Software Alternatives, Accelerators & Startups

Dangerzone Reviews and details

Screenshots and images

  • Dangerzone Landing page
    Landing page //


Promote Dangerzone. You can add any of these badges on your website.

SaaSHub badge
Show embed code


We don't have any videos for Dangerzone yet.

Social recommendations and mentions

We have tracked the following product recommendations or mentions on various public social media platforms and blogs. They can help you see what people think about Dangerzone and what they use it for.
  • Ask HN: How can I security-sandbox email attachment opening?
    Start here: I've never used it, but I've been meaning to check it out. At least it should give you a jumping off point for further investigation. If that is insufficient, use proofpoint. For archives that are tickling bugs, you have to use a similar technique. it's not enough to analyze them and send them on... - Source: Hacker News / 9 months ago
  • Ask HN: Why not cloud instead of Qubes “trusted PDFs” or Dangerzone?
    I've read about the concept of "trusted PDFs" [1] from Qubes OS and the Dangerzone project [2]. I noticed people saying they use such tools to open applicant attachments in the context of employee hiring processes. Isn't it simpler to just open these untrusted files in a cloud service like Google Drive or Microsoft Office online? [1]... - Source: Hacker News / 12 months ago
  • QubesOS – A reasonably secure operating system
    You can use something similar on macOS, Windows or Linux, based on Docker containers, see Dangerzone: - Source: Hacker News / 12 months ago
  • Help an independant journalist survive :)
    Https:// has been a great tool to use as an added layer of defense. Definitely check out this users other projects as you can tell by the users name that they are made for journalists. Source: about 1 year ago
  • Downloading pdf’s & Javascript
    This is exactly what DangerZone is built for. Takes ‘dangerous’ PDFs, converts them to images and back (via OCR) so there’s nothing potentially harmful inside. Does all the conversion inside docker containers so there’s little chance of a sandbox escape or network access. Source: about 1 year ago
  • How can I implement this open-source tool as an API?
    In light of the Linus Tech Tips hack, the CEO of the company wants us to find a way to securely open files uploaded by clients. I'm new to the team and with little development experience, but I want to learn. How can I implement this tool as an API? There's instructions for the GUI, but I can't really understand how you'd implement it without the GUI, just as a script that can run on every file uploaded to our... Source: about 1 year ago
    Check out DangerZone. It encodes a .pdf (and other formats) to image data then converts it back to .pdf, optionally preserving OCR'ed text, so that any potential executable code hidden within is lost. For further security, all operations run sandboxed. - Source: Hacker News / over 1 year ago
  • I think the CTX package on PyPI has been hacked!
    Isolating … like setting up a VM without net access or shared folders and then use e.g. dangerzone? Source: about 2 years ago
  • Opening PDFs securely
    Use dangerzone to create safe PDF files, although in my experience it doesn't complete the conversion for some PDF files. Source: over 2 years ago
  • Secure setup for viewing potentially malicious PDF ?
    An alternative is to use dangerzone, which does the same pdf to image to pdf conversion except using a container instead of a VM. Source: over 2 years ago
  • Tor and piratebay compatability
    "Unsafe: BitTorrent over Tor....Don't torrent over Tor....Not only do you deanonymize your torrent traffic and your other simultaneous Tor web traffic this way, you also slow down the entire Tor network for everyone else....If you must work with files downloaded via Tor, we strongly recommend either using a disconnected computer, or using dangerzone to create safe PDF files that you can open. Under no... Source: almost 3 years ago
  • Can downloaded pdf’s be tracked when opened?
    For a security focused method of flattening pdfs check out dangerzone. It uses docker to spin up containers to flatten the pdfs. It creates one container which opens the suspect pdf, word document, etc and converts it to an image. A second container takes this image and converts it to a pdf. Source: about 3 years ago

Do you know an article comparing Dangerzone to other products?
Suggest a link to a post with product alternatives.

Suggest an article

Dangerzone discussion

Log in or Post with

This is an informative page about Dangerzone. You can review and discuss the product here. The primary details have not been verified within the last quarter, and they might be outdated. If you think we are missing something, please use the means on this page to comment or suggest changes. All reviews and comments are highly encouranged and appreciated as they help everyone in the community to make an informed choice. Please always be kind and objective when evaluating a product and sharing your opinion.