This repository has been archived by the owner on Apr 12, 2020. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 0
/
about.html
66 lines (61 loc) · 3.89 KB
/
about.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
<!doctype html>
<html>
<head>
<meta charset="utf-8">
<meta name="description" content="A secure tool to share sensitive information in encrypted form with third parties">
<meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1">
<title>Share a Secret - Short lived encrypted secret sharing - about the app</title>
<link rel="stylesheet" href="static/custom.css" integrity="sha256-kh6gVNFTId2fxJriixeeDfo5X8rK0ZW9i81infWYch8=">
<link rel="stylesheet" href="static/semantic-2.7.5.css" integrity="sha256-3a0+mzIiHF2Wt5DvkjjoX0+M9otO3KTaMaqhaSwVZXg=">
</head>
<body>
<br><br>
<div id="bodysegm" class="ui text container">
<h1 class="ui centered header">About this project</h1>
This app was created to allow for more secure sharing of sensitive information like passwords via insecure channels
such as email or unencrypted websites. It helps reduce potentional data leaks in several ways:
<ul class ="ui list">
<li class="item">
With communication through email for example, <b class="ui large text">it's not easy to see whether that email will be transfered via
encrypted tunnels</b> or if it was in the end - and even if it was, if the encryption was properly appied to the tunnel
so that there's a guarantee that only sender and recipient can see the contents of the message. This leaves an opening
for man-in-the-middle attacks where the sentitive information can be stored or stolen by third parties while on its way
to the recipient.
</li>
<li class="item">
<b>Email and other messages are commonly stored for a long time</b>, wether it's still in the sender's sent mailbox, the
recipient's inbox, their recycle bin or even in backups that are maintained by the system administrator. As it's not
always clear who has access to that mailbox, it's hard to predict what kind of risk it entails (overtime). Access to that
mailbox can be gained by the email provider, the system administrator, your colleagues (shared mailbox or replacement),
you boss, etc. <b>Plaintext passwords will always remain visible</b>, that's why sharing of secure links that expire after a
certain period of time, can completely remove that risk, of course as long as the expiration date is properly chosen.
</li>
<li class="item">
The use of shared links with expiration dates also encourages recipients to use <b>proper means of storing</b> such sensitive
information.
</li>
</ul>
<h3>Good advice:</h3>
I strongly recommend you to communicate to your partners to use password managers to store passwords properly, because
sending passwords and other sensitive information securely is one thing, storing them properly is another thing. There are
many available, but I strongly recommend KeePass or <a href="https://keepassxc.org/" target="_blank">KeePassXC</a>. For Android check out
<a href="https://play.google.com/store/apps/details?id=keepass2android.keepass2android_nonet" target="_blank">Keepass2Android Offline</a>.
<h3>Creator</h3>
This web app was created by Leonardo Malik and is freely available at <a href="https://github.com/aardbol/secretshare">GitHub</a>
under open source license EUPL v1.2. <br><br>
<a href="EB5BBA9B9C045302FCF1622AB52C8CF8981F584A.asc">GPG key</a>
</div>
<div id="footer" class="ui text container">
<i class="copyright outline icon"></i>2019, https://wheredoi.click v1.3
{<a href="https://github.com/aardbol/secretshareweb" target="_blank"><i class="fitted github grey icon"></i></a>}<br>
<a href="index.html">home</a> | <a href="about.html">about this app</a> | <a href="security.html">how is this app secure?</a>
</div>
<script src="static/jquery-3.4.1.js" integrity="sha256-WpOohJOqMqqyKL9FccASB9O0KwACQJpFTUBLTYOVvVU="></script>
<script src="static/semantic-2.7.5.js" integrity="sha256-/fbdRVqLH/oOOtOg/Eb0A1ttDWTJn6L6yxhO2HC/+yg="></script>
<script>
$(function() {
$('h1').transition("zoom in");
})
</script>
</body>
</html>