Skip to content

Commit ad09274

Browse files
committed
fixes #14
1 parent 62e2ae5 commit ad09274

File tree

1 file changed

+39
-7
lines changed

1 file changed

+39
-7
lines changed

docs/security/security-target.md

Lines changed: 39 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,26 +8,58 @@ sidebar_position: 1
88

99
Cryptomator was designed to solve privacy issues when saving files to cloud storages.
1010

11+
## What Cryptomator Is {#what-cryptomator-is}
12+
13+
Cryptomator is a client-side encryption tool for cloud storage services.
14+
1115
The risk that the cloud provider or third parties access the data stored in the cloud without permission is mitigated.
1216
Only people who know the vault password are able to read the files in the vault or change the file contents undetected.
1317
This is true for file contents as well as for filenames.
1418

1519
## What Cryptomator Encrypts {#what-cryptomator-encrypts}
1620

17-
To allow a working synchronization with the cloud, there are some meta information that Cryptomator does not encrypt.
18-
These are:
21+
Cryptomator encrypts:
1922

20-
* access, modification, and creation timestamp of files and folders,
21-
* number of files and folders in a vault and in the folders, and
22-
* size of the stored files.
23+
* file contents,
24+
* file and folder names, and
25+
* the directory structure is obfuscated.
26+
27+
For technical details on how these elements are encrypted, see [Vault Cryptography](vault.md).
2328

2429
## What Cryptomator Is Not {#what-cryptomator-is-not}
2530

2631
In addition, you have to keep in mind what Cryptomator is not.
32+
2733
Protection of the files on the local computer is not the focus of Cryptomator.
28-
Cryptomator is not a complete replacement for other encryption tools based on container files if the aforementioned meta information should be encrypted.
34+
Cryptomator cannot provide protection if the local computer is infected with malware which reads entered passwords and file contents (e.g., files in an unlocked vault).
35+
2936
Cryptomator does not provide protection if programs create backup copies of the encrypted files when working with them.
3037
Such files are not detected by Cryptomator and may remain on the computer even after unlocking a vault.
31-
Cryptomator cannot provide protection if the local computer is infected with malware which reads entered passwords and file contents (e.g., files in an unlocked vault).
38+
39+
Cryptomator is not a complete replacement for other encryption tools based on container files if metadata (like file sizes and timestamps) should be encrypted.
40+
41+
Cryptomator is not a [steganography tool](https://en.wikipedia.org/wiki/Steganography). It uses recognizable file extensions (`.c9r`, `.c9s`) and stores configuration files (`vault.cryptomator`, `masterkey.cryptomator`) that make it evident that data is encrypted using Cryptomator. The security of your data relies on strong encryption and a secure password, not on hiding the fact that encryption is being used.
3242

3343
To protect against such risks, other methods, like complete disk encryption, immediate installation of system and software updates, and the use of applicable antivirus software, is required.
44+
45+
## What Cryptomator Does Not Encrypt {#what-cryptomator-does-not-encrypt}
46+
47+
To allow a working synchronization with the cloud, there are some metadata that Cryptomator does not encrypt.
48+
These are:
49+
50+
* access, modification, and creation timestamps of files and folders,
51+
* number of files and folders in a vault and in the folders, and
52+
* size of the stored files.
53+
54+
## Accepted Risks {#accepted-risks}
55+
56+
### Filename Swapping Within Same Directory {#filename-swapping-within-same-directory}
57+
58+
An attacker with write access to your cloud storage could swap encrypted filenames within the same directory. While the contents of the files remain secure and any tampering with file contents would be detected, the swapped filenames would not be detected.
59+
60+
This is considered a **low risk** vulnerability because:
61+
- It requires an attacker to already have write access to your vault
62+
- File contents remain encrypted and tamper-proof
63+
- The attack only affects filename-to-content mapping within a single directory
64+
65+
This is an accepted risk because implementing cryptographic binding between filenames and contents would significantly impact performance, especially on mobile devices and remote storage systems. For more information, see the security advisory documented in [GHSA-qwfw-w5qf-7wcj](https://github.com/cryptomator/cryptomator/security/advisories/GHSA-qwfw-w5qf-7wcj).

0 commit comments

Comments
 (0)