bloom-legacy VS backbone-python

Compare bloom-legacy vs backbone-python and see what are their differences.

bloom-legacy

DEPRECATED - End-to-end encrypted Notes, Files, Calendar, Contacts... for Android, IOS, Linux & MacOS (by skerkour)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
bloom-legacy backbone-python
2 3
115 5
0.0% -
10.0 2.0
over 1 year ago about 1 year ago
Rust Python
GNU General Public License v3.0 or later GNU General Public License v3.0 or later
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

bloom-legacy

Posts with mentions or reviews of bloom-legacy. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-12-22.

backbone-python

Posts with mentions or reviews of backbone-python. We have used some of these posts to build our list of alternatives and similar projects.
  • Encrypt. Now
    1 project | news.ycombinator.com | 17 Oct 2023
    It's only impractical if you actually require end users to understand and apply all of these technologies. It's a lot more tractable if they're abstracted away.

    The fact is that developers very (very) rarely have to interface directly with TLS or the Signal protocol, yet billions of non-technical users implicitly use them in our browsers and via Signal or WhatsApp.

    In my view, the challenge in the adoption of secure/private-by-design tech is the simplicity and usability of the interfaces and the capabilities these tools provide.

    We need secure tools to compete on capability in order to garner mass usage. Without (significant) feature superiority there's little reason for users to make the switch. I'm actively trying to solve some of these problems at Backbone [0]; aiming to build a usable, secure experience for end users and a simple, robust end-to-end-encryption interface for developers.

    [0] https://backbone.dev/

  • Launch HN: Idemeum (YC S21) – Passwordless access to apps and infrastructure
    1 project | news.ycombinator.com | 26 Oct 2022
    > Data in our cloud is end to end encrypted so your credentials are never exposed to anyone but you.

    A few comments:

    1. You might want to avoid calling this zero-knowledge. While your docs suggest some use of E2EE, there seems to be a significant amount of metadata that remains both unencrypted and unauthenticated.

    2. Having read your white paper, it appears your E2EE setup is vulnerable to various forms of forgery. In a simple case, an attacker that has compromised your infrastructure can easily substitute the credentials of arbitrary users in a way that is NOT tamper-evident.

    3. There seems to be no post-compromise security. If your user private key is compromised (e.g. extracted from the extension's local storage), there seems to be no way to reset it.

    4. The recovery flow is questionable. Do you really want to store critical cryptographic material in plaintext and in a third-party cloud?

    When rolling out E2EE from scratch, it's very easy to give rise to issues like #2. At Backbone[1], we've built a framework for building end-to-end encrypted applications with building blocks designed to preserve confidentiality, integrity and nonrepudiatiability under a strict threat model.

    Feel free to reach out if you might like to discuss how we're solving issues the above.

    [1] https://backbone.dev/

  • Backbone: End-to-end-encryption as a service
    1 project | /r/cypherpunk | 12 Oct 2022
    Backbone is designed to reduce the need to trust third parties — it operates under a strict threat model, providing confidentiality, integrity and nonrepudiatiability even under the assumption that Backbone itself is pwned. We’re dedicated to operating transparently, leading us to build our open-source client on top of libsodium.

What are some alternatives?

When comparing bloom-legacy and backbone-python you can also consider the following projects:

mnotify - A matrix cli client

scrambpy - Scramb.py is a region based JPEG Image Scrambler and Descrambler written in Python for End-to-End-Encrypted (E2EE) Image distribution through unaware channels.

cli - the package manager for JavaScript

ziti-sdk-py - Ziti SDK for Python

bloom-legacy-e2ee - End-to-end encrypted Notes, Files, Calendar, Contacts... for Android, IOS, Linux & MacOS

krypton - Data encryption at rest and IAM for Python

axum - Ergonomic and modular web framework built with Tokio, Tower, and Hyper

photos-app - ➡️ Moved to https://github.com/ente-io/ente

poem - A full-featured and easy-to-use web framework with the Rust programming language.

Ockam - Orchestrate end-to-end encryption, cryptographic identities, mutual authentication, and authorization policies between distributed applications – at massive scale.

sea-orm - 🐚 An async & dynamic ORM for Rust