Security News
UK Officials Consider Banning Ransomware Payments from Public Entities
The UK is proposing a bold ban on ransomware payments by public entities to disrupt cybercrime, protect critical services, and lead global cybersecurity efforts.
Encrypt or decrypt files using a Trezor hardware wallet.
By design, a decrypt operation requires a confirmation on the device. Unlike an encrypted partition, the user can have some assurance that the data remains encrypted unless needed.
Trez can add convenience and security, however, this is Beta software so you should only use Trez on a secondary copy of your data. Here are some use cases:
$ npm install -g trez
$ trez -?
Trez - File encryption program making use of Trezor hardware wallet security.
Options:
--clipboard-save, -s Save next clipboard copy to an encrypted file (clears
the clipboard). [string]
--clipboard-load, -l Load the clipboard with decrypted data. [string]
--force Force overwrite file [boolean]
--help, -h, -? Show help [boolean]
Examples:
trez --clipboard-save [myfile.txt.trez, omit to generate filename]
trez --clipboard-load myfile.txt.trez
trez myfile.txt Encrypt to myfile.txt.trez
trez myfile.txt.trez Decrypt to myfile.txt
trez myfile.txt.trez - Decrypt to standard out
trez myfile.txt.trez /safe/myfile.txt Decrypt
The Trez format is JSON followed by binary data. Trez files use a 256 bit encrypted secret to unlock the larger dataset. This lends itself to better device performance and quick validation.
Please keep in mind the following safety design decisions were made. Make sure you understand any potential privacy issues:
Node 6+
FAQs
Encrypt or decrypt files using a Trezor hardware wallet.
The npm package trez receives a total of 3 weekly downloads. As such, trez popularity was classified as not popular.
We found that trez demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
The UK is proposing a bold ban on ransomware payments by public entities to disrupt cybercrime, protect critical services, and lead global cybersecurity efforts.
Security News
Snyk's use of malicious npm packages for research raises ethical concerns, highlighting risks in public deployment, data exfiltration, and unauthorized testing.
Research
Security News
Socket researchers found several malicious npm packages typosquatting Chalk and Chokidar, targeting Node.js developers with kill switches and data theft.