Skip to content
David Hill edited this page Jul 17, 2013 · 3 revisions

Cyphertite is a high-security scalable solution for online backups.

  • Rock Solid: we safeguard your critical data like no other backup company
  • Total Privacy: your data is fully sheltered by our encryption process
  • Real Security: your data is protected, secure and always available, only to you
  • Super Efficient: built in compression, deduplication, and realm-wide deduplication before transmission accelerates back-ups, creating a more time- and cost-efficient work flow
  • No Hassle: Cyphertite was built to keep your life simple and easy with an intuitive and simple interface. We make safeguarding your files easy... and we make it easy to get started
  • Multi-Platform: Cyphertite builds and runs on most Linux distributions and BSD-based operating systems. Machines using various operating systems can all share a single account. A Mac OSX version of Cyphertite are coming soon. Cyphertite supports IPv4 and IPv6 seamlessly
Check it out at https://www.cyphertite.com

Table of Contents

Installation

Please visit the following page for installation instrucions

Configuration

Please visit the following page after installation for setup and example configurations

Troubleshooting

If you have any problems, please visit our troubleshooting page

If you do not find what you are looking for, visit https://www.cyphertite.com/support.php

Suggestions For Use

Cyphertite was built with security as a top priority. That being said, some important practices should be followed while using the software. This is important to protect your sensitive data from being viewed by unauthorized people, and to ensure you will be able to decrypt your data in the event of a hardware failure.

  1. Choose a complex account password, memorize it.
  2. Choose an even more complex cyrpto passphrase (20+ characters, capitals, lower case, and special characters suggested). Memorize it.
  3. After your first backup operation is complete make a copy of your ct_crypto file. Store this file in a secure off site location. Your data cannot be retrieved and decrypted without this file. (we cannot help you re-create this file if it is lost as we do not keep this information on our systems)
  4. Read our FAQ at Cyphertite.com for more information.

Resources

License

All source code for the cyphertite project is licensed as follows.

Copyright (c) 2010-2013 Conformal Systems LLC <[email protected]>

Permission to use, copy, modify, and distribute this software for any
purpose with or without fee is hereby granted, provided that the above
copyright notice and this permission notice appear in all copies.

THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

cyphertite/ct_aes_xts.c

Copyright (c) 2003 Markus Friedl <[email protected]>
Copyright (c) 2008 Damien Miller <[email protected]>
Copyright (c) 2010 Joel Sing <[email protected]>

Permission to use, copy, modify, and distribute this software for any
purpose with or without fee is hereby granted, provided that the above
copyright notice and this permission notice appear in all copies.

THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

ctutil/ct_core.c

Copyright (c) 2004-2006 Daniel Hartmeier
All rights reserved.

Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions
are met:

   - Redistributions of source code must retain the above copyright
     notice, this list of conditions and the following disclaimer.
   - Redistributions in binary form must reproduce the above
     copyright notice, this list of conditions and the following
     disclaimer in the documentation and/or other materials provided
     with the distribution.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
"AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.