![]() ![]() Any two computers can connect to the relay, and after securing their channel with PAKE, they can transfer encrypted metadata and data through the relay. Instead, croc will uses a relay - a temporary server setup locally (if both computers are on lan) or publicly (default is at ). Relay allows any two computers to connectĬroc differs from a utility like scp because it doesn’t require any two computers to have enabled port-forwarding. The data is transferred in blocks, where each block is compressed and encrypted, and the recipient keeps track of blocks received so that it can resume the transfer if interrupted. All the data going through the relay is encrypted using the PAKE-generated session key, so the relay can’t spy on information passing through it. If both computers are on the LAN network then croc will use a local relay, otherwise a public relay is used. The actual data transfer is accomplished using a relay, either using raw TCP sockets or websockets. Only two people with the right code phrase will be able to computers transfer encrypted data through a relay. An attacker with the wrong code phrase will fail the PAKE and the sender will be notified without any data transfering. By default, a code phrase can only be used once between two parties so an attacker would have a chance of less than 1 in 4 billion to guess the code phrase correctly to steal the data. The code phrase is shared between the sender and the recipient for password authenticated key exchange ( PAKE), a cryptographic method to use a shared weak key (the “code phrase”) to generate a strong key for secure end-to-end encryption. Transmit encrypted data with a code phraseĬroc securely transfers data using code phrases - a combination of three random words (mnemonicoded 4 bytes). ![]() There are many tools that can do this but AFAIK croc is the only tool that is easily installed and used on any platform, and has secure peer-to-peer transferring, and has the capability to resume broken transfers. ![]() Croc is a tool I built to easily and securely transfer stuff from one computer to another.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |