Go to file
DianaXWiki b009ccdd65 Make button appear at the top of the page for small screens #1370 2024-08-03 20:51:58 +03:00
.github Bump more version numbers 2024-07-25 14:46:06 +01:00
.reuse Replace lesshint dev dependency 2024-06-24 18:03:44 +02:00
LICENSES Add licensing info for everything in www/lib 2023-10-23 12:26:17 +01:00
config Merge branch 'main' into staging 2024-06-24 16:51:04 +02:00
customize.dist Enable Arabic, Swedish and Cuban Spanish languages 2024-07-24 12:08:52 +02:00
docs Merge branch 'staging' into 2024.6-test 2024-06-24 17:06:06 +02:00
lib lint compliance 2024-07-23 13:06:36 +02:00
scripts Merge branch 'appconfig_ui' into 2024.6-test 2024-06-21 18:47:44 +02:00
www Make button appear at the top of the page for small screens #1370 2024-08-03 20:51:58 +03:00
.dockerignore Remove OnlyOffice from docker image and install on startup 2024-03-20 13:15:29 +01:00
.editorconfig REUSE lint compliance 2024-04-04 11:09:39 +01:00
.eslintignore Merge branch 'staging' into plugins 2024-06-21 17:01:45 +02:00
.eslintrc.js Update linter rules 2024-07-18 15:42:56 +01:00
.gitignore Merge branch 'staging' into editorconfig 2024-03-20 14:53:15 +01:00
.stylelintrc.js Replace lesshint dev dependency 2024-06-24 18:03:44 +02:00
CHANGELOG.md Add changelog for 2024.6.1 2024-07-25 14:09:21 +01:00
CODE_OF_CONDUCT.md Update CODE_OF_CONDUCT.md 2023-12-29 09:48:30 +01:00
Dockerfile Removed a superfluous apt install statement. 2024-07-02 19:13:30 +10:00
LICENSE #2 added license 2014-12-05 11:01:43 +01:00
SECURITY.md Add licensing information to new files 2023-12-19 11:38:26 +00:00
docker-compose.yml Remove obsolete from 2024-07-01 16:47:05 +02:00
docker-entrypoint.sh Added new install-onlyoffice.sh switch to docker-entrypoint.sh 2024-07-02 09:48:39 +10:00
install-onlyoffice.sh Fix broken OnlyOffice Document 2024-07-23 16:31:49 +02:00
package-lock.json Bump more version numbers 2024-07-25 14:46:06 +01:00
package.json Update version strings 2024-07-25 13:54:11 +01:00
readme.md Fix typos in readme 2024-06-25 14:56:09 +02:00
screenshot-suite.png Update Readme 2022-10-03 16:13:10 +01:00
screenshot.png Update Readme 2022-10-03 16:13:10 +01:00
server.js Merge branch 'appconfig_ui' into 2024.6-test 2024-06-21 18:47:44 +02:00

readme.md

CryptPad

CryptPad is a collaboration suite that is end-to-end-encrypted and open-source. It is built to enable collaboration, synchronizing changes to documents in real time. Because all data are encrypted, in the eventuality of a breach, attackers have no way of seeing the stored content. Moreover, if the administrators dont alter the code, they and the service also cannot infer any piece of information about the users' content.

Drive screenshot

Suite screenshots

Installation

For development

Our developer guide provides instructions for setting up a local instance without HTTPS or our more advanced security features.

For production

Configuring CryptPad for production requires a little more work, but the process is described in our admin installation guide. From there you can find more information about customization and maintenance.

Current version

The most recent version and all past release notes can be found on the releases page on GitHub.

Setup using Docker

You can find Dockerfile, docker-compose.yml and docker-entrypoint.sh files at the root of this repository. We also publish every release on Docker Hub as AMD64 & ARM64 official images.

Previously, Docker images were community maintained, had their own repository and weren't official supported. We changed that with v5.4.0 during July 2023. Thanks to @promasu for all the work on the community images.

Privacy / Security

CryptPad offers a variety of collaborative tools that encrypt your data in your browser before it is sent to the server and your collaborators. In the event that the server is compromized, the database holds encrypted data that is not of much value to attackers.

The code which performs the encryption is still loaded from the host server like any other web page, so you still need to trust the administrator to keep their server secure and to send you the right code. An expert can download code from the server and check that it isn't doing anything malicious like leaking your encryption keys, which is why this is considered an active attack.

The platform is designed to minimize what data is exposed to its operators. User registration and account access are based on cryptographic keys that are derived from your username and password. Hence, the server never needs to see either, and you don't need to worry about whether they are being stored securely. It is impossible to verify whether a server's operators are logging your IP or other activity, so if you consider this information sensitive it is safest to assume it is being recorded and access your preferred instance via Tor browser.

A correctly configured instance has safeguards to prevent collaborators from doing some nasty things like injecting scripts into collaborative documents or uploads. The project is actively maintained and bugs that our safeguards don't catch tend to get fixed quickly. For this reason it is best to only use instances that are running the most recent version, which is currently on a three-month release cycle. It is difficult for a non-expert to determine whether an instance is otherwise configured correctly, so we are actively working on allowing administrators to opt in to a public directory of servers that meet our strict criteria for safety.

For end users, a guide is provided in our blog to help understand the security of CryptPad. This blog post also explains and show the best practices when using CryptPad and clarify what end-to-end encryption entails and not.

Translations

CryptPad can be translated with nothing more than a web browser via our Weblate instance. See the state of the translated languages:

More information about this can be found in our translation guide.

Contacting Us

The best places to reach the development team and the community are the CryptPad Forum and the Matrix chat

The team is also on the fediverse: @cryptpad@fosstodon.org

Team

CryptPad is actively developed by a team at XWiki SAS, a company that has been building Open-Source software since 2004 with contributors from around the world. Between 2015 and 2019 it was funded by a research grant from the French state through BPI France. In the years since we have been funded by NLnet PET, NGI TRUST, NGI DAPSI, subscribers of CryptPad.fr, and donations to our Open-Collective campaign.

Contributing

We love Open Source and we love contribution. Learn more about contributing.

If you have any questions or comments, or if you're interested in contributing to CryptPad, come say hi in our Matrix channel.

This project is tested with BrowserStack.

License

AGPL logo

This software is and will always be available under the GNU Affero General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. If you wish to use this technology in a proprietary product, please contact sales@cryptpad.org