rclonedecrypt 0.2.22

CLI to decrypt rclone-encrypted files
# rclonedecrypt - Usage Examples
This document provides practical examples of how to use `rclonedecrypt` to decrypt files that were encrypted with rclone.
Unfortunately it seems that `rclone` changes its commandline interface, flags and even formats a fair bit.
**This is tested with rclone v1.59**

## Getting Started
1. **Rclone-Encrypted File**
  Rclone creates `.bin` files when encryption is enabled with filename encryption disabled, or random names without extension.
  These files contain the encrypted data in the rclone encryption format.
2. **Encryption Settings**
  You'll need two pieces of information:
  - **Password**: The encryption password used with rclone
  - **Salt**: The salt (password2) used by rclone (usually stored in `rclone.conf`)

```bash
# Decypher the obfuscated password or salt
rclone reveal PASSWORD
```

## Troubleshooting
### Common Issues
* **"Invalid file format" error**
 - Make sure you're using a file encrypted by rclone
 - Check that the file isn't corrupted
 - Verify the file starts with the rclone magic header
* **"Invalid password" error**
  - Double-check your password
  - Verify the salt is correct (base64 encoded)
  - Make sure you're using the same salt that was used for encryption
* **"File too short" error**
  - The file might be corrupted or incomplete
  - Ensure the entire encrypted file was copied

## Performance Notes
- Large files are processed in chunks for memory efficiency
- The tool can handle files of any size
- Decryption speed depends on your system's CPU performance

## Security Considerations
- The password and salt are handled securely in memory
- No temporary files are created during decryption
- Always verify the integrity of decrypted files
- Keep your rclone configuration secure as it contains encryption keys