62 lines
		
	
	
		
			3.0 KiB
		
	
	
	
		
			Markdown
		
	
	
	
	
	
			
		
		
	
	
			62 lines
		
	
	
		
			3.0 KiB
		
	
	
	
		
			Markdown
		
	
	
	
	
	
| # [](https://privatebin.info/)
 | |
| 
 | |
| **PrivateBin** is a minimalist, open source online
 | |
| [pastebin](https://en.wikipedia.org/wiki/Pastebin)
 | |
| where the server has zero knowledge of pasted data.
 | |
| 
 | |
| Data is encrypted and decrypted in the browser using 256bit AES in
 | |
| [Galois Counter mode](https://en.wikipedia.org/wiki/Galois/Counter_Mode).
 | |
| 
 | |
| This is a fork of ZeroBin, originally developed by
 | |
| [Sébastien Sauvage](https://github.com/sebsauvage/ZeroBin). PrivateBin was
 | |
| refactored to allow easier and cleaner extensions and has many additional
 | |
| features. It is, however, still fully compatible to the original ZeroBin 0.19
 | |
| data storage scheme. Therefore, such installations can be upgraded to PrivateBin
 | |
| without losing any data.
 | |
| 
 | |
| ## What PrivateBin provides
 | |
| 
 | |
| + As a server administrator you don't have to worry if your users post content
 | |
|   that is considered illegal in your country. You have plausible deniability of
 | |
|   any of the pastes content. If requested or enforced, you can delete any paste
 | |
|   from your system.
 | |
| 
 | |
| + Pastebin-like system to store text documents, code samples, etc.
 | |
| 
 | |
| + Encryption of data sent to server.
 | |
| 
 | |
| + Possibility to set a password which is required to read the paste. It further
 | |
|   protects a paste and prevents people stumbling upon your paste's link
 | |
|   from being able to read it without the password.
 | |
| 
 | |
| ## What it doesn't provide
 | |
| 
 | |
| - As a user you have to trust the server administrator not to inject any
 | |
|   malicious code. For security, a PrivateBin installation *has to be used over*
 | |
|   *HTTPS*! Otherwise you would also have to trust your internet provider, and
 | |
|   any jurisdiction the traffic passes through. Additionally the instance should
 | |
|   be secured by
 | |
|   [HSTS](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security). It can
 | |
|   use traditional certificate authorities and/or use a
 | |
|   [DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions)
 | |
|   protected
 | |
|   [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities)
 | |
|   record.
 | |
| 
 | |
| - The "key" used to encrypt the paste is part of the URL. If you publicly post
 | |
|   the URL of a paste that is not password-protected, anyone can read it.
 | |
|   Use a password if you want your paste to remain private. In that case, make
 | |
|   sure to use a strong password and share it privately and end-to-end-encrypted.
 | |
| 
 | |
| - A server admin can be forced to hand over access logs to the authorities.
 | |
|   PrivateBin encrypts your text and the discussion contents, but who accessed a
 | |
|   paste (first) might still be disclosed via access logs.
 | |
| 
 | |
| - In case of a server breach your data is secure as it is only stored encrypted
 | |
|   on the server. However, the server could be absused or the server admin could
 | |
|   be legally forced into sending malicious code to their users, which logs
 | |
|   the decryption key and sends it to a server when a user accesses a paste.
 | |
|   Therefore, do not access any PrivateBin instance if you think it has been
 | |
|   compromised. As long as no user accesses this instance with a previously
 | |
|   generated URL, the content can't be decrypted.
 | 
