[TOOL] KRYPTON - GPG Encrypted data network.

Lets welcome our new little project. P.S.: Unencrypted data will never touch our server, you will be sending the encrypted data only.

GPG Encrypted data network.

Krypton (from Ancient Greek: κρυπτός, romanized: kryptos 'the hidden one').

Download: https://krypton.monster/krypton.zip

VirusTotal: https://www.virustotal.com/gui/url/7a12cd820fe15d8a4520038bde556cc78efdab3595f2270c71ff25bd15802de5/detection

Requirements: gpg, gpg-agent, curl

Usage: ./krypton "PRiVATE_KEY" "DATA_PASSWORD" "DATA"

Mirror the data: wget -m -np -c -R "index.html*" "https://krypton.monster/data/"

Verify: Every submitted GPG data will end having filename as SHA256 hash.
We use checksums, so you can always verify that the file was untouched - https://krypton.monster/data/0xF6FF5ADAB5180A3D10FFB611F2CADDD0A2B0922BDE398AD186E946480BEC3943/checksums.

Tagged:

Comments

  • FrankZFrankZ Moderator

    What does this tool do ?

    I am currently traveling in mostly remote areas until sometime in April 2024. Consequently DM's sent to me will go unanswered during this time.
    For staff assistance or support issues please use the helpdesk ticket system at https://support.lowendspirit.com/index.php?a=add

  • edited August 2023

    Usage: ./krypton "PRiVATE_KEY" "DATA_PASSWORD" "DATA"

    "PRiVATE_KEY" - Do not share this key!
    "DATA_PASSWORD" - Password used for encrypt and decrypt your "DATA".
    "DATA" - Data you want to encrypt.

    It simply encrypt your data and store the encrypted data on our server, there anyone can view encrypted data and decrypt it if they know the password, and also anyone can mirror the gpg data.

  • @xVPSx said:
    Usage: ./krypton "PRiVATE_KEY" "DATA_PASSWORD" "DATA"

    "PRiVATE_KEY" - Do not share this key!
    "DATA_PASSWORD" - Password used for encrypt and decrypt your "DATA".
    "DATA" - Data you want to encrypt.

    It simply encrypt your data and store the encrypted data on our server, there anyone can view encrypted data and decrypt it if they know the password, and also anyone can mirror the gpg data.

    Why don't you toss out some useage ideas for your tool?
    Give some examples as to why you would want it. Practical applications and why it fills the gap.

    Thanked by (1)MannDude

    URL Shortener | YetiNode | Come join us on the MetalVPS IRC channel!!! | Don't be a jerk, let YetiNode do the work.

  • edited August 2023

    for example you dont trust plain text mails, lets say you have friend and want secure talk, you both agree on some password and share your ident (example 0xFDD519AB1ECACC9C3128C0857F6124577F06A86E2726D13F9B4920667675A52B) then you just watch the folder for new *.krypt files (https://krypton.monster/data/0xFDD519AB1ECACC9C3128C0857F6124577F06A86E2726D13F9B4920667675A52B/) and then just decrypt them :)

    alternatively you can just encrypt your file and share it with your friend

  • FrankZFrankZ Moderator

    How much encrypted data can I put on your servers for free ?

    I am currently traveling in mostly remote areas until sometime in April 2024. Consequently DM's sent to me will go unanswered during this time.
    For staff assistance or support issues please use the helpdesk ticket system at https://support.lowendspirit.com/index.php?a=add

  • @FrankZ said:
    How much encrypted data can I put on your servers for free ?

    100 Chucklebytes

    Thanked by (1)FrankZ
  • @xVPSx said:
    for example you dont trust plain text mails, lets say you have friend and want secure talk, you both agree on some password and share your ident (example 0xFDD519AB1ECACC9C3128C0857F6124577F06A86E2726D13F9B4920667675A52B) then you just watch the folder for new *.krypt files (https://krypton.monster/data/0xFDD519AB1ECACC9C3128C0857F6124577F06A86E2726D13F9B4920667675A52B/) and then just decrypt them :)

    alternatively you can just encrypt your file and share it with your friend

    So what is thr adavntages of this method over encrypyed emails?

    May I ask the encryption method used on files?

    Is the server encrypted as well, or just files?

    URL Shortener | YetiNode | Come join us on the MetalVPS IRC channel!!! | Don't be a jerk, let YetiNode do the work.

  • This whole Krypton explanation from Greek reminds me of ἤγγικεν ("ingiken") which represents how the end is nigh.

    How are you... online?

  • @AuroraZero said: May I ask the encryption method used on files?

    One of the requirements was gpg so I assume that.

  • No github repo?

    Artificial intelligence is no match for our natural stupidity.

    Time flies like an arrow; fruit flies like a banana.

  • It's a bunch of sh scripts that runs gpg and curl, the scripts are like 15 lines each of which 10 are some bad ascii art.

    Thanked by (1)AuroraZero
  • @skorous said:

    @AuroraZero said: May I ask the encryption method used on files?

    One of the requirements was gpg so I assume that.

    Ok let me rephrase which cypher is used and it is symmetrical or asymmetrical?

    @rcy026

    I kind of figured but have not had time to look into it honestly. Just trying to gauge the developer behind the scenes a bit.

    URL Shortener | YetiNode | Come join us on the MetalVPS IRC channel!!! | Don't be a jerk, let YetiNode do the work.

  • edited August 2023

    @AuroraZero said:

    @skorous said:

    @AuroraZero said: May I ask the encryption method used on files?

    One of the requirements was gpg so I assume that.

    Ok let me rephrase which cypher is used and it is symmetrical or asymmetrical?

    @rcy026

    I kind of figured but have not had time to look into it honestly. Just trying to gauge the developer behind the scenes a bit.

    This is what the script does for the encryption, I am totally serious when I say that it takes 2 seconds to read trough the entire source.
    And why they are shuffling variables around like that is beyond me, I have no idea, this is how it is written.

    CMD=gpg
    echo "$2" > "$FILE_PLAIN"
    echo "$1" | "$CMD" --armor --symmetric --batch --yes --passphrase-fd 0 -c "$FILE_PLAIN"

  • @AuroraZero said: Ok let me rephrase which cypher is used and it is symmetrical or asymmetrical?

    updated the code a bit, it uses cipher - AES256, symmetrical yes

    Thanked by (1)AuroraZero
Sign In or Register to comment.