FAQ

Q: What is SharedSafe?

Q: Where can I find SharedSafe’s encryption code?

Q: Will SharedSafe be available for other operating systems?

Q: Which Email account should I use?

Q: Can I use SharedSafe with my main Email account?

Q: What data is contained in exported Safes?

Q: Will SharedSafe run behind a firewall?

Q: Why have files been deleted from my Linked Folder?

Q: SharedSafe installed ok, but there are no overlay icons?

Q: There are now mails from sender “SharedSafe” in one of my IMAP folders: can I delete them?

Q: How much data can I store in a Safe?

Q: What is SharedSafe?

A: SharedSafe is a file synchronization and sharing application. It is not a service. There is no sign up required.

SharedSafe supports online storage like FTP and Email accounts as well as Dropbox.

SharedSafe protects your files with open source client-side encryption.

See this brief tour of SharedSafe.

Or checkout this more detailed description about how SharedSafe works.

Q: Where can I find SharedSafe’s encryption code?

A: We have released the code on github.

Q: Will SharedSafe be available for other operating systems?

A: We are planning to port SharedSafe to Mac OS X as soon as the Windows version is complete.

Linux is currently not on our roadmap.

Q: Which Email account should I use?

A: Well, of course there are several services offering free Email with IMAP support. Here are a few examples.

However, many internet providers are offering their customers Email services on top of the internet access. So there is a good chance that you are already paying for Email accounts you are actually not using!

Also – especially in smaller companies – it is often not known that the Microsoft Exchange Server allows to access its mail boxes via IMAP. See here for more details.

Q: Can I use SharedSafe with my main Email account?

A: Yes, but we do not recommend it. Technically it will of course work because SharedSafe creates separate folders for the Safes in the Email account. So it will not interfere with your inbox and sent folders.

Using separate Email accounts for SharedSafe has a number of advantages though.

The most obvious one is space. Any Safe in your main Email account will reduce the available space for your regular mail traffic.

Another one is security. When you intend to share Safes you will have to create Safe Keys. Passing on Safe Keys will enable the recipient to access the Email account via SharedSafe only. However, as Safe Keys contain login credentials it is in theory possible to gain access to the whole account. Read this for more details.

A special note about Google Mail. Google officially comments on the subject of file sharing via Google Mail. Check out the details here. Using SharedSafe with a separate Google Mail account will prevent your main account from suffering from any of the restrictions described there.

Q: What data is contained in exported Safes?

A: Exported Safes contain very sensitive information. Namely:

  1. The login credentials of the Email account the Safe resides in.
  2. The encryption keys required to read and write the file system tree in the Safe.

Exported Safes are stored by SharedSafe in so called Safe Keys. A Safe Key is a small configuration file which is always encrypted and optionally password protected.

A password protected Safe Key can only be imported into SharedSafe if its password is known.

Because a Safe Key is encrypted (even if not password protected) only SharedSafe is able to extract its contained information.

An occasional observer will not be able to decode the contents of a Safe Key.

However, by means of reverse engineering SharedSafe, it is possible to gain the private keys for its Safe Key encryption.

In this event it is possible to decrypt all the Safe Keys ever created by SharedSafe. There is no way to prevent this.

Therefore we recommend to always password protect your Safe Keys.

So Safe Keys are – like real keys – very sensitive objects. Never forget: despite all of SharedSafe’s support for handling Safe Keys, the responsibility for them is yours alone.

Q: Will SharedSafe run behind a firewall?

A: SharedSafe connects to a Safe with either the FTP or the IMAP protocol. So in general it will require the according ports to be open. In case of FTP SharedSafe will use the firewall friendly passive mode to connect to the server.

Q: Why have files been deleted from my Linked Folder?

A:When you have shared a Safe in non read only mode AND this Safe has been imported and linked on another computer you have effectively created a shared folder.

SharedSafe will automatically synchronize the file changes in the Safe to every folder linked to it. And vice versa.

Suppose a user deletes a file in a linked folder on his or her computer. This delete operation will be synchronized to the Safe and then subsequently to all of the Safe’s linked folders.

SharedSafe informs you in the change log about such deletes (and of course of any other changes which are a result of the synchronization process).

In case files have to be deleted during the synchronization SharedSafe will keep a copy of them in the recycle bin. Check out this issue on our Help page

Note: you do have the option to export a Safe in read only mode. Sharing a Safe this way will enable other users of the Safe to read its files but not to delete or even change them.

In fact, the limited cryptographic information contained in read only Safe Keys makes it impossible for a user to create any files at all in the Safe’s file tree.

Q: SharedSafe installed ok, but there are no overlay icons?

A: Windows has a system wide limit of fifteen overlay icons (four of which are used by Windows itself).

If there are no free overlay icons available – because they are used up by already installed applications – SharedSafe will not be able to use its overlay icons.

This is a common limitation for applications using overlay icons, not just of SharedSafe. See here for an according discussion for TortoiseSVN.

Unfortunately the only way to fix this is to uninstall one of the applications using overlay icons. When SharedSafe is installed it requires four free slots for its overlay icons.

We will add a check to SharedSafe’s installer so that at least you will know right at the installation that your system does not have enough free overlay icons for SharedSafe.

Q: There are now mails from sender “SharedSafe” in one of my IMAP folders: can I delete them?

A: Please do not delete them!

SharedSafe creates a file system from the files in a Safe. The mails from “SharedSafe” represent this file system. They contain the data of these files. If they are deleted – even just one of them – the file system is corrupted.

Q: How much data can I store in a Safe?

A: SharedSafe can use all the capacity of your Safe.

For FTP SharedSafe will use all the capacity of the FTP account used for a Safe.

For IMAP things are similar. SharedSafe creates an IMAP folder in your Email account every time you create a new Safe in this account. Within these IMAP folders SharedSafe creates mails containing the data of the files in the respective Safe.

This means that the capacity of your IMAP Email account limits the amount of data that can be stored in all of the Safes created in this account.

  Our Newsletter  

Subscribe to our Newsletter with Information, News, Updates, some cool Stuff about SharedSafe
and of course no Spam! :-)

Thank you for downloading SharedSafe!

If your download does not start in a few seconds, please click here.

You need some help to getting started with SharedSafe?

No Problem! Check out our "Getting started" Section. If you need some more help please visit our Support Forum, FAQ Page or feel free to Contact us!

Imprint

Responsible for these pages within the meaning of § 5 German Telemediengesetz:

Goran Badevic <goran@rootloft.com>
rootloft GmbH
Käthe-Kollwitz-Str. 48
D-83024 Rosenheim

Tel ++ 49 (0) 8031 2344089

Executive Board: Goran Badevic
Company's Place of Business: Rosenheim
Commercial Register No.: HRB 24959
VAT Identification No.: DE266798934

Privacy

Any personal data collected on our website will be collected - if possible - on a voluntary basis. The website and its services are accessible - if possible - without the need to give any personal data.

rootloft GmbH expressly objects to the contact data contained in the imprint being used for any unsolicited advertisement material or Emails. We reserve the right to take legal steps against any such advertisements or spam Emails.

Licence regulations for the use of the Software „SharedSafe“

1. Subject matter of the licence agreement

The rootloft GmbH (LLC) (subsequently: rootloft) possesses the exclusive sales rights to the software „SharedSafe“. The program is offered exclusively in the way of the online-download. There is no claim for the delivery of a data carrier.

The user who acquires the software by online-download is granted the rights of use that are specified in numeral 2.

The declarations on the website of SharedSafe are conclusively decisive for the nature of the software, as well as the declarations there concerning the system requirements. rootloft does not owe a nature of the software that exceeds that.

rootloft expressly indicates that the user of the software has to use an IMAP-mail-server that complies with the requirements of RFC 3501. rootloft also indicates that virus scanners and desktop-firewall-programs may disturb or impair the functionality of the software.

2. Rights of use

First, the user downloads a trial-version of the computer program „SharedSafe“ via the website whose usage is limited to 30 days.

For an unlimited and permanent use of the program, the user has to acquire an unlock code at his expense subsequently.

Upon payment of the unlock code at his expense and the corresponding entry of the code, the user acquires a simple, non-exclusive, not transferrable and temporally unlimited right to install and to use the acquired version of the software.

The program is offered in two different types of licences, as „Personal Licence“ and as „Commercial Licence“.

The purchase of a so-called personal license entitles the purchaser to install and use the software on an unlimited number of computers for private and commercial usage as long as the purchaser is the only person who uses the software.

The purchase of a so-called commercial licence entitles the purchasing enterprise to install the software on an optional number of computers of the enterprise. The right to use may simultaneously only be executed by the maximum number of natural persons who have been indicated at the purchase and for whom the purchaser has paid the purchase price. The purchaser of a commercial-licence may only use the software for the purpose to handle his internal business transactions and those by such enterprises who are connected with him in the sense of § 15 AktG (= Public Companies Act) (allied companies). A usage by third parties, especially in the way of the operation of a data centre for third parties or of the temporary making-available of the software (e.g. in the way of the application service providing or cloud computing) for third parties is not permitted.

The right of use only extends to the acquired version of the program and does not include any obligation for update or upgrade.

It is generally forbidden to relet the program commercially, and it is also forbidden to pass resp. to sell the software permanently to third persons.

The further development, processing, reconfiguration, re-engineering, translation as well as the sale of the program is not allowed.

The user may only reproduce the software that is subject matter of the contract as far as the reproduction is necessary for the intended use of the software.

3. Liability

In the case of a loss of data, rootloft shall only be liable for that effort that is required from the user in case of data saving according to the rules in order to recover the data. The user is obliged to care for a saving of his data according to the rules.

In all other cases of contractual and extra-contractual liability, rootloft shall only be liable in accordance with the following limits:

a) in the case of intention to the full amount, as well as in the case of a missing quality for which the seller has guaranteed;

b) in the case of gross negligence only in the amount of the predictable damage that should have been prevented by the violated obligation;

c) in other cases: only out of the violation of an essential contractual duty if by that the purpose of the contract is endangered, but always only in the amount of the damage that can be typically predicted.

Towards users of the cost-free trial-version of the software, the liability of the rootloft GmbH shall be limited to intention and gross negligence.

The preceding liability limitations do not apply for damages of a violation of life, body, health, nor for claims according to the Product Liability Act.

4. Protection of the software

As far as the purchaser has not expressly been granted rights, rootloft shall be exclusively entitled to all rights to the software – especially the copyright and commercial proprietary rights. This also applies for processing of the software.

5. Duties of the user

The user is obliged to use the software only within the limits of these licence regulations and especially not to use the software for the violation of the rights of third persons, especially for the violation of copyrights.

Besides, the user may not use the software for military purposes or for activities and services by which the lives, bodies or the health of human beings can be violated.

6. Choice of law

These licence conditions are exclusively subject to German law, to the exclusion of the UN-CISG (United Nations Convention on Contracts for the International Sale of Goods). This choice of law, however, shall apply towards consumers as far as the granted protection is not withdrawn by mandatory provisions of the law of the state in which the consumer has his main residence.