Posts

Security Vulnerability in Hub Vault Unlock: Update Required

We have released an important security fix for all Cryptomator client apps, which fixes a vulnerability affecting all users who unlock Hub-managed vaults.

Required Action

Please update all your Cryptomator client applications that access Hub-managed vaults immediately to the fixed versions:

You can also find all downloads on our downloads page.

After the update, Cryptomator clients connecting to self-hosted Hub instances will show a one-time “Trust this host?” dialog that must be confirmed individually. Before accepting, please verify that the displayed Hub URL is correct and matches your Cryptomator Hub instance. Clients connecting to Cryptomator Hub Managed are not affected by this dialog, as managed domains are trusted automatically.

Trust this host? dialog showing a Hub URL that needs to be verified

Are my vaults safe?

Yes. Since Cryptomator Hub uses end-to-end encryption, vault data was never in danger.

Which vaults are affected?

The vulnerability lies within the unlock workflow of Hub-managed vaults. Local vaults are unaffected.

What data is at risk?

An attacker with write access to your encrypted data could tamper the vault in a way that makes Cryptomator send a session token to a malicious server. The exfiltrated token can then be used to impersonate a user to access unencrypted information like usernames, vault names, etc. in Hub.

Has this been exploited?

At this time, we have no evidence of active exploitation of this vulnerability.

Security Advisories

As part of responsible disclosure, the full security advisories will be published on March 20. Until then, the following links will not work yet — this is expected and intentional:

How can I get help?

If you have any further questions or need assistance during updates, don’t hesitate to contact us at [email protected].

Confidentiality Is a Must: Why Works Councils Need Encryption

Works councils play a central role in companies when it comes to protecting the interests of employees. In doing so, they process particularly sensitive data on a daily basis: personal complaints, election results, meeting minutes, or confidential agreements with trade unions. All of this information is not only subject to a moral obligation of confidentiality—it also falls under the strict requirements of the GDPR.

But how can a works council fulfill this responsibility in the digital age, when documents are often stored, shared, and edited collaboratively in the cloud? The answer lies in a combination of technical security, organizational processes, and the right tools.

Why Works Councils Need Encryption More Than Ever

Sensitive Data Requires Special Protective Measures

Personnel data, sick notes, conflict discussions, internal processes—works councils have deep insights into the innermost workings of the company. This information concerns not only labor law disputes or restructuring, but also very personal situations in the lives of employees.

The GDPR requires such personal data to be protected with appropriate technical and organizational measures. This explicitly includes encryption. This measure is not an optional extra, but a central component of works council work that complies with data protection regulations.

Why Encryption Is Not Always the Same

Many companies today already rely on cloud-based systems such as Microsoft 365 or Google Workspace. These solutions advertise built-in security and encryption. However, what many people don’t know is that this often involves server-side encryption, which means that although the data is encrypted, the provider or administrator has the keys. Anyone who has access to the system can also access the data. This applies in particular to internal company administrators or external service providers.

This is not sufficient for particularly sensitive information, such as that processed by works councils. End-to-end encryption is required here: only authorized persons can access the content – even cloud providers or central IT departments have no access. The key to access remains exclusively with the works council.

Digital Sovereignty With Cryptomator Hub

Cryptomator Hub provides works councils with a tool that meets precisely these requirements. The solution enables the creation of encrypted data rooms (known as vaults) that can be used on any common cloud platform – while remaining entirely under the control of the council.

Vaults can be structured according to topics, roles, or working groups – for example, for minutes, election documents, complaints, or legal advice. Access rights can be assigned granularly via a clear interface. For example, only the election committee is authorized to access election documents, while other members have access to general meeting minutes.

Another advantage: the Web of Trust principle allows the committee to integrate new devices and members on a trust basis – without any central IT management or external administration. This is how digital self-administration becomes a reality.

Integration Without IT Dependency

A common obstacle for works councils is their dependence on their employer’s IT infrastructure. What if the company itself provides the cloud platform? Or what if the works council does not operate its own technical infrastructure?

Cryptomator Hub works independently of the underlying cloud. This means that even if the company provides Dropbox, OneDrive, or Nextcloud, the works council can securely encrypt its content without the employer having access. Control over the key and access structure remains exclusively with the committee.

It can also be used on private devices, which is an important factor for smaller works councils or committees without their own office infrastructure.

Conclusion

Confidentiality is not a nice-to-have, but a legal obligation and a responsibility that must be upheld. Works councils facing digital transformation should view the protection of sensitive data as a key requirement—not only to comply with legal requirements, but also to maintain the trust of the workforce.

With end-to-end encryption and independent tools such as Cryptomator Hub, works councils can fulfill this obligation securely, easily, and independently. And in doing so, they can send an important message: for digital maturity, for data protection, and for modern co-determination on an equal footing.

Two Years of Cryptomator Hub – Team Encryption Reimagined

On November 2, 2023, Cryptomator Hub 1.0 was released—our solution for secure, encrypted collaboration in the cloud. Two years later, Cryptomator Hub has become a central tool for companies, universities, and NGOs that want to protect their sensitive data while working efficiently as a team.

On this anniversary, we look back on two exciting years full of further developments, beta features, new areas of application—and what’s yet to come.

Two Years of Cryptomator Hub – Team Encryption Reimagined

What is Cryptomator Hub?

Cryptomator Hub is the central platform for managing and sharing encrypted vaults.

While the classic Cryptomator app allows individuals to protect their cloud files, the Hub extends this principle to teams and organizations.

Cryptomator Hub offers a web-based dashboard that administrators and team members can use to manage users, assign roles, and control access rights—all fully encrypted and GDPR-compliant.

Cryptomator Hub thus bridges the gap between strong end-to-end encryption and user-friendly teamwork.

Features That Make the Difference

  1. Centralized Management of Users and Permissions
    Whether you’re a small team or a large organization, administrators can always keep track of who has access to which vaults. Role-based permissions make management easy and transparent.
  2. Web of Trust
    This security model enables secure key exchange between team members via digital trust relationships. No unencrypted data exchange and no complicated key files, as trust is mapped technically.
  3. Create Vault Role
    Teams can independently create new vaults without administrators having to accompany each step. This keeps collaboration flexible while maintaining a high level of security.
  4. Self-Hosting & Data Protection by Design
    Data protection is not an add-on, but a core principle: Cryptomator Hub can be operated locally (on-prem) or in private cloud environments. This gives companies and institutions complete control over their infrastructure and data.
  5. Integration with Popular Cloud Services
    Whether OneDrive, Google Drive, Dropbox, or Nextcloud, Cryptomator Hub integrates seamlessly into existing work environments and protects data regardless of the provider.

Typical Areas of Application

Companies and Public Authorities

Companies use Cryptomator Hub to implement zero-trust security strategies. Industries with high compliance requirements—such as healthcare, public administration, and legal services—benefit particularly from GDPR-compliant cloud encryption.

Companies such as Walbusch GmbH & Co. KG are already successfully using Cryptomator Hub and can report consistently positive results:

With Cryptomator Hub, we can securely manage sensitive company data while making it easy for our employees to use.

Andreas Cofalla, Application Manager IT, Walbusch GmbH & Co. KG

Universities and Research Institutions

Research teams secure their project data with Hub without sacrificing cloud collaboration. Sensitive research data remains protected while collaboration across departments or countries continues to function.

NGOs and Nonprofits

For organizations operating globally, Cryptomator Hub offers a secure way to share confidential documents—from grant proposals to personnel data—even with limited IT resources.

IT Teams and Data Protection Officers

Hub simplifies audits, role management, and verification of data protection-compliant working practices—a clear advantage in internal and external security audits.

Two Years of Further Development – And Looking to the Future

Since its launch in 2023, Cryptomator Hub has developed rapidly.

The 1.4.0 update in April 2025 brought two decisive milestones with the Web of Trust and the Create Vault role. Furthermore, everything is focused on optimization, scaling, and future-proofing—especially with regard to the upcoming standards of post-quantum cryptography.

But we are not resting on our laurels. Three new features are already in the pipeline to make Cryptomator Hub even more powerful and user-friendly.

User/Group Management

User and group management will become much more convenient in the future. With the new, integrated user/group management, smaller companies and organizations can create and manage their team structures directly in the hub—intuitively, clearly, and without detours.

In the background, we continue to rely on Keycloak—a proven, powerful solution for identity and access management.

Cryptomator Hub – User/Group Management Preview

Emergency Access

In companies, it can always happen that employees leave and access to important data is lost as a result.

The upcoming Emergency Access feature provides a remedy here: it allows you to designate a specific group of authorized persons who can restore access to a vault, either collectively or partially, in an emergency.

Even in critical situations or in the event of personnel changes, the company remains capable of acting.

Cryptomator Hub – Emergency Access Preview

Files in Use (in the Desktop App)

A frequently expressed wish of our Hub customers: better support for collaborating on Office files.

While LibreOffice, for example, already has a built-in locking system for open files, this has been missing in Microsoft Office until now. That’s why we are currently developing our own “locking system” in the Cryptomator desktop app that recognizes when a file is already open and informs other users.

This makes collaborating on documents more conflict-free, transparent, and secure—another step toward smooth teamwork.

Two Years of Trust, Cooperation, and Security

In two years, Cryptomator Hub has evolved from an idea into a reliable platform for secure teamwork.

We would like to thank all users, administrators, and testers who have helped to further develop Cryptomator Hub with their feedback—and we look forward to the next chapter.

Cryptomator Hub 1.4.0: More Trust, More Control, More Transparency

With the release of version 1.4.0, Cryptomator Hub receives a major feature upgrade that offers more control and transparency — while also improving the overall user experience.

At the heart of this release are a new Web of Trust, finer-grained permission management, extended audit logging, and deeper insights into user profiles.

Let’s take a closer look at what’s new!

Web of Trust: Mutual Verification for Better Security

Hub 1.4.0 WoT

One of the highlights of this release is the new Web of Trust (WoT). Users can now mutually verify each other’s identities by signing public keys. This creates a network of trust that protects against the injection of manipulated or forged public keys.

This feature directly addresses so-called “key injection” risks and strengthens the protection of sensitive data across organizations.

The verification process is based on a simple but effective principle: Only when a person’s public key is confirmed by trusted peers is their identity considered verified.

Admins can configure how many verifications are required.

New Create-Vaults Role: Granular Permissions for Vault Creation

With the introduction of the new create-vaults role, admins now have full control over who is allowed to create new vaults within the organization.

Previously, this permission was available to all users by default — now, admins can specify whether only certain teams, individuals, or everyone should have access to this feature.

Especially in large organizations, this is a key improvement for maintaining order and managing infrastructure growth in a more controlled way.

Audit Log: Even More Precise Activity Tracking

Hub 1.4.0 Audit Log

Monitoring security-relevant actions is a key responsibility in IT operations. With version 1.4.0, the audit log becomes even more powerful:

  • Filter by event type: You can now filter audit log entries by type — such as key changes, access attempts, or account activity — to quickly isolate relevant data during incidents.
  • New events: Several new event types were added to better capture security-critical actions.
    • Register Device – A user registered a new device, e.g., Cryptomator app or browser session.
    • Remove Device – A user removed a device.
    • Signed Identity – A user signed another user’s identity.
    • Account Key Changed – A user regenerated their account key, which also affects user keys.
    • Reset User Account – A user reset their account.
    • User Keys Change – A user changed their keys, e.g., during initial setup or account key updates.
    • Claim Vault Ownership – A user claimed ownership of a vault that was created with a Hub version prior to 1.3.0 using the Vault Admin Password.
  • Retrieve Vault Key event enhanced: This audit event now includes the IP address and device ID — making it easier to trace who unlocked a vault and from which device.

More Transparency in User Profile

Hub 1.4.0 Profile View

The user interface has also been updated to offer more transparency about devices and access patterns:

  • Legacy devices: Users can now see if they’re still using devices linked to vaults created with older versions of the Hub. This helps with migrations to the current user-key-based encryption introduced in version 1.3.0.
  • Last IP and vault access timestamp: The device overview now shows the last known IP address and the most recent vault access timestamp for each device — ideal for identifying suspicious activity.

New Languages and Improved Usability

  • More language support: Cryptomator Hub is now available in Dutch, French, Italian, Korean, Portuguese, and Turkish — making it even more accessible for international teams.
  • Language preference is preserved: Your selected language setting is now saved in your user profile and no longer resets after logout.

Provenance Attestation for Container Images

A frequently overlooked but critical area of security is the authenticity of software containers. Starting with version 1.4.0, we now publish provenance attestations for our container images.

These attestations document the origin and integrity of our images and provide additional assurance for automated deployments and CI/CD pipelines.

Full Changelog

All technical details, fixes, and improvements can be found in the release notes and the new CHANGELOG file.

Closing Remarks

Cryptomator Hub 1.4.0 is a release that builds trust — through greater visibility, more refined controls, and solid technical foundations.

Whether it’s security management, role-based permissions, or user-facing transparency: This update lays the groundwork for even more robust data infrastructures in organizations that take encryption seriously.

Cryptomator Hub Celebrates Its Second Anniversary – Test New Features in Beta Now!

It’s hard to believe that Cryptomator Hub is already two years old! As a central management platform for encrypted cloud storage solutions, Cryptomator Hub enables businesses and organizations to securely and efficiently manage access and permissions. Since its release on November 2, 2022, we’ve worked hard with our community to develop an even stronger and more secure tool to meet your needs. First of all, a huge thank you to the community! To celebrate this milestone, we’re introducing exciting new features – and the best part: you can test them now in a beta version!

Identity verification by confirming fingerprint characters in Cryptomator Hub 1.4.0

“Web of Trust” – Enhanced Security through Mutual Verification

Our brand-new “Web of Trust” feature adds an extra layer of security to your Cryptomator instance. Until now, users could verify others, but now we’re taking it a step further: once a verification is made, it’s automatically signed and shared, making it possible for others to see when someone has been marked as trustworthy. This creates a network where trust and authenticity become visible.

This feature allows teams to see at a glance how trustworthy someone is within the network, based on prior verifications by other users. It’s especially beneficial for organizations that prioritize secure collaboration and high authenticity, as it makes trust visible and traceable within the platform.

“Create-Vaults Role” – Precise Control Over Vault Creation

With the “Create-Vaults Role,” admins now have the ability to precisely control who can create their own vaults within the Hub. Previously, anyone in the Hub could create new vaults, but now, permissions can be finely configured. For instance, admins can decide that only certain departments, such as IT or HR, can create new vaults. This function ensures clear structure, prevents unwanted vaults, and adapts to your organization’s unique needs. This flexibility is particularly beneficial for larger teams.

Test the Beta Now!

These features are available in the beta version and are waiting for you to try them out. Give us your feedback and help us fine-tune these functions before the official release. The full rollout is planned for the coming weeks – until then, we look forward to your support and insights!

Cryptomator Hub 1.3.0: The Account Key Update

The release of Cryptomator Hub 1.3.0 marks an exciting feature update, which introduces an Account Key for users. This update, while necessary and beneficial, will require active participation from users. Here’s what to expect during the transition from version 1.2.x to 1.3.0.

ℹ️ Preparation is Key

Before we dive into the upgrade process, ensure every vault admin secures a backup of their Vault Recovery Keys and Vault Admin Passwords. ⚠️ Doubling down on this step is critical; your backups are your safety net. Without them, our hands are tied.

⬆️ Updating Cryptomator Hub (Server) to 1.3.0

This section is only relevant for administrators who host their own Cryptomator Hub instance. If you’re using our managed service, you can skip this section. We will reach out to you to arrange a date and time to update your instance.

As mentioned above, if you’re an administrator of a self-hosted Cryptomator Hub instance, follow these steps to update Cryptomator Hub:

  1. Back up the database. ⚠️ The importance of a working backup cannot be overstated.
  2. Refresh your container image to the latest version: ghcr.io/cryptomator/hub:1.3.0
    • Skip this step if you’re using the stable tag. We will update the stable tag to point to the new version in a couple of weeks.
  3. Implement the changes within your container orchestrator. Monitor for healthy pod statuses before proceeding.

⬆️ Updating Cryptomator (Desktop Client) to 1.11.0

Updating the Cryptomator desktop application is recommended for all users, but not technically required for now. Vaults can still be unlocked using an old version. This backward compatibility provides flexibility for a gradual rollout of the updated app. Nevertheless, making changes to access, incl. adding new members to a vault and adding new devices, requires Cryptomator 1.11.0 or higher.

🔑 Introducing Account Keys

With the updated app, users will encounter a two-step migration on their first unlock attempt:

  1. Secure and store their new personal Account Key. ⚠️ It’s crucial for future logins from other devices.
  2. Use the Account Key to link their Cryptomator device to their account.

This procedure is a one-time requirement for every user. It allows users to self-manage linked devices and vault owners to more easily manage access without having to frequently regrant permissions each time a user logs in from a new device.

👤 Claiming Vault Ownership and Granting Access

After updating to Hub 1.3.0, vault owners (formerly known as vault admins) are prompted to claim their vault again using the Vault Admin Password. Initially, only one user can claim ownership. Subsequently, this primary owner can grant ownership rights to others, thus eliminating the need to share the Vault Admin Password.

Once vault members have navigated through the account migration, vault owners should refresh vault permissions. This action will securely distribute the necessary vault keys to the users.

❓ Frequently Asked Questions

Q: What exactly is my Account Key?
A: The Account Key is your personal secret, required for registering new devices and establishing your identity across different Cryptomator apps and browsers. Treat it with the same level of security as you would with any important password.

Q: How do I retrieve my Account Key if I lose it?
A: You can retrieve your Account Key by logging into your Cryptomator Hub account and navigating to the Profile page. There, you can view your Account Key. If your browser doesn’t have access and you can’t retrieve it anymore, you can reset your account. In this case, you will lose access to all your vaults and the vault owner(s) will have to grant you access again.

Q: Will the update affect my existing vaults and the data they contain?
A: No, the update will not affect your vaults or the data they contain. This update only affects the unlock process and access management, not the encrypted data itself.

Q: What happens to the Vault Admin Password after I reclaim ownership?
A: Upon reclaim, the Vault Admin Password becomes obsolete. You may destroy any copies of it. Compromised Vault Admin Passwords don’t pose a threat to the security of the vault.

Q: Is the process for adding new users to a vault different?
A: The difference is that you don’t grant access to each and every device, but to the user once, thanks to the Account Key. The user can link their devices to their account and access the vault from any of them without having to ask for permission again.

Q: What should I do if I encounter problems during the upgrade process?
A: If you encounter any problems during the upgrade process, please contact us at [email protected].

📋 Wrapping Up

The upgrade to Cryptomator Hub 1.3.0 and Cryptomator 1.11.0 is more than a routine update. It’s a shift towards greater security and user agency. Prepare for the update by backing up essential data, and follow the outlined steps to ensure a smooth transition. Embrace the change, as it brings forward a more robust and user-friendly way to manage your vaults.

Cryptomator Hub 1.2.0: More Control and Flexibility

We’re excited to release Cryptomator Hub 1.2.0, featuring essential updates for both administrators and users. 🎉 Let’s dive into what’s new.

🗒️ Audit Logs (Premium Feature)

Our new Audit Logs feature, available with a paid license, empowers administrators with insights into user activities. Monitor vault changes, key retrievals, and other essential activities, providing an extra layer of transparency and accountability within your organization.

⚙️ Improved Vault Management

With the “Edit Vault Metadata” action, customizing vault details is now possible. You can now change the name and description of your vaults, helping you keep your vaults organized and easily identifiable. Plus, vault names no longer need to be unique, offering more flexibility.

We’ve also added the “Archive Vault” action, allowing you to remove vaults from your list. Easily reactivate archived vaults whenever needed.

👤 Streamlined User Profile Page

Our new “User Profile” page centralizes device management and user settings in one convenient location. Additionally, we’ve integrated a “Manage Account” link for users to be able to change their password and configure 2FA via Keycloak.

⬆️ Upgrade Info

Upgrading to 1.2.0 is simple. If you are on the stable lane, you just have to pull the image and restart the service. Otherwise, update the version number in your Docker Compose or Kubernetes spec file before you restart the service. Remember to always back up your data, especially before upgrading. For managed instances, rest assured, you’re already on the latest version.

⏭️ What’s Next

We’re embarking on a significant refactoring journey for our key management system in the next feature update. This update will introduce “user keys” as intermediary key pairs between vault keys and device keys. Vault owners will then grant access to users and not individual devices, which allows users to manage their devices independently.

This refactoring will deprecate vault admin passwords and introduce the vault owner role, providing a more secure and efficient way to manage your vaults.

Stay tuned for more exciting updates!

Cryptomator Hub: Managed – Request Access Now

We are happy to announce that managed instances of Cryptomator Hub are now available! 🎉 And we have released Hub 1.1.0 with recovery key support.

Request Access

First things first. 🚀 To get started, you can now request access to a managed instance of Cryptomator Hub. After your request, we will get back to you as soon as possible. Currently, some of the steps we take internally to create a managed Hub instance are still done “manually”. We are working on automating this process, but we didn’t want to delay the release any longer.

Managed vs. Self-Hosted

Managed instances of Cryptomator Hub are a great way to start using Cryptomator Hub right away without having to deploy and maintain your self-hosted instance.

Until now, you could only use the self-hosted version of Hub. This requires a lot of knowledge about how to deploy a software container using Kubernetes or Docker Compose. And if you have the knowledge, you still have to maintain the instance yourself. This includes updating the software, monitoring the instance, and keeping it secure.

With managed instances, we will take care of deploying and maintaining your Hub instance, while ensuring that your instance is highly available. You can focus on your work and your team.

This is all possible because of the underlying zero-knowledge key management. Cryptomator Hub doesn’t store unencrypted keys. All key material remains locally on the client. We can’t decrypt your data. It also helps that Hub is independent of your cloud storage provider, which means we have no access to either the key material or the cloud files.

Release 1.1.0: Recovery Key

We didn’t stop there and released Cryptomator Hub 1.1.0 with recovery key support. This allows you to access your data in case of disaster. Not only that, the recovery key is compatible with Cryptomator’s recovery key. This means you can convert your existing vaults to Hub vaults and vice versa.

What does that mean for your managed instance? If we cease to exist (we get asked this a lot, thanks to Boxcryptor 😉), you can convert your Hub vaults to “regular” password-based vaults, completely offline, so that you always have access to your data under any circumstances. This is also great for your self-hosted instance if something happens to your server.

Cryptomator Hub 1.0 Release

We are happy to announce that Cryptomator Hub, the team and enterprise solution for Cryptomator, is now ready for production use! 🎉 Huge thanks to our testers that participated in our open beta over the last 3 months for their feedback. ❤️

What is Cryptomator Hub?

In short: Cryptomator Hub adds access management for your Cryptomator vaults. It enables a secure way for you to work in teams with confidential and sensitive files for any cloud storage.

Check out our quick introduction video to learn more about the basics.

How does Cryptomator Hub work?

Cryptomator Hub is based on the same concept of a vault, a secure file storage for syncing to the cloud with end-to-end encryption. New is that Hub replaces the vault password with a central access management.

Individual access to Cryptomator vaults is secured through server-side authentication and key management. Hub manages key material based on a zero-knowledge solution without getting in touch with unencrypted keys. Learn more.

How can I get started?

The self-hosted solution is delivered as a software container and can be deployed using Kubernetes or Docker. Vist the landing page of Cryptomator Hub to get started.

Hub can be used for free for up to 5 team members. For larger teams and companies, an annual license can be purchased through the website at $6.00 per seat per month. Until the end of the year, there is a promotional discount that gives 25% off for the first year. 🎊

And as always, Cryptomator Hub is fully open source. If you have more questions, let us know in the discussion below or contact us. We are looking forward to your feedback! 🤖