DOMtegrity
Ed25519Tool
Our great sponsors
DOMtegrity | Ed25519Tool | |
---|---|---|
3 | 5 | |
9 | 20 | |
- | - | |
10.0 | 5.6 | |
about 6 years ago | 8 months ago | |
JavaScript | JavaScript | |
- | BSD 3-clause "New" or "Revised" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
DOMtegrity
- LastPass owner GoTo has been hacked
-
DOMtegrity: Integrity checking for the web browser - A proposal by Newcastle University
Source code is provided here: https://github.com/toreini/DOMtegrity
-
r/Crypto, can you help take down an evil tool that's stealing people's private keys?
For browsers this problem is partially solved as subresources may be integrity checked. Further, there have been proposals like DOMTegrity, that provides a complete solution. For now, yes, full integrity checking isn't done automatically in browser, but it may be done automatically using git or manually as is normally done for any software downloaded not using a package manager or git.
Ed25519Tool
-
Show HN: Non.io, a Reddit-like platform Ive been working on for the last 4 years
I'm concerned about the `#` character in the URL.
# means fragment and that's kept local and not sent to the server unless client side Javascript sends it to the server. I would use an identifier that doesn't already mean something to the URL.
See https://github.com/Cyphrme/URLFormJS#query-parameters-fragme... (Also see https://github.com/Cyphrme/Path)
For an example where this is relevant: https://cyphr.me/ed25519_tool/ed.html#?msg_encoding=Text&msg...
And see https://www.rfc-editor.org/rfc/rfc3986#section-3.5
-
r/Crypto, can you help take down an evil tool that's stealing people's private keys?
For browsers this problem is partially solved as subresources may be integrity checked. Further, there have been proposals like DOMTegrity, that provides a complete solution. For now, yes, full integrity checking isn't done automatically in browser, but it may be done automatically using git or manually as is normally done for any software downloaded not using a package manager or git.
-
Daily General Discussion - September 30, 2022
The only reason the evil tool is now the second result is because this backdoor angered me so much I created the (now) #1 tool, that runs in browser, never sends off keys, and is fully open source. Feel free to click on that one all you want and star it on Github. Just practicing, "cypherpunks write code". 😉
-
Ed25519 Online Tool - Sign, Verify, and Generate Ed25519 Keys.
git clone https://github.com/Cyphrme/ed25519_applet.git
What are some alternatives?
pwsafe - PasswordSafe - popular secure and convenient password manager
tweetnacl-js - Port of TweetNaCl cryptographic library to JavaScript
Android-Password-Store - Android application compatible with ZX2C4's Pass command line application
constant-time - Constant-time WebAssembly
noble-ed25519 - Fastest 4KB JS implementation of ed25519 signatures
chains - provides metadata for chains
pass-import - A pass extension for importing data from most existing password managers
node-rsa - Node.js RSA library
PythonPassKeep - PassKeep Clone written in Python. AES Encrypted SQLite tkinter UI
Path - A more robust URI naming scheme
nonio
noble-secp256k1 - Fastest 4KB JS implementation of secp256k1 signatures and ECDH