - GPG Encrypted data network.
Lets welcome our new little project. P.S.: Unencrypted data will never touch our server, you will be sending the encrypted data only.
GPG Encrypted data network.
Krypton (from Ancient Greek: κρυπτός, romanized: kryptos 'the hidden one').
Download: https://krypton.monster/krypton.zip
Requirements: gpg, gpg-agent, curl
Usage: ./krypton "PRiVATE_KEY" "DATA_PASSWORD" "DATA"
Mirror the data: wget -m -np -c -R "index.html*" "https://krypton.monster/data/"
Verify: Every submitted GPG data will end having filename as SHA256 hash.
We use checksums, so you can always verify that the file was untouched - https://krypton.monster/data/0xF6FF5ADAB5180A3D10FFB611F2CADDD0A2B0922BDE398AD186E946480BEC3943/checksums.
Comments
So, because of encrypted data on your server it's best practice to keep the data folder publicly accessible
yes its publicly accessible since we do want to have it mirrored
Open source or...?
license is WTFPL, soon on github too
Wow. And how will users access mirrored data? Will the url change?
Where is your server located?
What's the SLA?
How do you handle takedown notices?
How do you manage bad data from not coming into your server?
Time before CP should be a common measurement
Your answers speak a lot. Good luck 👍
cp is all you think on ?
https://en.wikipedia.org/wiki/Human_rights_and_encryption
Nobody says that anonymous tools shouldn't exist, because you are right tools like TOR and other encryption tools are essential for journalists in high profile areas. However there is no getting around it that this will be used to distribute CP simply because any file sharing site that's anonymous will be used for this.
When it's the primary method used to attack privacy tools, I would find it to be a very bad blind spot if it weren't something you were thinking on.