Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


[TOOL] KRYPTON - GPG Encrypted data network.
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

[TOOL] KRYPTON - GPG Encrypted data network.

Lets welcome our new little project. P.S.: Unencrypted data will never touch our server, you will be sending the encrypted data only.

GPG Encrypted data network.

Krypton (from Ancient Greek: κρυπτός, romanized: kryptos 'the hidden one').

Download: https://krypton.monster/krypton.zip

VirusTotal: https://www.virustotal.com/gui/url/7a12cd820fe15d8a4520038bde556cc78efdab3595f2270c71ff25bd15802de5/detection

Requirements: gpg, gpg-agent, curl

Usage: ./krypton "PRiVATE_KEY" "DATA_PASSWORD" "DATA"

Mirror the data: wget -m -np -c -R "index.html*" "https://krypton.monster/data/"

Verify: Every submitted GPG data will end having filename as SHA256 hash.
We use checksums, so you can always verify that the file was untouched - https://krypton.monster/data/0xF6FF5ADAB5180A3D10FFB611F2CADDD0A2B0922BDE398AD186E946480BEC3943/checksums.

Comments

  • So, because of encrypted data on your server it's best practice to keep the data folder publicly accessible

  • dIsKdIsK Member

    yes its publicly accessible since we do want to have it mirrored

  • Open source or...?

  • dIsKdIsK Member

    @Don_Keedic said: Open source or...?

    license is WTFPL, soon on github too

  • Wow. And how will users access mirrored data? Will the url change?
    Where is your server located?
    What's the SLA?
    How do you handle takedown notices?
    How do you manage bad data from not coming into your server?

  • jarjar Patron Provider, Top Host, Veteran

    Time before CP should be a common measurement

    Thanked by 2plumberg fart
  • dIsKdIsK Member
    • there will be a list of mirrors (if anyone will want mirror it)
    • behind multiple reverse proxies, does it matter a lot?
    • sla? idk lets find out ;)
    • takedown notices of what? of encrypted data?
    • bad data is what?
  • @dIsK said:

    • there will be a list of mirrors (if anyone will want mirror it)
    • behind multiple reverse proxies, does it matter a lot?
    • sla? idk lets find out ;)
    • takedown notices of what? of encrypted data?
    • bad data is what?

    Your answers speak a lot. Good luck 👍

  • dIsKdIsK Member

    @jar said: Time before CP should be a common measurement

    cp is all you think on ?

    https://en.wikipedia.org/wiki/Human_rights_and_encryption

  • @dIsK said:

    @jar said: Time before CP should be a common measurement

    cp is all you think on ?

    https://en.wikipedia.org/wiki/Human_rights_and_encryption

    Nobody says that anonymous tools shouldn't exist, because you are right tools like TOR and other encryption tools are essential for journalists in high profile areas. However there is no getting around it that this will be used to distribute CP simply because any file sharing site that's anonymous will be used for this.

    Thanked by 2jar fart
  • jarjar Patron Provider, Top Host, Veteran

    @dIsK said: cp is all you think on ?

    When it's the primary method used to attack privacy tools, I would find it to be a very bad blind spot if it weren't something you were thinking on.

Sign In or Register to comment.