8000 GitHub - Mrtracker-new/BAR: BAR (Burn After Reading) is a secure, offline desktop app for managing sensitive files. It scans for and handles .bar files across your devices, with no server dependencies to ensure your data stays local.
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

BAR (Burn After Reading) is a secure, offline desktop app for managing sensitive files. It scans for and handles .bar files across your devices, with no server dependencies to ensure your data stays local.

License

Notifications You must be signed in to change notification settings

Mrtracker-new/BAR

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

3 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ”₯ BAR - Burn After Reading πŸ”₯

A secure, offline file management system with self-destruction capabilities and advanced security features

BAR Logo

License: GPL v3 Platform Status

IMPORTANT: Before using BAR, please read the DISCLAIMER.md file for important legal and security information.


πŸ“‹ Overview

BAR (Burn After Reading) is a powerful desktop application designed for secure file management with advanced security features including self-destruction capabilities. Operating entirely offline with no server dependencies, BAR ensures your sensitive data never leaves your machine.

BAR Preview

The application combines strong encryption, customizable security settings, and comprehensive file scanning to provide a complete solution for protecting your most sensitive information.

⚠️ Important Security Notice

BAR includes powerful security features that can result in permanent data loss. By using this application, you acknowledge that:

  • Files deleted through BAR's security features CANNOT be recovered
  • You are responsible for ensuring your use complies with local laws and regulations
  • The security of your data depends on the strength of your passwords
  • No security measure is 100% foolproof

See the full disclaimer for complete details on legal considerations and proper usage.


✨ Key Features

Core Security

  • πŸ”’ Completely Offline Operation: Works without internet connection or server dependencies
  • πŸ›‘οΈ Military-Grade Encryption: AES-256 in GCM mode for authenticated encryption
  • πŸ”‘ Secure Key Management: PBKDF2 with high iteration counts and hardware binding options

Self-Destruction Mechanisms

  • ⏱️ Time-based Expiration: Files automatically delete after a specified time
  • πŸ”’ Access Count Limits: Files delete after being accessed a certain number of times
  • ⚰️ Deadman Switch: Files delete after a period of inactivity
  • πŸ”¨ Anti-Brute Force: Files delete after multiple failed password attempts

File Management

  • πŸ“± Advanced File Scanning: Detect and validate .bar files across all connected devices
  • πŸ” Multi-threaded Scanning: Fast scanning of all storage devices including removable media
  • πŸ”„ Secure File Sharing: Export/import encrypted files with security constraints intact
  • πŸ—‘οΈ Secure Deletion: Multi-pass overwrite techniques to prevent data recovery

User Experience

  • πŸ‘€ User Authentication: Local user registration and login with 2FA options
  • πŸ’» Intuitive Interface: Clean UI showing file security status and expiration details
  • 🎨 Customizable Themes: Personalize your experience with different visual themes
  • πŸ“Š Comprehensive Logging: Detailed security audit logs for monitoring and troubleshooting

πŸ” Security Architecture

Encryption System
  • AES-256 in GCM mode for authenticated encryption
  • Unique encryption key for each file
  • Key derivation using PBKDF2-HMAC-SHA256 with high iteration counts
  • Hardware-binding option to prevent access from unauthorized devices
  • Secure memory handling to prevent key exposure
Self-Destruction Mechanisms
  • Time-based: Files automatically delete after a specified time period
  • Access-count: Files delete after being accessed a certain number of times
  • Deadman switch: Files delete if not accessed within a specified period
  • Anti-brute force: Files delete after multiple failed password attempts
  • Secure deletion using multi-pass overwrite techniques compliant with DoD standards
  • Background monitoring threads to enforce security constraints
Secure Storage
  • All data stored locally in the ~/.bar directory with proper encryption
  • No plaintext storage of sensitive information
  • Secure key management with memory protection
  • Blacklist system to prevent reimporting of deleted sensitive files
  • File integrity verification using digital signatures
Anti-Tampering Protection
  • Runtime integrity checks to detect application tampering
  • Hardware ID verification to prevent unauthorized device access
  • Secure random number generation for cryptographic operations
  • Protection against timing attacks in cryptographic implementations
  • Memory protection to prevent sensitive data exposure

πŸ’Ώ Installation

System Requirements

  • Operating System: Windows 10/11 (primary support), limited support for Linux/macOS
  • RAM: 4GB minimum, 8GB recommended
  • Storage: 100MB for application, additional space for secure files
  • No internet connection required for operation

Installation Options

Option 1: Running the Executable (Recommended)
  1. Download the latest release of BAR.exe from the releases page
  2. No installation required - simply double-click the executable to run
  3. On first run, you'll need to create a user account with a strong password
  4. The application will automatically create the necessary directories and configuration files
Option 2: Running from Source
  1. Ensure you have Python 3.8 or higher installed
  2. Clone or download the repository
  3. Install dependencies: pip install -r requirements.txt
    • Required dependencies include PyQt5 (v5.15.9), cryptography (v41.0.3)
  4. Run the application: python main.py
  5. For development purposes, you can use the --debug flag: python main.py --debug
Option 3: Building Your Own Executable
  1. Install dependencies: pip install -r requirements.txt
    • Includes PyInstaller (v6.0.0) for building the executable
  2. Run the build script: python build.py
  3. Find the executable in the dist directory
  4. For a smaller executable size, use the --onefile option: python build.py --onefile

πŸ“± Usage Guide

First-Time Setup

Create a local user account with a strong password

Create New Account

Login

Access your secure file storage

Login Interface

Main Interface

Manage your secure files and access application features

App Interface

File Operations

Creating Secure Files
  1. Click the "Add File" button in the main interface
  2. Select the file you want to secure
  3. Configure security settings:
    • Set expiration time (if desired)
    • Set maximum access count (if desired)
    • Configure deadman switch (if desired)
    • Set password protection level
    • Enable/disable hardware binding
  4. Click "Create Secure File" to complete the process

Add Secure File

Accessing Secure Files
  1. Select the file from the main interface
  2. Enter the password when prompted
  3. View file details and content (subject to security constraints)
  4. Note that accessing the file may count toward access limits if configured
Exporting and Sharing Files
  1. Select the file you want to export
  2. Choose export format:
    • Original file: Exports the decrypted original file (requires password)
    • Portable encrypted file: Exports the .bar file with all security constraints intact
  3. Select destination location
  4. Share the exported file securely

Export Original File

Export Encrypted File

Scanning for .bar Files
  1. Click the "Scan" button in the main interface
  2. Select which drives to scan (fixed, removable, network)
  3. Wait for the scan to complete
  4. Review found .bar files and import if desired
  5. The scanner validates file integrity and version compatibility
Media File Restrictions

BAR includes special handling for media files to prevent unauthorized access:

  1. Screenshot prevention blocks attempts to capture screen content
  2. Media files are protected with additional security layers
  3. Warning messages inform users about restrictions
Media File Restriction Warning

Application Settings

Configure application behavior, security parameters, and appearance

Settings Page


πŸš€ Use Cases

BAR is designed for scenarios where secure, temporary file storage and sharing are critical:

Scenario Description
Sensitive Document Sharing Securely share confidential documents with colleagues or clients with automatic deletion after viewing
Temporary Credential Storage Store passwords, API keys, or access tokens that self-destruct after use
Legal and Compliance Meet data retention policies by ensuring files are automatically deleted after required periods
Personal Privacy Protect sensitive personal information with files that can't be recovered after deletion
Secure Communication Exchange sensitive information with built-in destruction capabilities
Corporate Environments Protect intellectual property and trade secrets with controlled access
Healthcare Settings Share patient information securely with automatic expiration
Financial Services Protect financial documents and statements with time-limited access

πŸ“ Best Practices

  • Password Security: Use strong, unique passwords with a mix of character types
  • Security Parameters: Set appropriate security constraints based on data sensitivity
  • Backup Strategy: Regularly back up non-sensitive data (remember that securely deleted files CANNOT be recovered)
  • Deadman Switch: Be cautious with this feature - files will be permanently deleted if not accessed within the specified period
  • Device Scanning: Scan removable devices before importing files to ensure integrity
  • Logging: Check the logs in ~/.bar/logs directory for troubleshooting
  • Hardware Binding: Enable for critical files to prevent unauthorized access from different devices
  • Failed Attempts: Remember that after 3 failed password attempts, files will be permanently deleted
  • Password Recovery: If you forget your password, your data cannot be recovered - there is no backdoor or recovery mechanism

πŸ“œ Legal Considerations

BAR is designed for legitimate security purposes. Please be aware of the following important legal considerations:

  • Encryption Regulations: The use of encryption software may be regulated or restricted in certain countries or jurisdictions. It is your responsibility to ensure your use of BAR complies with all applicable laws.

  • Data Protection Laws: When using BAR to store or process data subject to data protection regulations (such as GDPR, CCPA, HIPAA, etc.), ensure your usage complies with all relevant requirements.

  • Legitimate Use: BAR should only be used for lawful purposes. Do not use this application to circumvent legal data retention requirements or for any illegal activities.

  • No Warranty: BAR is provided "AS IS" without warranty of any kind. The developers are not liable for any damages or data loss resulting from the use of this application.

For complete legal information, please refer to the DISCLAIMER.md file included with this application.


πŸ“„ License

BAR is licensed under the GNU General Public License v3.0 (GPL-3.0).

  • Free Software: You are free to use, modify, and distribute this software.
  • Copyleft: Any derivative works must also be distributed under the same license terms.
  • Source Code: If you distribute this software, you must make the source code available.
  • No Warranty: This software is provided without warranty of any kind.

For the full license text, see the LICENSE file included with this application or visit the GNU GPL v3.0 website.


πŸ‘¨β€πŸ’» About the Author

BAR was created by Rolan Lobo, a passionate cybersecurity enthusiast and software developer dedicated to creating tools that enhance digital privacy and security.


BAR - Because some things are meant to be temporary.

0