bloom-legacy
backbone-python
bloom-legacy | backbone-python | |
---|---|---|
2 | 3 | |
115 | 5 | |
0.0% | - | |
10.0 | 2.0 | |
over 1 year ago | about 1 year ago | |
Rust | Python | |
GNU General Public License v3.0 or later | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
bloom-legacy
- skerkour/bloom-legacy: End-to-end encrypted Notes, Files, Calendar, Contacts... for Android, IOS, Linux & MacOS - DEPRECATED
-
I switch from Golang and want to build a REST API in Rust.
Aside from library. Bloom was written in Go then ported to Rust. Maybe you can get some inspirations!
backbone-python
-
Encrypt. Now
It's only impractical if you actually require end users to understand and apply all of these technologies. It's a lot more tractable if they're abstracted away.
The fact is that developers very (very) rarely have to interface directly with TLS or the Signal protocol, yet billions of non-technical users implicitly use them in our browsers and via Signal or WhatsApp.
In my view, the challenge in the adoption of secure/private-by-design tech is the simplicity and usability of the interfaces and the capabilities these tools provide.
We need secure tools to compete on capability in order to garner mass usage. Without (significant) feature superiority there's little reason for users to make the switch. I'm actively trying to solve some of these problems at Backbone [0]; aiming to build a usable, secure experience for end users and a simple, robust end-to-end-encryption interface for developers.
[0] https://backbone.dev/
-
Launch HN: Idemeum (YC S21) – Passwordless access to apps and infrastructure
> Data in our cloud is end to end encrypted so your credentials are never exposed to anyone but you.
A few comments:
1. You might want to avoid calling this zero-knowledge. While your docs suggest some use of E2EE, there seems to be a significant amount of metadata that remains both unencrypted and unauthenticated.
2. Having read your white paper, it appears your E2EE setup is vulnerable to various forms of forgery. In a simple case, an attacker that has compromised your infrastructure can easily substitute the credentials of arbitrary users in a way that is NOT tamper-evident.
3. There seems to be no post-compromise security. If your user private key is compromised (e.g. extracted from the extension's local storage), there seems to be no way to reset it.
4. The recovery flow is questionable. Do you really want to store critical cryptographic material in plaintext and in a third-party cloud?
When rolling out E2EE from scratch, it's very easy to give rise to issues like #2. At Backbone[1], we've built a framework for building end-to-end encrypted applications with building blocks designed to preserve confidentiality, integrity and nonrepudiatiability under a strict threat model.
Feel free to reach out if you might like to discuss how we're solving issues the above.
[1] https://backbone.dev/
-
Backbone: End-to-end-encryption as a service
Backbone is designed to reduce the need to trust third parties — it operates under a strict threat model, providing confidentiality, integrity and nonrepudiatiability even under the assumption that Backbone itself is pwned. We’re dedicated to operating transparently, leading us to build our open-source client on top of libsodium.
What are some alternatives?
mnotify - A matrix cli client
scrambpy - Scramb.py is a region based JPEG Image Scrambler and Descrambler written in Python for End-to-End-Encrypted (E2EE) Image distribution through unaware channels.
cli - the package manager for JavaScript
ziti-sdk-py - Ziti SDK for Python
bloom-legacy-e2ee - End-to-end encrypted Notes, Files, Calendar, Contacts... for Android, IOS, Linux & MacOS
krypton - Data encryption at rest and IAM for Python
axum - Ergonomic and modular web framework built with Tokio, Tower, and Hyper
photos-app - ➡️ Moved to https://github.com/ente-io/ente
poem - A full-featured and easy-to-use web framework with the Rust programming language.
Ockam - Orchestrate end-to-end encryption, cryptographic identities, mutual authentication, and authorization policies between distributed applications – at massive scale.
sea-orm - 🐚 An async & dynamic ORM for Rust