Picocrypt addition #241
-
I think the project Picocrypt (https://github.com/HACKERALERT/Picocrypt) should be added to the website as a suggestion for file encryption. It's main function is to encrypt files with ChaCha20, and has other options such as encoding with Reed-Solomon, compressing files, encrypting with key files and a password generator. It's written entirely in Go, and has translations for Turkish, German, Brazilian Portuguese, Lithuanian, and Spanish. In addition to encrypting files, it also has a checksum generator and secure files shredder. It currently has downloads for Linux, Windows, and Mac. I'm not the developer, but it's a great light resource for quick and secure encryption. |
Beta Was this translation helpful? Give feedback.
Replies: 0 comments 49 replies
-
Disclaimer: I'm biased because I'm the developer of a similar tool and got into a spat with Evan/HACKERALERT, but I'll try and be objective with the following comments. I'm still in two minds about Picocrypt. On the one hand, it's a handy GUI version of tools like age. However, there are various things that can be critiqued, some of which I'm not convinced the developer is willing to accept based on my discussions with him. For instance:
I'll leave it for other people to decide whether the program should be added. Update (10/12/21)
|
Beta Was this translation helpful? Give feedback.
-
I strongly believe that, as the author of Picocrypt, it should be added to Privacy Guides. While I don't want to write a multi-page-long essay, there are a few important points I would like to highlight and will do so in the following paragraphs. To start, this discussion was not opened by me. The fact that a Picocrypt user took the time and initiative to create this discussion shows that there are people who believe that Picocrypt is worthy of adding to this awesome set of tools/guides. It's not just me pushing this forward, but also many of Picocrypt's users. The atmosphere of Picocrypt's subreddit is always positive and supportive. When I need some testers, there are people who voluntarily do testing on their machines, spin up VMs, and assist me with many of the tasks that I cannot do alone. Picocrypt has arguably one of the strongest communities out of all encryption tools, and that gives it the power to become better for everyone. How often do you see a dev within 24 hours of reach, spending over a hundred hours on a FOSS project, and making multiple posts each month to integrate feedback and connect with users? 😄 Picocrypt is an open-source encryption tool designed to be small in size, simple to use, yet highly secure. It's portable, dependency-free, and available for all three major platforms, and the executables don't require any root/admin privileges. There are no ads or telemetry, and the code is entirely open for viewing, with detailed instructions for building from source. And unlike some other tools, Picocrypt is a graphical application with a carefully thought out and community-contributed user interface. Not only is the GUI lightweight and featureful, but it's also intuitive and easy to use. Simplicity is an important part of Picocrypt because one of my goals was to make encryption simpler for everyone so that "non-technical" people like artists, doctors, etc. can have a highly secure tool they can trust, knowing that, unlike other complicated tools, there's no potential for a foot-gun as long as their password is well-chosen (which is why there is also a password and keyfile generator). And guess what? Picocrypt doesn't sacrifice customizability for simplicity. Not only is Picocrypt simple to use, but it's also highly customizable with loads of features and use-cases. For example, one of Picocrypt's features is Reed-Solomon encoding, which will encode all of your data with Reed-Solomon (an error correction code) to ensure that Picocrypt can recover broken bits and bytes if they corrupt. What's more, Picocrypt by default will encode the header, since it is the most important part of an encrypted volume. Very few tools, if any, do this by default to protect the salts, nonce, etc. Picocrypt does many precautions automatically, meaning that not only does the user not have to take any manual action, but also that if something does go wrong, Picocrypt will be resilient in handling it. 💪 In addition to encryption, Picocrypt can also generate checksums And with over 2k downloads, 250+ stars, ~100 active Snapcraft installs, $150+ donations, and ~200 subredditors, there are many reasons why it would help if Picocrypt was appended in the "Worth mentioning"... Not just for me, but for the future users who will find Picocrypt to be a valuable and reliable tool. And I'm sure that the many users of Picocrypt have my back on this. Here's a post in r/PrivacyToolsIO about Picocrypt that was taken very positively: https://www.reddit.com/r/privacytoolsIO/comments/m8jpu6/picocrypt_a_foss_3mb_encryption_tool/ I really hope that after more than half a year since my request on the old Privacy Tools issue page, we will make some progress on this. Picocrypt has grown considerably since then and is still constantly growing, with new users every day. Will Privacy Guides accept this privacy and security enhancing FOSS project? 🚀 🚀 🚀 Sincerely, |
Beta Was this translation helpful? Give feedback.
-
Hi, just dropping a small word here as a non-geek end user who was looking for an easy to use, security focused, UI based and cross-platform FOSS encryption app. I discovered Picocrypt by chance a few months ago and it ticked all the above cases. Sure, there's CLI alternatives out there for the *nix guys, but for the ordinary dude, a UI does matter. |
Beta Was this translation helpful? Give feedback.
-
Slight OT: The first two even have nice Android apps such as Open Keychain and DroidFS. |
Beta Was this translation helpful? Give feedback.
-
This was added when we did the migration privacyguides/privacyguides.org@8ef8e2a |
Beta Was this translation helpful? Give feedback.
This was added when we did the migration privacyguides/privacyguides.org@8ef8e2a