62 lines
		
	
	
		
			3.0 KiB
		
	
	
	
		
			Markdown
		
	
	
	
	
	
			
		
		
	
	
			62 lines
		
	
	
		
			3.0 KiB
		
	
	
	
		
			Markdown
		
	
	
	
	
	
# [](https://privatebin.info/)
 | 
						|
 | 
						|
**PrivateBin** is a minimalist, open source online
 | 
						|
[pastebin](https://en.wikipedia.org/wiki/Pastebin)
 | 
						|
where the server has zero knowledge of pasted data.
 | 
						|
 | 
						|
Data is encrypted and decrypted in the browser using 256bit AES in
 | 
						|
[Galois Counter mode](https://en.wikipedia.org/wiki/Galois/Counter_Mode).
 | 
						|
 | 
						|
This is a fork of ZeroBin, originally developed by
 | 
						|
[Sébastien Sauvage](https://github.com/sebsauvage/ZeroBin). PrivateBin was
 | 
						|
refactored to allow easier and cleaner extensions and has many additional
 | 
						|
features. It is, however, still fully compatible to the original ZeroBin 0.19
 | 
						|
data storage scheme. Therefore, such installations can be upgraded to PrivateBin
 | 
						|
without losing any data.
 | 
						|
 | 
						|
## What PrivateBin provides
 | 
						|
 | 
						|
+ As a server administrator you don't have to worry if your users post content
 | 
						|
  that is considered illegal in your country. You have plausible deniability of
 | 
						|
  any of the pastes content. If requested or enforced, you can delete any paste
 | 
						|
  from your system.
 | 
						|
 | 
						|
+ Pastebin-like system to store text documents, code samples, etc.
 | 
						|
 | 
						|
+ Encryption of data sent to server.
 | 
						|
 | 
						|
+ Possibility to set a password which is required to read the paste. It further
 | 
						|
  protects a paste and prevents people stumbling upon your paste's link
 | 
						|
  from being able to read it without the password.
 | 
						|
 | 
						|
## What it doesn't provide
 | 
						|
 | 
						|
- As a user you have to trust the server administrator not to inject any
 | 
						|
  malicious code. For security, a PrivateBin installation *has to be used over*
 | 
						|
  *HTTPS*! Otherwise you would also have to trust your internet provider, and
 | 
						|
  any jurisdiction the traffic passes through. Additionally the instance should
 | 
						|
  be secured by
 | 
						|
  [HSTS](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security). It can
 | 
						|
  use traditional certificate authorities and/or use a
 | 
						|
  [DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions)
 | 
						|
  protected
 | 
						|
  [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities)
 | 
						|
  record.
 | 
						|
 | 
						|
- The "key" used to encrypt the paste is part of the URL. If you publicly post
 | 
						|
  the URL of a paste that is not password-protected, anyone can read it.
 | 
						|
  Use a password if you want your paste to remain private. In that case, make
 | 
						|
  sure to use a strong password and share it privately and end-to-end-encrypted.
 | 
						|
 | 
						|
- A server admin can be forced to hand over access logs to the authorities.
 | 
						|
  PrivateBin encrypts your text and the discussion contents, but who accessed a
 | 
						|
  paste (first) might still be disclosed via access logs.
 | 
						|
 | 
						|
- In case of a server breach your data is secure as it is only stored encrypted
 | 
						|
  on the server. However, the server could be absused or the server admin could
 | 
						|
  be legally forced into sending malicious code to their users, which logs
 | 
						|
  the decryption key and sends it to a server when a user accesses a paste.
 | 
						|
  Therefore, do not access any PrivateBin instance if you think it has been
 | 
						|
  compromised. As long as no user accesses this instance with a previously
 | 
						|
  generated URL, the content can't be decrypted.
 |