A secure, offline file management system with self-destruction capabilities and advanced security features
IMPORTANT: Before using BAR, please read the DISCLAIMER.md file for important legal and security information.
BAR (Burn After Reading) is a powerful desktop application designed for secure file management with advanced security features including self-destruction capabilities. Operating entirely offline with no server dependencies, BAR ensures your sensitive data never leaves your machine.
The application combines strong encryption, customizable security settings, and comprehensive file scanning to provide a complete solution for protecting your most sensitive information.
BAR includes powerful security features that can result in permanent data loss. By using this application, you acknowledge that:
- Files deleted through BAR's security features CANNOT be recovered
- You are responsible for ensuring your use complies with local laws and regulations
- The security of your data depends on the strength of your passwords
- No security measure is 100% foolproof
See the full disclaimer for complete details on legal considerations and proper usage.
- π Completely Offline Operation: Works without internet connection or server dependencies
- π‘οΈ Military-Grade Encryption: AES-256 in GCM mode for authenticated encryption
- π Secure Key Management: PBKDF2 with high iteration counts and hardware binding options
- β±οΈ Time-based Expiration: Files automatically delete after a specified time
- π’ Access Count Limits: Files delete after being accessed a certain number of times
- β°οΈ Deadman Switch: Files delete after a period of inactivity
- π¨ Anti-Brute Force: Files delete after multiple failed password attempts
- π± Advanced File Scanning: Detect and validate .bar files across all connected devices
- π Multi-threaded Scanning: Fast scanning of all storage devices including removable media
- π Secure File Sharing: Export/import encrypted files with security constraints intact
- ποΈ Secure Deletion: Multi-pass overwrite techniques to prevent data recovery
- π€ User Authentication: Local user registration and login with 2FA options
- π» Intuitive Interface: Clean UI showing file security status and expiration details
- π¨ Customizable Themes: Personalize your experience with different visual themes
- π Comprehensive Logging: Detailed security audit logs for monitoring and troubleshooting
Encryption System
- AES-256 in GCM mode for authenticated encryption
- Unique encryption key for each file
- Key derivation using PBKDF2-HMAC-SHA256 with high iteration counts
- Hardware-binding option to prevent access from unauthorized devices
- Secure memory handling to prevent key exposure
- Time-based: Files automatically delete after a specified time period
- Access-count: Files delete after being accessed a certain number of times
- Deadman switch: Files delete if not accessed within a specified period
- Anti-brute force: Files delete after multiple failed password attempts
- Secure deletion using multi-pass overwrite techniques compliant with DoD standards
- Background monitoring threads to enforce security constraints
Secure Storage
- All data stored locally in the
~/.bar
directory with proper encryption - No plaintext storage of sensitive information
- Secure key management with memory protection
- Blacklist system to prevent reimporting of deleted sensitive files
- File integrity verification using digital signatures
Anti-Tampering Protection
- Runtime integrity checks to detect application tampering
- Hardware ID verification to prevent unauthorized device access
- Secure random number generation for cryptographic operations
- Protection against timing attacks in cryptographic implementations
- Memory protection to prevent sensitive data exposure
- Operating System: Windows 10/11 (primary support), limited support for Linux/macOS
- RAM: 4GB minimum, 8GB recommended
- Storage: 100MB for application, additional space for secure files
- No internet connection required for operation
Option 1: Running the Executable (Recommended)
- Download the latest release of BAR.exe from the releases page
- No installation required - simply double-click the executable to run
- On first run, you'll need to create a user account with a strong password
- The application will automatically create the necessary directories and configuration files
Option 2: Running from Source
- Ensure you have Python 3.8 or higher installed
- Clone or download the repository
- Install dependencies:
pip install -r requirements.txt
- Required dependencies include PyQt5 (v5.15.9), cryptography (v41.0.3)
- Run the application:
python main.py
- For development purposes, you can use the
--debug
flag:python main.py --debug
Option 3: Building Your Own Executable
- Install dependencies:
pip install -r requirements.txt
- Includes PyInstaller (v6.0.0) for building the executable
- Run the build script:
python build.py
- Find the executable in the
dist
directory - For a smaller executable size, use the
--onefile
option:python build.py --onefile
Create a local user account with a strong password
Access your secure file storage
Manage your secure files and access application features
Creating Secure Files
- Click the "Add File" button in the main interface
- Select the file you want to secure
- Configure security settings:
- Set expiration time (if desired)
- Set maximum access count (if desired)
- Configure deadman switch (if desired)
- Set password protection level
- Enable/disable hardware binding
- Click "Create Secure File" to complete the process
Accessing Secure Files
- Select the file from the main interface
- Enter the password when prompted
- View file details and content (subject to security constraints)
- Note that accessing the file may count toward access limits if configured
Exporting and Sharing Files
- Select the file you want to export
- Choose export format:
- Original file: Exports the decrypted original file (requires password)
- Portable encrypted file: Exports the .bar file with all security constraints intact
- Select destination location
- Share the exported file securely
Scanning for .bar Files
- Click the "Scan" button in the main interface
- Select which drives to scan (fixed, removable, network)
- Wait for the scan to complete
- Review found .bar files and import if desired
- The scanner validates file integrity and version compatibility
Media File Restrictions
BAR includes special handling for media files to prevent unauthorized access:
- Screenshot prevention blocks attempts to capture screen content
- Media files are protected with additional security layers
- Warning messages inform users about restrictions
Configure application behavior, security parameters, and appearance
BAR is designed for scenarios where secure, temporary file storage and sharing are critical:
Scenario | Description |
---|---|
Sensitive Document Sharing | Securely share confidential documents with colleagues or clients with automatic deletion after viewing |
Temporary Credential Storage | Store passwords, API keys, or access tokens that self-destruct after use |
Legal and Compliance | Meet data retention policies by ensuring files are automatically deleted after required periods |
Personal Privacy | Protect sensitive personal information with files that can't be recovered after deletion |
Secure Communication | Exchange sensitive information with built-in destruction capabilities |
Corporate Environments | Protect intellectual property and trade secrets with controlled access |
Healthcare Settings | Share patient information securely with automatic expiration |
Financial Services | Protect financial documents and statements with time-limited access |
- Password Security: Use strong, unique passwords with a mix of character types
- Security Parameters: Set appropriate security constraints based on data sensitivity
- Backup Strategy: Regularly back up non-sensitive data (remember that securely deleted files CANNOT be recovered)
- Deadman Switch: Be cautious with this feature - files will be permanently deleted if not accessed within the specified period
- Device Scanning: Scan removable devices before importing files to ensure integrity
- Logging: Check the logs in
~/.bar/logs
directory for troubleshooting - Hardware Binding: Enable for critical files to prevent unauthorized access from different devices
- Failed Attempts: Remember that after 3 failed password attempts, files will be permanently deleted
- Password Recovery: If you forget your password, your data cannot be recovered - there is no backdoor or recovery mechanism
BAR is designed for legitimate security purposes. Please be aware of the following important legal considerations:
-
Encryption Regulations: The use of encryption software may be regulated or restricted in certain countries or jurisdictions. It is your responsibility to ensure your use of BAR complies with all applicable laws.
-
Data Protection Laws: When using BAR to store or process data subject to data protection regulations (such as GDPR, CCPA, HIPAA, etc.), ensure your usage complies with all relevant requirements.
-
Legitimate Use: BAR should only be used for lawful purposes. Do not use this application to circumvent legal data retention requirements or for any illegal activities.
-
No Warranty: BAR is provided "AS IS" without warranty of any kind. The developers are not liable for any damages or data loss resulting from the use of this application.
For complete legal information, please refer to the DISCLAIMER.md file included with this application.
BAR is licensed under the GNU General Public License v3.0 (GPL-3.0).
- Free Software: You are free to use, modify, and distribute this software.
- Copyleft: Any derivative works must also be distributed under the same license terms.
- Source Code: If you distribute this software, you must make the source code available.
- No Warranty: This software is provided without warranty of any kind.
For the full license text, see the LICENSE file included with this application or visit the GNU GPL v3.0 website.
BAR was created by Rolan Lobo, a passionate cybersecurity enthusiast and software developer dedicated to creating tools that enhance digital privacy and security.
BAR - Because some things are meant to be temporary.