Categories
Uncategorized

CryptPad Setup

CryptPad Complete Setup Guide

Secure Document Collaboration for Privacy-Conscious Users and Organizations

What is CryptPad?

CryptPad is a privacy-first, open-source collaboration platform that provides end-to-end encrypted document editing, file storage, and team collaboration. Unlike Google Docs or Microsoft 365, CryptPad ensures that your documents are encrypted in your browser before being sent to the server.

Key Privacy Features

  • Zero-knowledge encryption - Only you and collaborators can decrypt documents
  • No tracking or analytics - Your activity remains private
  • Anonymous usage possible - No email required for basic accounts
  • Open source - Code is publicly auditable
  • GDPR compliant - Based in France with strong privacy protections
  • Real-time collaboration - Multiple users can edit simultaneously

Document Types Available

TypeDescriptionBest For
Rich TextWord processor with formattingReports, letters, documents
SpreadsheetExcel-like calculationsBudgets, data analysis
PresentationSlide-based presentationsMeetings, training
Kanban BoardTask managementProject workflows
WhiteboardCollaborative drawingBrainstorming, planning

Choosing a CryptPad Instance

Official CryptPad.fr (Recommended)

  • URL: https://cryptpad.fr
  • Pros: Official, reliable, supports development
  • Pricing: Free tier available, paid plans for more storage

⚠️ Important Security Considerations

  • URL security - Document URLs contain encryption keys; treat like passwords
  • Browser security - Keep your browser secure and updated
  • Account backup - Anonymous accounts cannot be recovered if browser data is lost

Individual User Accounts

Creating Your CryptPad Account

1Navigate to CryptPad

  • Go to https://cryptpad.fr
  • Click "Sign up" in the top-right corner

2Choose Registration Method

Option A: Anonymous Account (Maximum Privacy)
  • No email required - account tied to browser only
  • Warning: Cannot be recovered if you lose browser data
  • Best for: Testing or maximum privacy with manual backup
Option B: Email Registration (Recommended)
  • Enter secure email address (ProtonMail, Tutanota recommended)
  • Create strong, unique password (use password manager)
  • Benefit: Account recovery possible
  • Best for: Regular use and team collaboration

3Complete Registration

  • Username: Choose something that doesn't reveal identity
  • Password: Minimum 12 characters, use password manager
  • Display Name: Use initials or pseudonym initially

Essential Security Settings

  1. Access Settings: Click avatar → Settings
  2. Privacy Configuration:
    • Disable contact requests from strangers
    • Hide your online status
    • Disable usage feedback
  3. Security Settings:
    • Enable automatic logout (1-4 hours)
    • Keep unsafe links warning enabled
    • Enable safe links

Critical: Backup Your Account

  1. Go to Settings → Account
  2. Click "Download my account data"
  3. Save the file securely - enables account recovery
  4. Store in encrypted location (password manager, encrypted drive)

Without this backup, you may lose access permanently.

Sharing Your Identity for Team Invitations

Safe to Share:

  • ✅ Your CryptPad profile link
  • ✅ Your display name
  • ✅ Preferred contact method
  • ✅ Which instance you're using

NEVER Share:

  • ❌ Password or credentials
  • ❌ Email address (unless requested by trusted admin)
  • ❌ Private document links
  • ❌ Account backup file

Email Template for Team Invitation

Subject: CryptPad Identity for Team Invitation
Hello [Team Administrator],
I've created my CryptPad account and am ready to join [Team Name].
My CryptPad Information:

Profile Link: https://cryptpad.fr/profile/#/1/view/[your-unique-id]/
Display Name: [Your Display Name]
Instance: CryptPad.fr

Please let me know if you need additional information.
Best regards,
[Your Name]

Accepting Team Invitations

  1. Check Notifications: Look for bell icon in CryptPad
  2. Review Details: Verify team name and inviter identity
  3. Verify Authenticity: Contact admin via separate channel if suspicious
  4. Accept Invitation: Click "Accept" to join team workspace

Document Classification Understanding

  • 🟢 PUBLIC: Can be shared outside team
  • 🔵 INTERNAL: Team-only information
  • 🟠 CONFIDENTIAL: Sensitive, special handling required
  • 🔴 RESTRICTED: Highest security, limited access

Team Owner / Administrator

Creating and Setting Up Teams

1Create New Team

  1. Click avatar → Teams → "Create a Team"
  2. Configure team name (descriptive but not revealing)
  3. Set privacy settings (private, invitation-only recommended)
  4. Configure initial permissions

2Set Up Folder Structure

Recommended Team Folder Structure:

📁 [Team Name] Shared Drive/
├── 📁 00-OPEN/ (🟢 Public Access)
├── 📁 01-INTERNAL/ (🔵 Team Members Only)
├── 📁 02-CONFIDENTIAL/ (🟠 Leadership Only)
└── 📁 03-RESTRICTED/ (🔴 Admin Only)

Member Roles and Permissions

RolePermissionsClassification Access
OwnerFull admin control🟢🔵🟠🔴 All levels
AdminInvite members, manage content🟢🔵🟠 Up to Confidential
MemberCreate/edit documents🟢🔵 Open and Internal
ViewerRead-only access🟢 Open only

Inviting Team Members

Preparation Checklist:

  • Verify member identity through separate channel
  • Confirm member has CryptPad account
  • Obtain member's profile link
  • Determine appropriate role
  • Prepare onboarding materials

Invitation Process:

  1. Access Team Management: Team → Members → "Invite Members"
  2. Add Information: Paste profile URL, select role
  3. Send Invitation: Review details, confirm send
  4. Follow Up: Notify member, provide support

Security Configuration

Essential Security Settings:

  • Set team to "Private" - not discoverable
  • Disable public directory listing
  • Require invitation for all members
  • Restrict external sharing to Admin+ roles
  • Set default link expiration times
  • Enable audit logging

Document Classification Templates

🟢 OPEN Template:

===== CLASSIFICATION: OPEN =====
Public information suitable for external sharing.
Handling: May be shared freely outside team.
Review: Annual

🔵 INTERNAL Template:

===== CLASSIFICATION: INTERNAL =====
Team member information only.
Handling: Team only, no external sharing without approval.
Review: Based on content sensitivity

🟠 CONFIDENTIAL Template:

===== CLASSIFICATION: CONFIDENTIAL =====
Sensitive information requiring special handling.
Handling: Admin+ roles only, owner approval required.
Review: Quarterly

🔴 RESTRICTED Template:

===== CLASSIFICATION: RESTRICTED =====
Highly sensitive information.
Handling: Owner access only, no electronic sharing.
Review: Monthly

Regular Administrative Tasks

Weekly:

  • Review new documents for proper classification
  • Monitor member activity
  • Check team chat for issues
  • Verify backup integrity

Monthly:

  • Conduct comprehensive access audit
  • Review classification compliance
  • Update policies as needed
  • Export and backup critical data

Quarterly:

  • Assess security posture
  • Update classification guidelines
  • Plan for organizational changes
  • Update disaster recovery plans

💡 Administrator Best Practices

  • Zero Trust: Verify everything, trust nothing by default
  • Least Privilege: Minimum access necessary for role
  • Continuous Monitoring: Regular review and audit
  • Incident Preparedness: Plan for when things go wrong
Categories
Uncategorized

Work in progress playlist

music.apple.com/us/playlist/emulation/pl.u-2aKLiAzeqq

Categories
Uncategorized

Prosthetic memory system successful in humans

“This is the first time scientists have been able to identify a patient’s own brain cell code or pattern for memory and, in essence, ‘write in’ that code to make existing memory work better, an important first step in potentially restoring memory loss”

We showed that we could tap into a patient’s own memory content, reinforce it and feed it back to the patient,” Hampson said. “Even when a person’s memory is impaired, it is possible to identify the neural firing patterns that indicate correct memory formation and separate them from the patterns that are incorrect. We can then feed in the correct patterns to assist the patient’s brain in accurately forming new memories, not as a replacement for innate memory function, but as a boost to it.”

Source: http://www.wakehealth.edu/News-Releases/2018/Prosthetic_Memory_System_Successful_in_Humans_Study_Finds.htm

Categories
Uncategorized

Different signaling proteins found instrumental in remembering and forgetting scent-based memories

Understanding how brains actively erase memories may open new understanding of memory loss and aging, and open the possibility of new treatments for neurodegenerative disease.

http://neurosciencenews.com/memory-brain-signals-8002/ 

Categories
Uncategorized

National Transportation Noise Map

This map of transportation noise in the U.S. should help us find our next place to be.

Categories
Uncategorized

Neuroplasticity at the neuron and synapse level – Neurons sort into functional networks

“Until recently, scientists had thought that most synapses of a similar type and in a similar location in the brain behaved in a similar fashion with respect to how experience induces plasticity,” Friedlander said. “In our work, however, we found dramatic differences in the plasticity response, even between neighboring synapses in response to identical activity experiences.”

“Individual neurons whose synapses are most likely to strengthen in response to a certain experience are more likely to connect to certain partner neurons, while those whose synapses weaken in response to a similar experience are more likely to connect to other partner neurons,” Friedlander said. “The neurons whose synapses do not change at all in response to that same experience are more likely to connect to yet other partner neurons, forming a more stable but non-plastic network.”

Read more at: https://medicalxpress.com/news/2016-02-scientists-brain-plasticity-assorted-functional.html#jCp

Categories
Uncategorized

New gene editing method modifies non-dividing cells in brain

Until now, gene editing has relied on cell division to propagate modifications made with techniques like CRISPR Cas9. Researchers at the Salk Institute have devised a new method that can modify the genes of non-dividing cells (the majority of adult cells). They demonstrated the method’s potential by inserting missing genes into the brains of young mice that were blind due to retinitis pigmentosa. After the team inserted fully functional copies of the damaged gene responsible for the condition into the relevant visual neurons, the mice experience rudimentary vision.

Team leader Izpisua Belmonte says of the new method, homology-independent targeted integration (HITI), “We now have a technology that allows us to modify the DNA of non-dividing cells, to fix broken genes in the brain, heart and liver. It allows us for the first time to be able to dream of curing diseases that we couldn’t before, which is exciting.”

While the team, naturally and appropriately, envisions therapeutic uses, could this method be used to modify brain function non-therapeutically, to improve normal functioning, for example?

Categories
cognitive bias motivated reasoning rationality scientific approach Uncategorized

Living in a ‘post-fact’ world

Studies find that people with higher numeracy and understanding of the scientific method and its tools are more likely to challenge or twist the results of scientific studies that challenge their ideologies. For example, it’s the more scientifically competent persons on the political right (those who are most identified with a free-market ideology) who mount the most vehement assaults against claims of human contributions to global warming.

This article delves into the extent of cognitive biases against facts (rigorously validated knowledge claims) and the apparent variables affecting when those biases are triggered. It also raises possible ways to mitigate biases.

Categories
Uncategorized

Closing in on seat of consciousness in the human brain

“the team investigated whether this brainstem-cortex network was functioning in another subset of patients with disorders of consciousness, including coma. Using a special type of MRI scan, the scientists found that their newly identified “consciousness network” was disrupted in patients with impaired consciousness. The findings – bolstered by data from rodent studies – suggest the network between the brainstem and these two cortical regions plays a role maintaining human consciousness.”

http://www.bidmc.org/News/PRLandingPage/2016/November/Fox-Consciousness.aspx

Categories
Uncategorized

Writing as a Social Activity

Spent election night writing with friends. Fun times.

Nanowrimo at Flying Star Cafe
Nanowrimo at Flying Star Cafe on Juan Tabo Blvd