Ed25519Tool
bogbook
Ed25519Tool | bogbook | |
---|---|---|
5 | 1 | |
20 | 9 | |
- | - | |
5.6 | 6.7 | |
8 months ago | 7 months ago | |
JavaScript | JavaScript | |
BSD 3-clause "New" or "Revised" License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Ed25519Tool
-
Show HN: Non.io, a Reddit-like platform Ive been working on for the last 4 years
I'm concerned about the `#` character in the URL.
# means fragment and that's kept local and not sent to the server unless client side Javascript sends it to the server. I would use an identifier that doesn't already mean something to the URL.
See https://github.com/Cyphrme/URLFormJS#query-parameters-fragme... (Also see https://github.com/Cyphrme/Path)
For an example where this is relevant: https://cyphr.me/ed25519_tool/ed.html#?msg_encoding=Text&msg...
And see https://www.rfc-editor.org/rfc/rfc3986#section-3.5
-
r/Crypto, can you help take down an evil tool that's stealing people's private keys?
For browsers this problem is partially solved as subresources may be integrity checked. Further, there have been proposals like DOMTegrity, that provides a complete solution. For now, yes, full integrity checking isn't done automatically in browser, but it may be done automatically using git or manually as is normally done for any software downloaded not using a package manager or git.
-
Daily General Discussion - September 30, 2022
The only reason the evil tool is now the second result is because this backdoor angered me so much I created the (now) #1 tool, that runs in browser, never sends off keys, and is fully open source. Feel free to click on that one all you want and star it on Github. Just practicing, "cypherpunks write code". š
-
Ed25519 Online Tool - Sign, Verify, and Generate Ed25519 Keys.
git clone https://github.com/Cyphrme/ed25519_applet.git
bogbook
-
Donāt record your social life on an append-only social network
> One adjustment to the protocol that seems to me like a quick win (but presumably has some technical hitch I can't see, since I don't recall anyone suggesting this) would be to not include the post's body in the āblockā (in the message itself that gets hashed and signed by the next message), but rather as a āblobā (essentially an attachment) which others don't need to download in order to verify the feed.
There's nothing to prevent you from taking this route, you just sign a blob hash instead of an entire message object.
I work on an experimental SSB-like-protocol in my spare time that does exactly what you've suggested: https://github.com/evbogue/bogbook
I don't know if this makes the network forget more, but the aim is to reduce the time it takes to sync and get started.
What are some alternatives?
tweetnacl-js - Port of TweetNaCl cryptographic library to JavaScript
constant-time - Constant-time WebAssembly
gun - An open source cybersecurity protocol for syncing decentralized graph data.
chains - provides metadata for chains
JavaScript - Algorithms and Data Structures implemented in JavaScript for beginners, following best practices.
node-rsa - Node.js RSA library
end-to-end - End-To-End is a crypto library to encrypt, decrypt, digital sign, and verify signed messages (implementing OpenPGP)
Path - A more robust URI naming scheme
noble-ed25519 - Fastest 4KB JS implementation of ed25519 signatures
nonio
Fontify - A browser extension to add font support to social network posts.