You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+5-10Lines changed: 5 additions & 10 deletions
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
3
3
A unique IPFS frontend that you can use to push your files through. Encrypt all traffic with a Asymmetric RSA keypair and GPG. Ensure that you can upload private data to IPFS, and only you can receive and view on another machine. The HTTPS of IPFS.
4
4
5
-
**Recommended to use keycard, Apex, or Keycard for Multi Factor Authentication (MFA), encrypting and decrypting data. Using IPFS in general.**
5
+
**Recommended to use PGPCard, Apex, or yubikey for Multi Factor Authentication (MFA), encrypting and decrypting data. Using IPFS in general.**
6
6
7
7
8
8
SecureIPFS is an application and library set that integrates the InterPlanetary File System (IPFS) with robust RSA encryption in Go, providing a secure method to store and retrieve files. It encrypts files before uploading to IPFS and decrypts them using a corresponding key pair.
@@ -13,29 +13,24 @@ SecureIPFS is an application and library set that integrates the InterPlanetary
13
13
- I can do this but some help would be appreciated.
14
14
- Just need to add IPFS Kubo implementation - this is just a front end for IPFS Get and IPFS Add.
15
15
16
-
2.**Keycard Implementation.**
16
+
2.**Apex /Flex Implementation.**
17
17
- This is stage two and if you are a developer wanting to help, make a fork, see /Docs/* and add your software, finish / upload with a pull request.
18
-
- Ive therorised a way to securely use the keycard for encrypting and decrypting data. Since a EDCSA Signature is unique to the signers private key and the data they are signing. This is all we need.
19
-
- You just reverse the process, the file is not being signed, the users unique passphrase is. This way the unique EDCSA signature is unique to the user and the application,
20
-
- This way an attacker cannot decrypt the IPFS data without the keycard, and they cant just scan the keycard, the need to know the passphrase used for that file, and swipe or otherwise steal the keycard.
21
-
- This is a way of using in vivo crypto coprocessors for secure MFA and file privacy / security.
18
+
- This integration has been restructured from using keycard due to a rather unorthodox workaround. Instead the project will now focus on using both Keycard and the PGP applet.
22
19
23
20
24
21
## From Dangerous Things with love.
25
22
26
-
The Apex Flex and FlexSecure allow us mortal humans to perform cryptographic functions in vivo (under the skin) this fact paired with the above cryptographic MFA, provides the user a secure way to keep their data safe.
23
+
The Apex Flex and FlexSecure allow us mortal humans to perform cryptographic functions in vivo (under the skin) this fact paired with the above cryptographic MFA (Coupling the GPG key from your card into IPFS), the program provides the user a secure way to keep their data safe.
You may be asking **"but satunix why is this so special?" "These implants can do PGP and OTP!!!"** Well, they sure can, but thats it, good luck loading several applets onto your keycard for each purpose, then trying to navigate and use all of the different block positions keys, algorithims.... and whatever tf. Me personally, I kave a FlexSecure loaded with Keycard. Thus, Keycard must be used for this process. This allows even the noobiest of users ease of control and access.
31
-
*A load and swipe process.*
32
27
33
28
>"The ability to carry your OTP authenticator, PGP, and other cryptographic keys, and perform cryptographic functions all in vivo (generate OTP codes, encrypt & decrypt data, etc.) without ever revealing private keys to the NFC interface you are interacting with is a huge step forward for personal digital identity and data security."
34
29
35
30
## Key Features
36
31
37
32
-**Asymmetric Encryption**: Utilize RSA encryption to secure your files. Files are encrypted with a public key and can only be decrypted with the corresponding passphrase protected private key.
38
-
-**Symmetric Encryption**: Utilize a Apex or FlexSecure implant with keycard to use Multi Factor Symmetric encryption on your files, supply a passphrase, scan your card, files secured.
33
+
-**Symmetric Encryption**: Utilize a Apex or FlexSecure implant with to use the Multi Factor Symmetric encryption on your files, supply a passphrase for the key, scan your card, files secured.
39
34
-**Decentralized Storage**: Leverage IPFS for secure, encrypted, decentralized, and immutable file storage.
40
35
-**Go Implementation**: Built with Go, taking advantage of its powerful concurrency features and efficient data handling.
0 commit comments