Installation Guide¶
Fractum offers multiple installation methods to accommodate various security requirements and user preferences. This guide covers Docker installation (recommended for security), manual installation, and system requirements.
Quick Start Summary¶
For most users, Docker installation is recommended because it provides:
- Complete network isolation with
--network=none
- Non-root execution for security
- Minimal attack surface
- Consistent environment across platforms
Installation time: 2-5 minutes depending on your method
Installation Methods Overview¶
Docker Installation (Recommended for Security)¶
Why Docker is recommended:
✅ Enhanced security with complete network isolation
✅ Non-root execution following minimal privilege principles
✅ Minimal attack surface with hardened container
✅ Read-only application code for integrity
✅ Ephemeral environment that leaves no traces
Docker installation is ideal for:
- Security-conscious users
- Air-gapped environments
- Production deployments
- Users who want maximum isolation
Manual Installation (For Flexibility)¶
Manual installation is suitable when:
- Docker isn't available in your environment
- You need custom Python environments
- You prefer full control over the installation
- You're developing or contributing to Fractum
Manual installation features:
- Installation via Python virtual environments
- Cross-platform bootstrap scripts for Windows, macOS, Linux
- Developer-friendly setup with source code access
- Integration with existing Python workflows
Complete manual installation guide →
Installation Security Considerations¶
Before installing Fractum, consider these security best practices:
✅ Verify authenticity using PGP signatures
✅ Use air-gapped systems for high-security scenarios
For maximum security:
- Use the Docker installation method
- Run on an air-gapped system
- Verify all downloads using cryptographic signatures
- Follow the security best practices guide
What Happens After Installation?¶
Once Fractum is installed, you can:
- Encrypt your first file - Split sensitive data into secure shares
- Configure threshold settings - Define how many shares are needed for recovery
- Distribute shares securely - Store shares with trusted custodians
- Test recovery process - Verify you can reconstruct your data
Next Steps After Installation¶
Essential reading after installation:
- 📁 Encrypt your first file - Learn the basic encryption workflow
- 🔓 Decrypt a file using shares - Understand the recovery process
- 🔒 Security best practices - Essential security guidelines
- 🏗️ Security architecture - Deep dive into how Fractum works
Troubleshooting Common Installation Issues¶
Need help? Report installation issues on GitHub
Key Takeaways¶
In summary:
✅ Docker installation is recommended for maximum security and isolation
✅ Manual installation provides flexibility for development and custom setups
✅ Cross-platform support covers Windows, macOS, and Linux
✅ Minimal system requirements make Fractum accessible on most hardware
✅ Air-gapped operation works without internet connectivity
✅ Multiple verification methods ensure authentic installations
Installation typically takes 2-5 minutes and provides enterprise-grade secret sharing capabilities immediately.