One-Time-Secret sharing platform with a symmetric 256bit AES encryption in the browser
Go to file
Knut Ahlers 69f29a26aa
UX improvements
Signed-off-by: Knut Ahlers <knut@ahlers.me>
2017-08-03 20:01:22 +02:00
frontend UX improvements 2017-08-03 20:01:22 +02:00
.gitignore Initial API 2017-08-03 14:13:53 +02:00
.repo-runner.yaml Add automated building 2017-08-03 18:34:18 +02:00
api.go Return 404 on not existent secret 2017-08-03 18:20:21 +02:00
assets.go UX improvements 2017-08-03 20:01:22 +02:00
CONTRIBUTING.md Initial API 2017-08-03 14:13:53 +02:00
LICENSE Initial API 2017-08-03 14:13:53 +02:00
main.go Add frontend 2017-08-03 18:32:30 +02:00
Makefile Add automated building 2017-08-03 18:34:18 +02:00
README.md Add README 2017-08-03 20:01:09 +02:00
storage_mem.go Initial API 2017-08-03 14:13:53 +02:00
storage_redis.go Return 404 on not existent secret 2017-08-03 18:20:21 +02:00
storage.go Initial API 2017-08-03 14:13:53 +02:00

Luzifer / OTS

ots is a one-time-secret sharing platform. The secret is encrypted with a symmetric 256bit AES encryption in the browser before being sent to the server. Afterwards an URL containing the ID of the secret and the password is generated. The password is never sent to the server so the server will never be able to decrypt the secrets it delivers with a reasonable effort. Also the secret is immediately deleted on the first read.

Features

  • AES 256bit encryption
  • Server does never get the password
  • Secret is deleted on first read

Setup

For a better setup you can choose the backend which is used to store the secrets:

  • mem - In memory storage (wiped on restart of the daemon)
  • redis - Storing the secrets in a hash under one key
    • REDIS_URL - Redis connection string tcp://auth:PWD@HOST:PORT/DB
    • REDIS_KEY - Key to store the hash in (Default io.luzifer.ots)