@@Jims-Garage Thank you for the video. While watching, I checked to see if Enclosed was available on Unraid. To my surprise, it was so I installed it and had it up and running in minutes using a reverse proxy. However, what is the best way to restrict access to the URL?
As usual, a great and detailed tutorial! I'd love to see a video regarding users and how to setup on proxmox and different, VM, LXC, shares and running applications.
I must be too tired as I am struggling to see how this is useful. I'm assuming that I have missed something obvious, so I'm going to ask some probably stupid questions. If you send a link to a recipient and you haven't set a password, then all someone has to do is intercept the email containing the link to get access to the file. Is that correct? And if you have password protected it, how do you get the password to the recipient securely? The purpose of encryption is usually to ensure that someone cannot read the information even if they gain access to it. It seems that this system doesn't prevent this? This doesn't seem to be an asymmetric-key encryption system, so I am struggling to get my head round how it works. Probably time for bed, but I would appreciate it if someone could point out what I am missing!
Correct, without a password all you need is the link, you could use burn after reading but it doesn't really help. Usually you send a password via another mechanism, e.g. text, phone call, separate email. It's the same problem you always face without a file sharing portal that has user authentication. I think this is a great way to send information that isn't highly sensitive with a degree of security and privacy. It's certainly not something I would see an established organisation using.
Great video as always Jim, just out of interest, what Docker network type are you running that you can have DNS entries for services? I'm currently embarked on a Docker journey, and this is a cross road i am currently at, deciding which docker network to use, are you running a flat network for all your services? If you could point me to some of your videos that would be awesome! Thanks in advance mate
@@JustinJ. Thanks. This is all thanks to Traefik, this is what allows DNS names for services. It's a reverse proxy that sits in the front of the service. When you access the service, you're actually going through the proxy (it knows where to route traffic based on service name). I have videos on Traefik (and PiHole, what I use locally to resolve those names).
I like the design of this simple app, but I wonder what happens when you tell it not to expire and it has a large attachment? Does it then stay there forever? There's no notes management of any kind.
I'm a brit too, but always find the word 'garage' sounds so weird when Im used to hearing 'garaaaarrrrge' in the american lingo. Still, your vids are amazing :)
Fantastic video! I was looking at ways to send over login credentials to services I host at home and this would work fantastically! Is there a similar type that does secure file sharing in a similar way?
i dont see the point if we have something like privatebin already which works perfectly fine with lots of more features, too. But anyway, nice project, I guess.
Thanks, PrivateBin is on the list. No partticular reason, simply wanted to shed some light on this project as it does things extremely well in a simplistic fashion (the file sharing is a nice touch).
@@ForeverZer0 Of course you could, but the point is that very often in the OpenSource community, stuff gets forked or made from the ground instead of contributing to already established projects that do the same thing for years already. There are reason for brand new projects but in the Linux world this is a real issue. Everybody knows the meme about the standards and some guys make another standard etc. yeah. Its the double edged sword of OpenSource freedom, I guess.
@@fragdq Every single piece of proprietary software is a new thing build from the ground up (or based on permissive license of opens=-source) instead of an improvement over something that already exists. I simply think you point is incorrect and lacks any foundation in the real-world.
Hi, I'm Corentin, the creator and maintainer of Enclosed. Thank you very much for sharing my project, it means a lot to me!
@@corentinthomasset747 you're welcome. Thanks for creating something so brilliant and simplistic to use.
I’ll try it as well. And will conf it with a tmpfs volume to avoid writing to disk.
@@Jims-Garage Thank you for the video. While watching, I checked to see if Enclosed was available on Unraid. To my surprise, it was so I installed it and had it up and running in minutes using a reverse proxy. However, what is the best way to restrict access to the URL?
@davidras5907 firewall rules, or put it behind something like Authentik
@@Jims-Garage Thank you. I will take a look at Authentik tomorrow.
As usual, a great and detailed tutorial!
I'd love to see a video regarding users and how to setup on proxmox and different, VM, LXC, shares and running applications.
Thanks Jim from his garage. Appreciate that.
@@settlece you're welcome
Excellent. Before this, I have been using Resilio Sync to share. But it works better for established sharing relationships, not one off.
@@fool9111z it's a great app
reminds me a bit of password push. Similar functionality. Thanks Jim !!
@@PowerUsr1 you're welcome
Very nice! Simple!
@@dfgdfg_ agreed. It's amazing how lightweight it is.
I must be too tired as I am struggling to see how this is useful. I'm assuming that I have missed something obvious, so I'm going to ask some probably stupid questions. If you send a link to a recipient and you haven't set a password, then all someone has to do is intercept the email containing the link to get access to the file. Is that correct? And if you have password protected it, how do you get the password to the recipient securely? The purpose of encryption is usually to ensure that someone cannot read the information even if they gain access to it. It seems that this system doesn't prevent this? This doesn't seem to be an asymmetric-key encryption system, so I am struggling to get my head round how it works. Probably time for bed, but I would appreciate it if someone could point out what I am missing!
Correct, without a password all you need is the link, you could use burn after reading but it doesn't really help.
Usually you send a password via another mechanism, e.g. text, phone call, separate email. It's the same problem you always face without a file sharing portal that has user authentication.
I think this is a great way to send information that isn't highly sensitive with a degree of security and privacy. It's certainly not something I would see an established organisation using.
@@Jims-Garage Thanks Jim, I was very tired and thought I had missed something.
Great video as always Jim, just out of interest, what Docker network type are you running that you can have DNS entries for services? I'm currently embarked on a Docker journey, and this is a cross road i am currently at, deciding which docker network to use, are you running a flat network for all your services? If you could point me to some of your videos that would be awesome! Thanks in advance mate
@@JustinJ. Thanks. This is all thanks to Traefik, this is what allows DNS names for services. It's a reverse proxy that sits in the front of the service. When you access the service, you're actually going through the proxy (it knows where to route traffic based on service name).
I have videos on Traefik (and PiHole, what I use locally to resolve those names).
Maybe a good way to get the client side of mtls setup?
Very cool, thanks. Deployed and live on my site :)
Nice work!
I like the design of this simple app, but I wonder what happens when you tell it not to expire and it has a large attachment? Does it then stay there forever? There's no notes management of any kind.
I'm a brit too, but always find the word 'garage' sounds so weird when Im used to hearing 'garaaaarrrrge' in the american lingo. Still, your vids are amazing :)
This would be great for politicians that like to send inappropriate pics to people.
@@toddselby443 haha, so true!
Fantastic video! I was looking at ways to send over login credentials to services I host at home and this would work fantastically!
Is there a similar type that does secure file sharing in a similar way?
Glad it was helpful! How do you mean? This does simple files, more like a share?
i dont see the point if we have something like privatebin already which works perfectly fine with lots of more features, too. But anyway, nice project, I guess.
Thanks, PrivateBin is on the list. No partticular reason, simply wanted to shed some light on this project as it does things extremely well in a simplistic fashion (the file sharing is a nice touch).
This could be said for pretty much every service and piece of software in existence.
@@Jims-Garage Thats true for sure.
@@ForeverZer0 Of course you could, but the point is that very often in the OpenSource community, stuff gets forked or made from the ground instead of contributing to already established projects that do the same thing for years already. There are reason for brand new projects but in the Linux world this is a real issue. Everybody knows the meme about the standards and some guys make another standard etc. yeah. Its the double edged sword of OpenSource freedom, I guess.
@@fragdq Every single piece of proprietary software is a new thing build from the ground up (or based on permissive license of opens=-source) instead of an improvement over something that already exists. I simply think you point is incorrect and lacks any foundation in the real-world.
Email me the password to access that Enclosed message
@@NetBandit70 I see where you're heading, but use something readily available like signal