Merge branch 'develop' of github.com:cryfs/cryfs into develop
This commit is contained in:
commit
dbc1b5db8c
@ -54,7 +54,8 @@ Requirements
|
||||
- chrono
|
||||
- program_options
|
||||
- thread
|
||||
- Crypto++ version >= 5.6.3 (including development headers)
|
||||
- Crypto++ version == 5.6.3 (including development headers)
|
||||
(not compatible to Crypto++ 5.6.4, but will be compatible with Crypto++ 5.6.5+)
|
||||
- SSL development libraries (including development headers, e.g. libssl-dev)
|
||||
- libFUSE version >= 2.8.6 (including development headers), on Mac OS X instead install osxfuse from https://osxfuse.github.io/
|
||||
- Python >= 2.7
|
||||
@ -62,10 +63,10 @@ Requirements
|
||||
You can use the following commands to install these requirements
|
||||
|
||||
# Ubuntu
|
||||
$ sudo apt-get install git g++ cmake libcurl4-openssl-dev libboost-filesystem-dev libboost-system-dev libboost-chrono-dev libboost-program-options-dev libboost-thread-dev libcrypto++-dev libssl-dev libfuse-dev python
|
||||
$ sudo apt-get install git g++ cmake make libcurl4-openssl-dev libboost-filesystem-dev libboost-system-dev libboost-chrono-dev libboost-program-options-dev libboost-thread-dev libcrypto++-dev libssl-dev libfuse-dev python
|
||||
|
||||
# Fedora
|
||||
sudo dnf install git gcc-c++ cmake libcurl-devel boost-devel boost-static cryptopp-devel openssl-devel fuse-devel python
|
||||
sudo dnf install git gcc-c++ cmake make libcurl-devel boost-devel boost-static cryptopp-devel openssl-devel fuse-devel python
|
||||
|
||||
# Macintosh
|
||||
brew install cmake boost cryptopp openssl
|
||||
@ -154,4 +155,4 @@ There are additional requirements if you want to create .deb packages. They are:
|
||||
Disclaimer
|
||||
----------------------
|
||||
|
||||
On the event of a password leak, you are strongly advised to create a new filesystem and copy all the data over from the previous one. Done this, all copies of the compromised filesystem and config file must be removed (e.g, from the "previous versions" feature of your cloud system) to prevent access to the key (and, as a result, your data) using the leaked password.
|
||||
On the event of a password leak, you are strongly advised to create a new filesystem and copy all the data over from the previous one. Done this, all copies of the compromised filesystem and config file must be removed (e.g, from the "previous versions" feature of your cloud system) to prevent access to the key (and, as a result, your data) using the leaked password.
|
||||
|
Loading…
Reference in New Issue
Block a user