Additionally, they've failed to make some architectural and delivery decisions which would protect users from various attacks like a server compromise (for example, a server seized by an adversary may send malicious client code that conducts a document exfiltration), as well as document exfiltration via a malicious browser extension. Both of these can be mitigated somewhat by delivering the frontend as a desktop app or signed browser extension, and setting reasonable CSPs in the decryption modules. This is exactly the reason Signal doesn't offer a web app.
Cryptpad does offer the ability to additionally encrypt documents with shared passwords, and this offers a fair modicum of greater protection against document interception. But this isn't the default document mode, so I doubt most documents are password-protected in practice.
I did share all of the above with the Cryptpad team, and was told they don't intend to address the above issues, so I'd recommend against putting to much faith in them for the time being.
Can you suggest some best practices those cypherpunks can take to mitigate the weaknesses and use it in a secure fashion?
Eg. I don't sync browser history and tend to turn off other cloud-supported features (including "logging into" my browser).
Using a browser without extensions installed would prevent against extension-based exfiltration.
The only way to prevent against a malicious server would probably be to build the frontend yourself and use it with the server (I haven't tried doing this)
There's another way of sharing in cryptpad though, which is for each user to create an identity/account. Once those you're collaborating with have accounts, documents and folders can be shared by granting access within cryptpad's UI. No secrets have to be circulated.
Even you seem to think sharing via identity somehow bypasses the problem, when in fact this just sends them a "notification" with a share link containing the same secret URL (not to mention, as far as I can tell, there's no way for them to add the document to their own drive, so if they want to access it later they either need to save the share link or find it in their notification panel under "notification history" which is super unintuitive).
And again, those secrets are stored in your browser history. In a group I was involved with, the workflow was to create documents and share them with others, or put the share link in a Signal group. Even if one were to try to tell everyone in the group that the link should only be opened in a browser that doesn't share its history with its vendor, clicking the link in Signal will happily just open it in which ever browser is configured as your system default anyway.
Cryptpad effectively gives you the rope and then ties it into the noose around your neck for you, while you're not looking.
Security theater is at best mildly dangerous in a more typical scenario where it's constructed around an application that isn't billed as a secure communication platform. When a tool advertised as user-friendly and privacy-enhancing is the subject of such theatrics, it's even more actively harmful because it instills a false sense of confidence. It would be like a safety helmet that explodes when the user grazes their head.
So to recap, if you care about big tech companies gaining access to your secure documents, the only way to use cryptpad in a remotely secure manner, in a group, is either by password protecting all documents with a strong password, or ensuring no one in your org ever opens a document in a browser with history syncing. And honestly, expecting the latter from 99% of groups that might use cryptpad is unreasonable, which is why I'm saying it's irresponsible of Cryptpad to even allow password-less document creation (without so much as showing users a glaring red danger notice beforehand).
The users are not primarily to blame for incorrect use of a software that's billed as privacy-preserving, when that software drops them off at the happy path and neglects to tell them, "by the way, we've booby-trapped the door to fire a footgun when opened unless you also turn the smaller knob on the far side with your other hand as you open it."
I realize the data exfiltration issues I mentioned are non-trivial to address (though by no means an immense project either), but I can't interpret the link situation as anything other than willful negligence, or worse, a honeypot; consider that users whose adversaries might include nation-state actors (for example, undocumented immigrants sharing resources with one another on how to access services while staying under the radar) are perhaps more exposed, because data brokers are more likely to deny state requests for data that can be seen as overly broad, whereas one specific type of data (browser history) on one domain becomes a pretty tightly scoped request.
Well, that's certainly what tools like CryptPad and Signal target: privacy for the non expert.
OP' points are right, and I hope they get addressed at some point.
I believe the current Office 365 came from that codebase as it has similar features.
See cryptpad.org/instances for a list.
Which also means its features won't be constrained by the E2EE architecture.
At a first glance, it seems the suite numerique wants to be simpler than full traditional office documents. It seems to compare itself with notion and outline.
CryptPad has very simple modules and also more complex, OnlyOffice based modules.
Ultimately, if the suite numerique's frontend is able to send editing patches as JSON, it should not be too complicated to make it work on a CryptPad server and make it E2EE, which is exactly what the CryptPad team did to OnlyOfficr (the "why not both" option)
It would not really make any sense to try to take all Docs in CryptPad, as Docs is both client and server code. The client has both and editor but also sharing features.
CryptPad integrates editors.
However Docs is based on BlockNote for the editor and this editor has been on our watchlist to replace our aging CKEditor which is used in CryptPad. This would make sense to integrate in CryptPad.
As it was said CryptPad is e2ee which is a LOT of work. Then it has 9 types of document files (Docs has 1). CryptPad also has a drive. It also has shared folders, team drives, import and export features and finally also a Survey Tools with e2ee protection. There are many more little or larger details.
Ludovic
I know of several AI companies who use bespoke tools because otherwise their data would be shared with their competitors (e.g. notion -> openai, gdocs -> google, etc).
It used to be that putting your docs on google "felt" safe because it was unlikely that some random google employee would read you random company docs. Now it seems unlikely to me that they aren't reading every doc with AI.
What did you want to achieve?
We are a small team of 5, but I'm the only tech-able person, other older users felt extremely disoriented.
Which is frustrating, because to me Cryptpad did everything we needed in a very, very secure way (all encrypted)
I'm from the CryptPad team.
This is an interesting feedback.
Note that you can also invite people by sending them a link to a document and then connect to them from the user sidebar. They don't really need an account to access documents.
The main reason for the lack of simpler invitation using email is that we don't really want users to give us the mail of other users to invite. This goes against the "privacy" we are promising users.
Ludovic
We are essentially a group of people (home-owner association but for condos, in Canada). None of these are tech people, they also might not own a computer, but just a tablet and a phone.
The main issue was trying to invite them to a team. I had all their email addresses already, because our main form of communication is email, but I had to go to them one by one and ask them for a link (ID? I can't remember) to give to me so that I could invite them.
Essentially, I get the privacy concern, but I already had all their email addresses, so it was protecting data and making a workflow more complicated, for a use-case we didn't have.
righthand•9h ago
misterdata•9h ago
While this works, Syncthing does not really provide anything for fine-grained collaboration or sharing (you only share full folders). Encrypted peers do allow storing files on a machine that you don’t have to trust.
righthand•8h ago
andai•7h ago
righthand•7h ago
colordrops•8h ago
aaravchen•6h ago
Google isn't going to make it easy for a competitor to transfer content, and I'd rather the CryptPad devs work on the product and not a feature users will each only use once at most.
The only annoyance I had was "converting" the uploaded files to the "native" CryptPad format. It doesn't actually have a different native type, it just seems to be a registering with the CryptPad internals which of its predefined types the file is (E.g. Document, Presentation, etc). And you don't have to do it for the file to open and edit just fine. But you have to open each file "as <Type>" from the right click menu, then save it back out and delete the "original" to convert it.
j45•5h ago
sillyfluke•7h ago
Tomte•7h ago
sillyfluke•7h ago
jraph•1h ago
(I work for XWiki, on XWiki though)
jraph•1h ago
CryptPad.org is the official website of the project (and cryptpad.fr an instance maintained by the original devs).
nout•5h ago
Obsidian has many of the rich editing capabilities, especially when you install plugins. For plus points the files are very portable and there is (almost) no "vendor lock in" because it's all markdown textfiles.
SkyMarshal•2h ago
https://obsidian.md/sync
But yeah, since it stores everything as flat markdown files, you can sync or archive your Obsidian docs folder with anything.
dtkav•2h ago
It isn't end-to-end encrypted (yet), but you can self host the document collaboration server on a private network (like tailscale).
If you're like me and you need real-time collaboration and privacy but e2ee isn't a strict requirement for your collaborative docs then you might enjoy it.
I also use Obsidian sync for e2ee device sync -- it is a fantastic product.
[0] https://relay.md
lysace•4h ago
I've exported to structured formats a handful of times, out of thousands of documents.
CryptPad really should build this though.
bjelkeman-again•3h ago
In the end I had to download folders by hand. Took me half a day. And make sure they weren’t too big, because then it wouldn’t include everything.
jraph•1h ago
The tools donc comapte, the needs are very different, and you might find them both useful in different situations.
It seems to me syncthing simply doesn't need anything more, you just use the desktop application of your choice for editing your documents.
And yes, you are kinda locked into CryptPad if you don't export your documents as you go. The server not having your documents at a central place and all the documents having different decryption keys means it's hard to provide a simple "take out" zip export. I guess some automation tool accessing your browser profile could be built to help with this.