How To Use Obsidian: Sync for FREE Without The Cloud (And Encrypted Bonus!)
Based on Obsidian Explained (No Code Required)'s video on YouTube. If you like this content, support the original creators by watching, liking and subscribing to their content.
Cryptomator encrypts an Obsidian vault and provides a mounted decrypted view only after unlocking, so decrypted data stays local to the device being used.
Briefing
Local-first note-taking in Obsidian is powerful because vaults live as files on a user’s own devices. That same design becomes a headache when someone switches between a work desktop and a laptop on the road: the vault needs to appear on multiple computers without giving up control of the data or pushing it into a third-party cloud.
A workaround uses three tools to keep an encrypted Obsidian vault synchronized across devices for free. Cryptomator encrypts a vault folder (and can mount it as a virtual “drive” when unlocked). SyncThing then synchronizes the encrypted folder between computers using a peer-to-peer protocol, so only ciphertext is copied across the network. On each device, Cryptomator decrypts locally after SyncThing has delivered the encrypted files, and Obsidian reads the decrypted vault as if it were just another local folder.
The setup starts with installing Cryptomator on every device. A new encrypted vault is created with a chosen name and a storage location on the local drive. After unlocking, Cryptomator reveals a mounted view (an external-drive-like interface) where the user can create the actual Obsidian vault folder. Inside that mounted area, Obsidian behaves normally: users create folders, add Markdown files, and the vault contents are written into the encrypted container. When the vault is closed in Obsidian and the Cryptomator vault is locked, the mounted decrypted view disappears; the underlying encrypted files remain as unreadable “gibberish” until the vault is unlocked again.
To synchronize without cloud storage, the encrypted vault folder (the Cryptomator container) is what gets shared—not the decrypted contents. SyncThing is installed on each computer and configured to connect over the local network for easier setup. A shared folder is added in SyncThing by specifying a folder ID and the local path to the encrypted Cryptomator vault. Devices then exchange authorization: sharing is treated like a two-way approval process, so the user must approve incoming requests before synchronization begins.
Once the encrypted folder is synchronized, changes made on one computer propagate to the other. The receiving device’s Cryptomator unlocks the vault locally, and Obsidian can open the decrypted vault to show the updated notes. The same approach can also support a smaller “phone notes” vault: keep a separate, lighter Obsidian database on a phone, sync it with SyncThing, and view it on the desktop without carrying tens of gigabytes on mobile.
The result is a multi-device Obsidian workflow that preserves local file control, adds encryption at rest via Cryptomator, and avoids cloud providers by using SyncThing to replicate encrypted data between machines. It’s a practical path for anyone who wants portability across computers while keeping the vault’s contents private until they’re unlocked on the device being used.
Cornell Notes
Obsidian vaults are easiest to trust when they stay as local files, but that creates friction across multiple computers. The solution pairs Cryptomator with SyncThing: Cryptomator encrypts the vault and mounts a decrypted view only when unlocked, while SyncThing synchronizes the encrypted container between devices. Each computer then decrypts locally and Obsidian reads the decrypted vault normally. This avoids cloud storage by copying ciphertext peer-to-peer, and it can also power a separate smaller vault for phone notes that syncs to a desktop.
Why does “local files” become a problem for multi-device Obsidian users, and what’s the core fix?
How does Cryptomator change what’s actually stored on disk versus what Obsidian can read?
What exactly gets synchronized with SyncThing—decrypted notes or encrypted data?
How does SyncThing sharing work across devices in this workflow?
How can this setup handle a phone without forcing the main vault to live on mobile storage?
Review Questions
- In this workflow, what is the difference between the Cryptomator encrypted container and the mounted decrypted drive view, and which one should Obsidian write to?
- Why does synchronizing the encrypted folder (instead of the decrypted one) matter for privacy in a multi-device setup?
- What role do folder IDs and two-way approval play in SyncThing’s synchronization process?
Key Points
- 1
Cryptomator encrypts an Obsidian vault and provides a mounted decrypted view only after unlocking, so decrypted data stays local to the device being used.
- 2
SyncThing synchronizes the encrypted Cryptomator vault container between computers, avoiding cloud storage and keeping copied data unreadable without the local password.
- 3
Obsidian should create and edit the vault inside Cryptomator’s mounted decrypted drive view, not inside the raw encrypted container folder.
- 4
SyncThing setup relies on sharing a folder via a folder ID and local path, followed by two-way authorization before synchronization starts.
- 5
The encrypted vault should be locked in Cryptomator (and the vault closed in Obsidian) to remove the decrypted view and prevent accidental access.
- 6
A separate “phone notes” vault can be synced with SyncThing so mobile devices don’t need to store a large daily vault.
- 7
This approach supports a multi-device workflow where changes on one computer propagate to others, then appear in Obsidian after local decryption.