mirror of
https://github.com/Picocrypt/Picocrypt.git
synced 2025-05-12 05:48:30 +02:00
Merge branch 'main' into start-on-enter
Some checks are pending
CodeQL / Analyze (push) Waiting to run
Some checks are pending
CodeQL / Analyze (push) Waiting to run
This commit is contained in:
commit
0a061a20b8
3 changed files with 95 additions and 3 deletions
1
.github/ISSUE_TEMPLATE/config.yml
vendored
Normal file
1
.github/ISSUE_TEMPLATE/config.yml
vendored
Normal file
|
@ -0,0 +1 @@
|
|||
blank_issues_enabled: false
|
91
.github/ISSUE_TEMPLATE/default.yml
vendored
Normal file
91
.github/ISSUE_TEMPLATE/default.yml
vendored
Normal file
|
@ -0,0 +1,91 @@
|
|||
name: Default template
|
||||
description: The default template for all issues
|
||||
body:
|
||||
- type: markdown
|
||||
attributes:
|
||||
value: |
|
||||
# Rules
|
||||
- type: markdown
|
||||
attributes:
|
||||
value: |
|
||||
**Please read this section carefully and completely. You may be blocked from this repository if you violate the rules.**
|
||||
- type: markdown
|
||||
attributes:
|
||||
value: |
|
||||
Picocrypt is a "finished" piece of software and is in a maintenance-only stage. This does not mean the software is old, outdated, or abandonware, but that the focus is on fixing bugs and ensuring the software continues to work smoothly as opposed to actively developing new features. As well, my time as the developer is limited considering that Picocrypt brings me no monetary benefit and is entirely a gift of my time and skill to the community.
|
||||
- type: markdown
|
||||
attributes:
|
||||
value: |
|
||||
*To ensure that issues remain relevant and as time-efficient as possible for me, please follow the guidelines below depending on the type/topic of your issue.*
|
||||
- type: markdown
|
||||
attributes:
|
||||
value: |
|
||||
### Bug reports or security issues
|
||||
- type: markdown
|
||||
attributes:
|
||||
value: |
|
||||
These are high-priority issues and the main purpose of this repository's issue tracker. Make the issue with a short description, and then once the issue is created, add a comment with as many details as possible. Ping me (@HACKERALERT) in the comment so that I can get to it as soon as possible. Keep in mind that I define "bug" as something wrong with Picocrypt's code itself. If it's not Picocrypt's fault, it's not a bug.
|
||||
- type: markdown
|
||||
attributes:
|
||||
value: |
|
||||
### Problems running/starting Picocrypt
|
||||
- type: markdown
|
||||
attributes:
|
||||
value: |
|
||||
Usually these issues are not directly caused by Picocrypt's code. Create the issue and in a separate comment, provide details about the environment you're running in (like OS, DE, etc.). **Do not ping me initially.** Let the issue sit for at least *3 days* to allow other users to potentially help you resolve the issue. If after 3 days, you haven't figured things out, then you may ping me (@HACKERALERT).
|
||||
- type: markdown
|
||||
attributes:
|
||||
value: |
|
||||
### Antivirus problems
|
||||
- type: markdown
|
||||
attributes:
|
||||
value: |
|
||||
These are unpreventable; Picocrypt is cryptography, file deletion, and passwords bundled into an executable... which looks similar to ransomware, unfortunately. Please report these false positives to your antivirus software provider and do not create an issue about it.
|
||||
- type: markdown
|
||||
attributes:
|
||||
value: |
|
||||
### Support requests/usage questions
|
||||
- type: markdown
|
||||
attributes:
|
||||
value: |
|
||||
Create the issue and ask your question or support request in a separate comment. **Do not ping me initially.** Let the issue sit for at least *5 days* to give other users a chance to help you first. If after 5 days, you have not received any assistance, then you may ping me (@HACKERALERT).
|
||||
- type: markdown
|
||||
attributes:
|
||||
value: |
|
||||
### Feature requests/suggestions
|
||||
- type: markdown
|
||||
attributes:
|
||||
value: |
|
||||
Picocrypt is mature software; I do not intend to add any new features. Generally, do not create any feature requests unless it's very minor and can be implemented with low effort and minimal impact on reliability and security. What is considered "minor" is subjective, but here is an example: "the ability to decrypt a volume entirely in-memory" is pretty significant, while "auto start encryption on pressing the Enter key" is relatively minor. A proof-of-concept link to code or a fork would be appreciated.
|
||||
- type: markdown
|
||||
attributes:
|
||||
value: |
|
||||
### Performance issues/improvements
|
||||
- type: markdown
|
||||
attributes:
|
||||
value: |
|
||||
Picocrypt prioritizes correctness and reliability over performance, so many parts of the code are written sequentially and don't use concurrency. This is intentional and need not be pointed out. Unless performance is absolutely atrocious to the point where it is indicative of a potential bug, do not make issues about performance.
|
||||
- type: markdown
|
||||
attributes:
|
||||
value: |
|
||||
### Other issues/generic topics
|
||||
- type: markdown
|
||||
attributes:
|
||||
value: |
|
||||
You will have to use your best judgement here. Read the sections above to get an idea of what I expect to see and do what you think is best. Ideally, ping me only if sufficient time has passed for other users to assist/answer you, or it is best addressed by me directly.
|
||||
- type: checkboxes
|
||||
attributes:
|
||||
label: "Please confirm:"
|
||||
options:
|
||||
- label: "I have carefully read and agree to the rules outlined above"
|
||||
required: true
|
||||
- label: "I will provide as many helpful details as possible"
|
||||
required: true
|
||||
- label: "I acknowledge my issue may be ignored or closed without explanation"
|
||||
required: true
|
||||
- type: input
|
||||
attributes:
|
||||
label: "Describe the issue briefly in a few sentences:"
|
||||
description: "You can add more details in a separate comment after creating the issue."
|
||||
validations:
|
||||
required: true
|
|
@ -36,8 +36,8 @@ A command-line interface is available for Picocrypt <a href="https://github.com/
|
|||
## Web
|
||||
A functionally limited web app is available <a href="https://picocrypt.github.io/">here</a> which allows you to encrypt and decrypt standard Picocrypt volumes (no advanced features or keyfiles) on any modern browser, including mobile devices. It's a simple, future-proof way to encrypt files that should work indefinitely due to the web's stable nature. Note that you can only encrypt single files up to a maximum size of 1 GiB.
|
||||
|
||||
## Mobile
|
||||
An experimental project <a href="https://github.com/Picocrypt/PicoGo">PicoGo</a> is a community-developed port of Picocrypt to platforms like Android and iOS using the Fyne GUI library. Feel free to try it out, but keep in mind that it is not part of the official core Picocrypt project (like the platforms listed above) and thus not subject to the same scrutiny and standards that the core project is. So, **use it with caution and diligence** during its experimental phase.
|
||||
## Mobile 🚧
|
||||
An experimental project <a href="https://github.com/Picocrypt/PicoGo">PicoGo</a> is a community-developed port of Picocrypt to platforms like Android and iOS using the Fyne GUI library. Feel free to try it out, but keep in mind that it is *not* part of the official core Picocrypt project (like the platforms listed above) and thus not subject to the same scrutiny and standards that the core project is. So, **use it with caution and diligence** during its experimental phase.
|
||||
|
||||
# Why Picocrypt?
|
||||
Why should you use Picocrypt instead of VeraCrypt, 7-Zip, BitLocker, or Cryptomator? Here are a few reasons why you should choose Picocrypt:
|
||||
|
@ -99,7 +99,7 @@ When encrypting multiple files, Picocrypt will automatically zip them into one f
|
|||
To mitigate these caveats, Picocrypt will show info and warning labels accordingly. However, it is best to prevent these issues altogether <strong>by always encrypting and decrypting on your main host drive</strong> and then copying encrypted volumes to and from external sources, <strong>or zipping up input files beforehand and encrypting that single file</strong> which doesn't have these caveats.
|
||||
|
||||
# Security
|
||||
For more information on how Picocrypt handles cryptography, see <a href="Internals.md">Internals</a> for the technical details. If you're worried about the safety of me or this project, let me assure you that this repository won't be hijacked or backdoored. I have 2FA (TOTP) enabled on all accounts with a tie to Picocrypt (GitHub, Reddit, Google, etc.), in addition to full-disk encryption on all of my portable devices. For further hardening, Picocrypt uses my isolated forks of dependencies and I fetch upstream only when I have taken a look at the changes and believe that there aren't any security issues. This means that if a dependency gets hacked or deleted by the author, Picocrypt will be using my fork of it and remain completely unaffected. You can feel confident about using Picocrypt as long as you understand:
|
||||
For more information on how Picocrypt handles cryptography, see <a href="Internals.md">Internals</a> for the technical details. If you're worried about the safety of me or this project, let me assure you that this repository won't be hijacked or backdoored. I have 2FA (TOTP) enabled on all accounts with a tie to Picocrypt (GitHub, etc.), in addition to full-disk encryption on all of my portable devices. For further hardening, Picocrypt uses my isolated forks of dependencies and I fetch upstream only when I have taken a look at the changes and believe that there aren't any security issues. This means that if a dependency gets hacked or deleted by the author, Picocrypt will be using my fork of it and remain completely unaffected. I've also meticulously gone through every single setting in the Picocrypt organization and repos, locking down access behind multiple layers of security such as read-only base-level member permissions, required PRs and mandatory approvals (which no one can do but me), mandatory CODEOWNERS approvals, and I'm the only member of the Picocrypt organization and repos (except for PicoGo). You can feel confident about using Picocrypt as long as you understand:
|
||||
|
||||
<strong>Picocrypt operates under the assumption that the host machine it is running on is safe and trusted. If that is not the case, no piece of software will be secure, and you will have much bigger problems to worry about. As such, Picocrypt is designed for the offline security of volumes and does not attempt to protect against side-channel analysis.</strong>
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue