- How does 0bin work?
The encrypted content is then sent to the server, which returns the address of the newly created paste.
The browser never sends the hash to the server, so the latter does not receives the key at any time.
No, it isn't.
The goal of 0bin is not to protect the user and their data (including, obviously, their secrets).
Instead, it aims to protect the host from being sued for the content users pasted on the pastebin. The idea is that you cannot require somebody to moderate something they cannot read - as such, the host is granted plausible deniability.
Remember that as an user, you should use 0bin in the same way as unencrypted and insecure pastebins - that is, with caution. The only difference with those is that if you decide to host a 0bin server, the encryption feature hopefully be used as a defense. This is not proven, though! :-)
0bin is not built, and does not aim, to protect user data - but rather the host. If any user data is compromised, 0bin still provides the host with plausible deniability (as they ignore the content of the pastes).
It would make no sense if the host was to compromise the encryption process to read the data; in that case, they wouldn't have installed 0bin in the first place, as 0bin is here to protect them.
It would be unlikely for those softwares to fail you. Errors will nearly always come from your side - you ought to have a perfect operations security if you do not want your data to be leaked. Remember to use your common sense.
- How did the idea of 0bin emerge?
0bin is based on sebsauvage's work. The project sprang as a reaction to the implementation of a moderation system on Pastebin, due to the significant amount of illegal content pasted on it, or that it linked to.
- How can I get 0bin?
0bin is an open-source project, and the code is hosted on GitHub. You can either download a tarball or clone the repository.