An encrypted pastebin that uses IPFS for distributed, tamper-proof storage with client-side AES-256 encryption.
Hardbin is an encrypted pastebin that leverages IPFS for distributed, tamper-proof storage and uses client-side AES-256 encryption to secure content. It ensures that neither the code nor the data can be modified without detection, providing a higher security guarantee than traditional encrypted pastebins when used with a trusted gateway.
Developers, security-conscious users, and privacy advocates who need a secure way to share sensitive text snippets or code without relying on a central server's integrity.
Hardbin offers a unique combination of IPFS-based distribution and client-side encryption, eliminating the need to trust a central server operator. Its tamper-proof design and self-hosting capabilities make it a robust alternative to traditional encrypted pastebins.
Encrypted pastebin using IPFS
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
IPFS ensures cryptographic hashing of code and data, preventing undetected modifications, as the README states it eliminates server operator tampering.
Content is encrypted in-browser with AES-256 via Crypto-JS, so servers never see plaintext, enhancing privacy as described in the workflow.
With a local gateway, there's no risk of malicious code injection, making it more secure than traditional pastebins when trusted.
Users can clone, modify, and publish custom versions on IPFS, offering complete control, as highlighted in the self-hosting section.
Requires running an IPFS daemon with writable settings and browser extensions, which is technical and non-trivial for casual users.
Security degrades to traditional pastebin levels if using an untrusted public gateway, a limitation explicitly admitted in the README.
Pastes must be pinned on IPFS to avoid disappearing, adding an extra step for long-term storage, as noted with services like Pinata.