Skip to content

Installation Guide

Fractum offers multiple installation methods to accommodate various security requirements and user preferences. This guide covers Docker installation (recommended for security), manual installation, and system requirements.

Quick Start Summary

For most users, Docker installation is recommended because it provides:

  • Complete network isolation with --network=none
  • Non-root execution for security
  • Minimal attack surface
  • Consistent environment across platforms

Installation time: 2-5 minutes depending on your method

Installation Methods Overview

Why Docker is recommended:

Enhanced security with complete network isolation
Non-root execution following minimal privilege principles
Minimal attack surface with hardened container
Read-only application code for integrity
Ephemeral environment that leaves no traces

Docker installation is ideal for:

  • Security-conscious users
  • Air-gapped environments
  • Production deployments
  • Users who want maximum isolation

Complete Docker setup guide →

Manual Installation (For Flexibility)

Manual installation is suitable when:

  • Docker isn't available in your environment
  • You need custom Python environments
  • You prefer full control over the installation
  • You're developing or contributing to Fractum

Manual installation features:

  • Installation via Python virtual environments
  • Cross-platform bootstrap scripts for Windows, macOS, Linux
  • Developer-friendly setup with source code access
  • Integration with existing Python workflows

Complete manual installation guide →

Installation Security Considerations

Before installing Fractum, consider these security best practices:

Verify authenticity using PGP signatures
Use air-gapped systems for high-security scenarios

For maximum security:

  1. Use the Docker installation method
  2. Run on an air-gapped system
  3. Verify all downloads using cryptographic signatures
  4. Follow the security best practices guide

What Happens After Installation?

Once Fractum is installed, you can:

  1. Encrypt your first file - Split sensitive data into secure shares
  2. Configure threshold settings - Define how many shares are needed for recovery
  3. Distribute shares securely - Store shares with trusted custodians
  4. Test recovery process - Verify you can reconstruct your data

Next Steps After Installation

Essential reading after installation:

Troubleshooting Common Installation Issues

Need help? Report installation issues on GitHub

Key Takeaways

In summary:

Docker installation is recommended for maximum security and isolation
Manual installation provides flexibility for development and custom setups
Cross-platform support covers Windows, macOS, and Linux
Minimal system requirements make Fractum accessible on most hardware
Air-gapped operation works without internet connectivity
Multiple verification methods ensure authentic installations

Installation typically takes 2-5 minutes and provides enterprise-grade secret sharing capabilities immediately.