diff --git a/external/integrity/transfer/owncloud-privatebin/img/keka-encryption.png b/external/integrity/transfer/owncloud-privatebin/img/keka-encryption.png new file mode 100644 index 0000000000000000000000000000000000000000..a49f9ea0d7f2ecf69782ff15016759b5b32c14bd Binary files /dev/null and b/external/integrity/transfer/owncloud-privatebin/img/keka-encryption.png differ diff --git a/external/integrity/transfer/owncloud-privatebin/owncloud-privatebin.md b/external/integrity/transfer/owncloud-privatebin/owncloud-privatebin.md index edd82608e5d3661ad0661ee5311f7e0f4084aa05..2bf309deabd2a1bae53f6e1b4e6efa7c13da08d9 100644 --- a/external/integrity/transfer/owncloud-privatebin/owncloud-privatebin.md +++ b/external/integrity/transfer/owncloud-privatebin/owncloud-privatebin.md @@ -13,22 +13,26 @@ redirect_from: This How-to Card provides a step-by-step guide on how to transfer Human Data via LCSB Owncloud securely. Please note that this How-to Card is intended for the use case where data is < 4 GB and categorized as [sensitive]({{ '/?qms:LCSB-POL-BIC-01' | relative_url }}), in which encryption must be in place as well as secure exchange of encryption password with PrivateBin. If you wish to share Human Data **recurrently** with e.g. external collaborators, we recommend using Owncloud with Cryptomator for encryption of data on the cloud. For further information, please visit the dedicated card on [Cryptomator]({{ '/?exchange-channels:cryptomator' | relative_url}}). -1. Use a default zip software installed on your local laptop to zip your file(s) with a strong password. -* For Windows computer you can use [7-zip](https://www.7-zip.org/download.html). Please make sure *NOT* to change the default encryption from AES256 to ZipCrypto like displayed below. -* For Mac you can use [Keka](https://www.keka.io/en/) (do not go to App Store, just use Download link below App Store button). Please make sure make sure to choose ZIP from the format type drop down and check the **Use AES-256 encryption** checkbox (this box can be checked after password is provided). -* Use a password generator (e.g. [dice ware](https://diceware.dmuth.org/), [BitWarden](https://bitwarden.com/), [KeePass](https://keepass.info/)) to make the password strong. -2. Go to [LCSB PrivateBin](https://privatebin.lcsb.uni.lu/) and type/add the password in the Editor tab. If you do not have a LUMS account, please use [HPC PrivateBin](https://hpc.uni.lu/privatebin/), which does not require any account. -3. Enable the feature "Burn after reading" by ticking the checkbox. This means that the link to the password can only be used **once** so it expires upon first access. +**Prerequisite:** LUMS account is needed and can be requested via the [Service Portal](https://service.uni.lu/sp?id=sc_cat_item&table=sc_cat_item&sys_id=c536257ddb336010ca53454039961936). + +1. Use a zip software that supports AES256 encryption to zip your file(s) with a strong password. +* For Windows computer you can use [7-zip](https://www.7-zip.org/download.html), which uses AES256 encryption per default. +* For Mac you can use [Keka](https://www.keka.io/en/). To enabled AES256 encryption, please go to `settings > Compression` and tick the **Use AES-256 encryption** checkbox like displayed below. <br> +<img src='img/keka-encryption.png' height='350px'> +2. Use a password generator to generate a strong encryption password. +* An online password generator is [dice ware](https://diceware.dmuth.org/), or you can use the feature in a password manager like [BitWarden](https://bitwarden.com/) or [KeePass](https://keepass.info/) to generate a strong password. +3. Go to [LCSB PrivateBin](https://privatebin.lcsb.uni.lu/) and type/add the password in the Editor tab. +4. Enable the feature "Burn after reading" by ticking the checkbox. This means that the link to the password can only be used **once** so it expires upon first access. <img src="img/encryptionpassword.png"> -* You will be asked to enter your LUMS credentials once you click on "Send". +* You will be promted to enter your LUMS credentials once you click on "Send". * You should be redirected to a page containing the password link. <img src="img/passwordLink.png"> -4. Share the password link with your collaborator via your preferred communication channel. -5. The collaborator (recipient) must confirm that the password was successfully received before you can go to next steps. If collaborator reports an error, it means the password was compromised and data transfer is not secured anymore. In this case zip-file should be deleted and the process should started again. -6. Login to [OwnCloud](https://owncloud.lcsb.uni.lu/) with LUMS account. LUMS account can be requested via the [Service Portal](https://service.uni.lu/sp?id=sc_cat_item&table=sc_cat_item&sys_id=c536257ddb336010ca53454039961936). -* Upload the zipped file(s) to OwnCloud and make a share link with the collaborator. +5. Share the password link with your collaborator via your preferred communication channel. +6. The collaborator (recipient) **must** confirm that the password was successfully received before you can proceed with the following steps. If collaborator reports an error, it means the password was compromised and data transfer is not secured anymore. In this case zip-file should be deleted and the process should started again. This is a crucial step in the data transfer! +7. Login to [OwnCloud](https://owncloud.lcsb.uni.lu/) with LUMS account. +* Upload the zipped archive to OwnCloud and make a share link with the collaborator. * See a full guide on how to use [OwnCloud]({{ '/?exchange-channels:owncloud' | relative_url }}). <img src="img/owncloudShare.png"> -7. Share the access link with your collaborator by typing in their email as shown on the image above. +8. Share the access link with your collaborator by typing in their email as shown on the image above. * The collaborator will automatically receive a link to the encrypted data on OwnCloud by email. -8. The collaborator can now decrypt the data with the password received via Privatebin. +9. The collaborator can now decrypt the data with the password received via Privatebin.