Keep access data secure with Cryptonify
Master Key
Keep track of your login information for web services with Cryptonify.
Mail providers, social networks, online retailers, auction sites, banks, forums, cloud services and many other services on the Internet want to make life easier for registered users – and usually require authentication with a username and password. The more of these services you use, however, the greater the danger of forgetting or mixing up usernames and passwords. The worst-case scenario is not being able to access your Inbox or data stored on the cloud; unlocking these services costs time and effort. Here the Cryptonify program [1] steps into the breach to keep your access data secure.
As a Java application, Cryptonify requires a corresponding run-time environment, either the one from the GNU project or the Oracle original. You can check whether one of the two versions is already installed on your system using the java-version
command in a terminal. If entering the command does not bring a version number to light, you should install the OpenJDK version from the repository of your distribution: This way updates are done automatically when needed. Alternatively, you can use the current Oracle run-time environment [2]. This is no longer included in the distributions' repositories because of the license. Thus, you will need to take care of the necessary updates yourself later.
Getting Started
Cryptonify is available for download for Linux [3] as a 12MB ZIP file. After extracting it, you will find a small shell script in the newly created subdirectory. You can use this shell script to start the software. Manually create a corresponding entry to enable the program by mouse click from a menu.
After launching Cryptonify for the first time, you need to make a few basic settings. The software guides you through several pages of dialog, starting with a greeting and ending with enabling the plugins (Figure 1). The most important steps are specifying the path to the file containing the passwords and creating a master password, which the software requests every time from now on.
The dialog for the master password indicates the strength of the selected password in a color-coded bar. This helps avoid weak character strings. If you want to change the master password later, select the Change master password item from the Settings menu in the program window and then enter the new access data.
After you have defined the basic settings, the software opens the program window, where you can define categories in a separate area on the left; you can enter the websites belonging to the individual categories with the appropriate data in the larger area on the right.
Configuration
Before creating categories and entries, you should first take a look at the extensive configuration menus where you can customize the software to suit your personal needs. You can access these dialogs via Settings | Properties in the main window. Call up the options via seven horizontal tabs in the window that opens (Figure 2). You can set the localization for the interface in the General tab, and you can also modify the path to the file with the passwords. Furthermore, you can activate the portable installation, which allows use of the application on removable disks.
In the second tab, Security, you can specify the period after which passwords expire and which rules apply for locking the application. Passwords that expire regularly increase security, particularly for online services because, in this way, unauthorized persons cannot permanently acquire data. However, you then also need to change the credentials on the respective websites, which can be rather time-consuming. The mechanism for locking the application makes it possible to lock the interface after a certain period of inactivity and thus deny access to the data by prying eyes. In the Internet tab, you can configure automatic updates and activate the downloading of icons used to identify password data.
In the Plugin-Server tab, you will find entries to various browser plugins; Cryptonify supports Firefox and Chrome in Linux. The software passes on the data for authentication on set websites to Firefox and Chrome – this enables automatic login. You can enable the corresponding extension by clicking the applicable browser icon in this window. The web browser then opens the traditional integration dialog for add-ons and restarts after the Cryptonify plugin has been successfully installed. There should now be a key icon in a green circle in the browser; this interacts with the Cryptonify plugin server.
A few particularly important settings are found under Backup-System (Figure 3): Here you can, for example, define backup intervals for the password file. This file, with the extension .cry
, includes all the access data you have defined in encrypted form. The 256-bit strong AES encryption is used here, whereby Cryptonify generates the key using the master password with a PBE algorithm. If the password file is lost and there is no backup, you will have to enter all the authentication data into the program again manually. You should definitely enable the automatic backing up option in the Backup-System settings dialog, where you can select convenient setting options, to avoid this tedious and time-consuming procedure.
The program allows settings for automatically creating passwords in the Password generator tab. The last tab, Other, allows you to customize various options for the appearance. This way you can, for example, color the individual lines in the list view separately, which significantly increases clarity, particularly with vast numbers of categories. To this end, click the Colors tab on the left side of the window and select the desired color for the odd or even rows. Finally, click Save to save your modifications.
Styling
In Linux, Java applications do not exactly stand out with an impressive appearance. However, with Cryptonify, you do not need to come to terms with a rustic look: You are allowed to change the program's theme in the Style field in the General tab. A selection window lists four interfaces integrated into the software. Additional themes can be downloaded from the Internet and integrated into Cryptonify. To this end, search for the term "java look and feel" in an Internet search engine.
The Look And Feel term denotes ready-made graphical components that define the appearance of an application. These themes are usually available as a Java archive (JAR file). Download the eligible JAR files into a directory of your choice and then click the green plus icon in the Cryptonify settings window on the right in the selection box for the styles.
Then, navigate to the subdirectory containing the JAR file in the file manager that opens and select the file. The new theme is now integrated in Cryptonify, and you can enable it in the selection box. Next, click Save and restart the software when prompted. Cryptonify now sports the new appearance (Figure 4).
Buy this article as PDF
(incl. VAT)
Buy Linux Magazine
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.
News
-
Juno Computers Launches Another Linux Laptop
If you're looking for a powerhouse laptop that runs Ubuntu, the Juno Computers Neptune 17 v6 should be on your radar.
-
ZorinOS 17.1 Released, Includes Improved Windows App Support
If you need or desire to run Windows applications on Linux, there's one distribution intent on making that easier for you and its new release further improves that feature.
-
Linux Market Share Surpasses 4% for the First Time
Look out Windows and macOS, Linux is on the rise and has even topped ChromeOS to become the fourth most widely used OS around the globe.
-
KDE’s Plasma 6 Officially Available
KDE’s Plasma 6.0 "Megarelease" has happened, and it's brimming with new features, polish, and performance.
-
Latest Version of Tails Unleashed
Tails 6.0 is based on Debian 12 and includes GNOME 43.
-
KDE Announces New Slimbook V with Plenty of Power and KDE’s Plasma 6
If you're a fan of KDE Plasma, you'll be thrilled to hear they've announced a new Slimbook with an AMD CPU and the latest version of KDE Plasma desktop.
-
Monthly Sponsorship Includes Early Access to elementary OS 8
If you want to get a glimpse of what's in the pipeline for elementary OS 8, just set up a monthly sponsorship to help fund its continued existence.
-
DebConf24 to be Held in South Korea
Busan will be the location of the latest DebConf running July 28 through August 4
-
Fedora Unleashes Atomic Desktops
Fedora has combined its solid distribution with rpm-ostree system to make it possible to deliver a new family of Fedora spins, called Fedora Atomic Desktops.
-
Bootloader Vulnerability Affects Nearly All Linux Distributions
The developers of shim have released a version to fix numerous security flaws, including one that could enable remote control execution of malicious code under certain circumstances.