Secure Data Management

BAR

Burn After Reading

A powerful tool for secure, temporary data management with military-grade encryption and self-destruction capabilities

Secure Fast CLI Encrypted Self-Destruct
256
Bit Encryption
100%
Offline
0%
Data Leakage
BAR - Secure File Manager
Files
Settings
Security
History
secret_document.bar
Expires in 2 days
confidential_data.bar
2/3 accesses left
source_code.bar
Hardware-bound
Add new secure file...
Encrypted
Protected
Offline

About BAR

BAR (Burn After Reading) is a powerful desktop application designed for secure file management with advanced security features including self-destruction capabilities. Operating entirely offline with no server dependencies, BAR ensures your sensitive data never leaves your machine.

The application combines strong encryption, customizable security settings, and comprehensive file scanning to provide a complete solution for protecting your most sensitive information.

BAR File Lifecycle Flow

File Lifecycle in BAR System

⚠️ Important Security Notice

BAR includes powerful security features that can result in permanent data loss. By using this application, you acknowledge that:

  • Files deleted through BAR's security features CANNOT be recovered
  • You are responsible for ensuring your use complies with local laws and regulations
  • The security of your data depends on the strength of your passwords
  • No security measure is 100% foolproof

Key Features

Completely Offline Operation

Works without internet connection or server dependencies

Military-Grade Encryption

AES-256 in GCM mode for authenticated encryption

Secure Key Management

PBKDF2 with high iteration counts and hardware binding options

Time-based Expiration

Files automatically delete after a specified time

Access Count Limits

Files delete after being accessed a certain number of times

Deadman Switch

Files delete after a period of inactivity

Anti-Brute Force

Files delete after multiple failed password attempts

Advanced File Scanning

Detect and validate .bar files across all connected devices

Security Architecture

BAR Security Architecture Diagram

BAR Security Architecture Overview

Encryption System

  • AES-256 in GCM mode for authenticated encryption
  • Unique encryption key for each file
  • Key derivation using PBKDF2-HMAC-SHA256 with high iteration counts
  • Hardware-binding option to prevent access from unauthorized devices
  • Secure memory handling to prevent key exposure

Self-Destruction Mechanisms

  • Time-based: Files automatically delete after a specified time period
  • Access-count: Files delete after being accessed a certain number of times
  • Deadman switch: Files delete if not accessed within a specified period
  • Anti-brute force: Files delete after multiple failed password attempts
  • Secure deletion using multi-pass overwrite techniques compliant with DoD standards

Secure Storage

  • All data stored locally in the ~/.bar directory with proper encryption
  • No plaintext storage of sensitive information
  • Secure key management with memory protection
  • Blacklist system to prevent reimporting of deleted sensitive files
  • File integrity verification using digital signatures

Anti-Tampering Protection

  • Runtime integrity checks to detect application tampering
  • Hardware ID verification to prevent unauthorized device access
  • Secure random number generation for cryptographic operations
  • Protection against timing attacks in cryptographic implementations
  • Memory protection to prevent sensitive data exposure

Get Started with BAR

Setting up BAR is quick and straightforward. Follow the steps below to get started with secure file management in minutes.

System Requirements

Operating System

Windows 10/11 (primary support)

Limited support for Linux/macOS

RAM

4GB minimum

8GB recommended

Storage

100MB for application

Additional space for secure files

Connectivity

No internet required

100% offline operation

Installation Options

Choose your platform below and follow the simple installation steps. BAR is designed to work across multiple operating systems with minimal setup required.

Full Support
Partial Support
Partial Support

Option 1: Running the Executable (Recommended)

1.
Download

Get the latest release of BAR.exe from the releases page

Always verify the checksum after downloading to ensure file integrity
2.
Run

No installation required - simply double-click the executable to launch BAR

You may need to approve security warnings on first run
3.
Setup

Create a user account with a strong password on first run

Use a unique password with at least 12 characters including symbols
4.
Ready

BAR will automatically create necessary directories and configuration files

Default configuration works for most users, but can be customized
Download for Windows Latest: v1.0

Option 1: Running from Source

1.
Prerequisites

Ensure you have Python 3.8 or higher installed

2.
Clone

Clone the repository: git clone https://github.com/Mrtracker-new/BAR.git

3.
Setup

Navigate to the directory: cd BAR
Install dependencies: pip install -r requirements.txt

4.
Launch

Run the application: python main.py

View on GitHub Latest: v1.0

Option 1: Running from Source

1.
Prerequisites

Ensure you have Python 3.8 or higher installed

2.
Clone

Clone the repository: git clone https://github.com/Mrtracker-new/BAR.git

3.
Setup

Navigate to the directory: cd BAR
Install dependencies: pip install -r requirements.txt

4.
Launch

Run the application: python main.py

View on GitHub Latest: v1.0

Advanced Options

Building from Source

1.
Setup

Install dependencies: pip install -r requirements.txt

2.
Prepare

Install PyInstaller: pip install pyinstaller

3.
Build

Build the executable: pyinstaller --onefile --windowed main.py

4.
Deploy

Find the executable in the dist folder

For detailed build instructions, refer to the INSTALL.md file.

Python PyInstaller Cryptography

Community Support

Need help with installation? Join our community channels: