Skip to content

Commit 90f9a4b

Browse files
authored
Merge pull request #81 from cryptomator/desktop/release/1.16.0
Desktop release 1.16.0
2 parents b2f2eab + d3b3bfc commit 90f9a4b

9 files changed

+152
-9
lines changed

source/desktop/accessing-vaults.rst

+1-1
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ Click on ``Reveal Drive`` in the Cryptomator window to open the mount location u
5555

5656
Even though your files are shown unencrypted in the virtual drive, they are not stored unencrypted on the hard drive but only in `volatile memory <https://en.wikipedia.org/wiki/Volatile_memory>`_
5757

58-
.. image:: ../img/desktop/vault-detail-unlocked.png
58+
.. image:: ../img/desktop/vault-detail-unlocked-simple.png
5959
:alt: Cryptomator window showing an unlocked vault
6060

6161
.. note::
+73
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,73 @@
1+
Encrypted File Names
2+
====================
3+
4+
.. note::
5+
6+
Neither file name nor directory structure encryption can be disabled.
7+
8+
Cryptomator protect your files by not only encrypting their content, but also their names and the overall directory structure of the vault.
9+
For example, if you have a directory structure inside your vault like this:
10+
11+
.. code-block:: console
12+
13+
.
14+
├─ myProject.pptx
15+
├─ Images for Project
16+
│ └─ ImageOfBees.jpg
17+
└─ ...
18+
19+
The actual directory structure of the vault on your hard drive/cloud will look like this:
20+
21+
.. code-block:: console
22+
23+
.
24+
├─ d
25+
│ ├─ BZ
26+
│ │ └─ R4VZSS5PEF7TU3PMFIMON5GJRNBDWA
27+
│ │ ├─ dirId.c9r # internal vault file
28+
│ │ ├─ 5TyvCyF255sRtfrIv**83ucADQ==.c9r # myProject.pptx
29+
│ │ └─ FHTa55bH*sUfVDbEb0gTL9hZ8nho.c9r # Linking entry for directory "Images for Project"
30+
│ │ └─ dir.c9r # contains information for the link
31+
│ └─ FC
32+
│ └─ ZKZRLZUODUUYTYA4457CSBPZXB5A77 # content of the directory "Images for Project"
33+
│ └─ 4lmrQYfE_5ETusEkVJlTJrcFzjwxNBymig==.c9r # ImageOfBees.jpg
34+
├─ masterkey.cryptomator
35+
├─ masterkey.cryptomator.DFD9B248.bkup
36+
└─ vault.cryptomator
37+
38+
39+
While this increases security, it also makes it impossible to see the original file names and directory structure without decrypting them first.
40+
When you need to know the original name of a file (e.g. to restore an older version), you can use the ``Decrypt file name`` feature to decrypt the file name.
41+
42+
43+
.. _desktop/encrypted-file-names/decryption:
44+
45+
Decrypting File Names
46+
---------------------
47+
48+
.. note::
49+
50+
Due to technical reasons, given only an encrypted file Cryptomator can only decrypt its name.
51+
It cannot compute its cleartext path.
52+
53+
You can access this feature from the unlocked view of a vault in the Cryptomator main window.
54+
On the bottom of the unlocked view, drop files on the "Decrypt file name" zone or click on it.
55+
A modal window with the encrypted-decrypted-mapping opens.
56+
57+
.. image:: ../img/desktop/vault-detail-unlocked.png
58+
:alt: Vault detail view in the unlocked state
59+
60+
The encrypted-decrypted-table has an action bar at the top with two buttons:
61+
* Clipboard button to copy the whole table as a CSV into the system clipboard
62+
* Trash button to clear the table
63+
64+
.. image:: ../img/desktop/decrypt-file-names.png
65+
:alt: Decrypt file names window
66+
:scale: 63%
67+
:align: center
68+
69+
Encrypted file names and their corresponding decrypted, original name are shown inside a two column table, with the encrypted names on the right.
70+
If you have not dropped any files, the table is empty.
71+
You can click inside the empty table to select files with a file picker dialog.
72+
73+
Once the table has content, you can select single cells and copy their content with the OS specific keyboard copy shortcut.

source/desktop/sync-conflicts.rst

+32-8
Original file line numberDiff line numberDiff line change
@@ -1,20 +1,41 @@
11
Synchronization Conflicts
22
=========================
33

4-
Working on encrypted data from multiple locations works the same as working on unencrypted data from multiple locations. If there is a synchronization conflict, it is handled similarly to how most cloud storage services deal with conflicts.
4+
Working on encrypted data from multiple locations is the same as working on unencrypted data from multiple locations.
5+
If there is a synchronization conflict, it is handled similarly to how most cloud storage services deal with conflicts.
56

6-
When a sync conflict occurs, cloud storage services typically create a conflict file by appending a suffix (e.g., ``(1)``) to indicate that there was a conflict. You then need to determine which file to keep.
7+
When a sync conflict occurs, cloud storage services typically resolve the conflict by leaving the local file as it is and create an additional, conflicting file with the content from the cloud.
8+
The file name is the same as the original one, suffixed with a short string (e.g., ``(Created by Alice)``) to indicate it's a different version.
9+
10+
Cryptomator handles encrypted files in the same way.
11+
It detects sync conflicts and appends the suffix from your cloud provider to the decrypted filename.
12+
If the filename with the conflict suffix is too long, Cryptomator shortens the overall filename.
13+
If the (decrypted) filename with the conflict suffix already exists, the conflicted file has a simple ``(X)`` suffix, where X is an integer.
14+
15+
16+
+---------------------------------------------+----------------------------------+-----------------------------------------------+----------------------------------------------------------------+
17+
| Situation | Cloud Provider Suffix | Original Decrypted Name | New Decrypted Name |
18+
+=============================================+==================================+===============================================+================================================================+
19+
| Regular | (Created by Alice) | businessPitch.odp | businessPitch (Created by Alice).odp |
20+
+---------------------------------------------+----------------------------------+-----------------------------------------------+----------------------------------------------------------------+
21+
| Preferred name already taken | (Created by Alice) | businessPitch.odp | businessPitch (1).odp |
22+
+---------------------------------------------+----------------------------------+-----------------------------------------------+----------------------------------------------------------------+
23+
| Maximum cleartext of the vault is set to 62 | (Created by Alice on 2024-01-31) | businessPitchForTheGreatIdeaIHadLastNight.odp | businessPitchForTheGreatIdeaI (Created by Alice on 2024-01.odp |
24+
+---------------------------------------------+----------------------------------+-----------------------------------------------+----------------------------------------------------------------+
725

8-
Cryptomator handles encrypted files in the same way. It detects synchronization conflicts and displays the conflicted file with a ``(X)`` suffix, where X is an integer.
926

1027
.. note::
1128

12-
Sync conflicts can happen in cloud storages for several reasons. In such cases, it is up to you to decide what to do with the conflicted files. It is recommended to manually check both files and determine which one to keep. If you conclude that both files are identical, you can delete one copy. The organization of your files is entirely in your hands.
29+
Sync conflicts can happen in cloud storages for several reasons.
30+
In such cases, it is up to you to decide what to do with the conflicted files.
31+
It is recommended to manually check both files and determine which one to keep.
32+
If you conclude that both files are identical, you can delete one copy.
33+
The organization of your files is entirely in your hands.
1334

1435
Handling Sync Conflicts
1536
-----------------------
1637

17-
1. When a sync conflict is detected, Cryptomator will display the conflicted file with a ``(X)`` suffix, where X is an increasing integer.
38+
1. When a sync conflict is detected, Cryptomator will display the conflicted file with a suffix, as shown in the table above.
1839
2. Manually review both the original and conflicted files.
1940
3. Decide which file to keep based on your review.
2041
4. If both files are identical, you can delete one of the copies to resolve the conflict.
@@ -24,8 +45,11 @@ By following these steps, you can effectively manage synchronization conflicts a
2445
Example
2546
-------
2647

27-
Suppose you have a file named ``document.txt`` in your vault. In the encrypted vault, this file might be represented with an encrypted name such as ``5TyvCyF255sRtfrIv...83ucADQ==.c9r``.
48+
Suppose you have a file named ``projectPlan.doc`` in your vault.
49+
In the encrypted vault, this file might be represented with an encrypted name such as ``5TyvCyF255sRtfrIv...83ucADQ==.c9r``.
2850

29-
If a synchronization conflict occurs, it will happen on the encrypted filename. Cryptomator detects unexpected patterns in the encrypted filename and handles the conflict accordingly.
51+
If a synchronization conflict occurs, it will happen on the encrypted filename.
52+
Cryptomator detects unexpected patterns in the encrypted filename and handles the conflict accordingly.
3053

31-
For example, if there is a conflict with ``5TyvCyF255sRtfrIv...83ucADQ== (1).c9r``, Cryptomator will decrypt the decryptable part of the filename and rename the file to include a conflict suffix. The conflicted file might be renamed to something like ``FHTa55bH...sUfVDbEb0gTL9hZ8nho.c9r``, which corresponds to ``document (1).txt``.
54+
For example, if there is a conflict with ``5TyvCyF255sRtfrIv...83ucADQ== (Created by Alice).c9r``, Cryptomator will decrypt the encrypted part of the filename and rename the file to include a conflict suffix.
55+
The conflicted file might be renamed to something like ``FHTa55bH...sUfVDbEb0gTL9hZ8nho.c9r``, which corresponds to ``projectPlan (Created by Alice).doc``.

source/desktop/vault-events.rst

+44
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
Events and Event View
2+
=====================
3+
4+
Vault events give information about the vault's status and certain activities.
5+
There are several types of events, including conflict detection or corrupted files.
6+
All vault events are logged in the event view, which can be opened from the main window.
7+
8+
.. note::
9+
10+
Vault events are not persisted on the hard disk.
11+
They are only stored in memory and are lost when the application is closed.
12+
13+
14+
.. _desktop/vault-events/event-viewer:
15+
16+
Event View
17+
------------
18+
19+
The event view shows the events of all vaults.
20+
To open the event view, click on the Bell icon in the lower left corner of the main window.
21+
If new, unread events are present, the icon has a small red dot.
22+
23+
.. image:: ../img/desktop/event-view.png
24+
:scale: 63%
25+
:alt: Event view
26+
27+
28+
The event view has an action bar at the top followed by the actual event list.
29+
Events are displayed from newest (top) to oldest (bottom).
30+
You can filter the events by the vault they belong to.
31+
Also, you can clear the event log by clicking on the trash can icon.
32+
33+
34+
.. _desktop/vault-events/vault-event:
35+
36+
Vault Event
37+
-----------
38+
39+
A vault event consists of a title, its number of appearances in brackets, an affected file, and a timestamp.
40+
If you hover over the event, a button to open a context menu appears.
41+
The context menu contains event-specific actions, mostly to reveal affected files in the file manager.
42+
43+
If the vault of the event is locked, the event is anonymized.
44+
To view the event details, you need to unlock the corresponding vault first.
35 KB
Loading

source/img/desktop/event-view.png

33.7 KB
Loading
Loading
-296 KB
Loading

source/index.rst

+2
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,9 @@ If you are interested in the security of Cryptomator, have a look at our :ref:`s
2525
desktop/accessing-vaults.rst
2626
desktop/password-and-recovery-key.rst
2727
desktop/vault-management.rst
28+
desktop/encrypted-file-names.rst
2829
desktop/volume-type.rst
30+
desktop/vault-events.rst
2931
desktop/error-handling.rst
3032
desktop/sync-conflicts.rst
3133
desktop/advanced-settings.rst

0 commit comments

Comments
 (0)