Sietch Vault is a decentralized file system that allows you to securely sync encrypted data across machines in low or no-internet conditions. Designed with the resilience of desert-dwellers in mind, it prioritizes portability, privacy, and robustness.
Sietch creates self-contained encrypted vaults that can sync over LAN, sneakernet USB drives, or weak WiFi networks. It operates fully offline, using chunked data, encryption, and peer-to-peer protocols to ensure your files are always protected and available - even when the internet is not.
Sietch Vault is designed for environments where:
- Internet is scarce or censored
- Data privacy is a necessity, not a feature
- People work nomadically - like researchers, journalists, or activists
It imagines what a file system would look like in a world more like Arrakis than San Francisco, with a focus on survival-first rather than cloud-first principles.
Feature | Description |
---|---|
AES256/GPG | Files are chunked and encrypted using strong symmetric/asymmetric keys |
Offline Sync | Rsync-style syncing over TCP or LibP2P |
Gossip Discovery | Lightweight peer discovery protocol for LAN environments |
CLI First UX | Fast and minimal CLI to manage vaults and syncs |
Chunking Each file is split into chunks using configurable size (default 4MB). Identical chunks across files are deduplicated.
Encryption Each chunk is encrypted before storage. You can:
- Use symmetric passphrase (AES-256-GCM)
- Use public/private keypairs GPG-compatible
Discovery Peers discover each other through:
- LAN gossip via UDP broadcast
- Manual IP whitelisting
- Future QR-code based sharing
Syncing Inspired by rsync, Sietch only syncs:
- Missing chunks
- Changed metadata
- Securely over TCP, with optional compression
Index Metadata Each sietch maintains an encrypted manifest (Merkle DAG) mapping chunk hashes to original files.
Attack Vector | Mitigation |
---|---|
Eavesdropping | Encrypted chunks over TLS or TCP |
Vault tampering | Merkle trees and hash-based verification |
Metadata leakage | Optional metadata obfuscation and encrypted indexes |
Unauthorized sync | Public key signature verification for known devices |
Full installation scripts and cross-platform builds will be provided in releases.
git clone https://github.com/SubstantialCattle5/Sietch.git
cd Sietch
go build
Create a new encrypted vault
sietch init --name dune --encrypt aes256
Add files to the vault
sietch add ./secrets/thumper-plans.pdf
Sync with another vault over LAN
sietch sync --peer 192.168.1.42
Decrypt a file from the vault
sietch decrypt thumper-plans.pdf .
View vault manifest
sietch manifest
Recovery Options If your vault becomes corrupted or you need to recover:
sietch recover --from .backup
sietch recover --from-remote peer-id
sietch recover --rebuild-metadata
sietch recover --verify-hashes
- Vault initialization and chunk encryption
- LAN peer discovery via UDP broadcast
- TCP file sync with retry and resume
- Optional metadata obfuscation
- WebDAV/SFTP vault mount
- Vault-to-QR export for mobile sync
Sietch is open to contributions - from UX fixes to protocol improvements.
- Fork this repo
- Create your feature branch
git checkout -b feature/stillsuit
- Commit your changes
git commit -am 'Add stillsuit hydration sync'
- Push to the branch
git push origin feature/stillsuit
- Create a new Pull Request
Inspiration
- Syncthing
- IPFS
- Obsidian Sync
- Built with love in Go
This project is licensed under the MIT License - see the LICENSE file for details.
"When you live in the desert, you develop a very strong survival instinct." - Chani, Dune