browserpass-extension
kvass
browserpass-extension | kvass | |
---|---|---|
6 | 8 | |
820 | 881 | |
1.5% | - | |
5.3 | 0.0 | |
30 days ago | 6 months ago | |
JavaScript | Go | |
ISC License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
browserpass-extension
-
Browserpass keyboard navigation
I've been trying this browser out, and it's awesome. One of the extensions I use is BrowserPass, which allows me to use pass passwords in the browser.
-
KeePassXC Audit Report
Browserpass works pretty well.
https://github.com/browserpass/browserpass-extension
-
cachy-browser-firefox-shim and browserpass-cachy-browser added to the AUR
Installs the browserpass extension and native messaging host for Cachy Browser.
- Show HN: Kvass, a personal key-value store
- zx2c4 pass - how to handle colon in the url
kvass
- Show HN: Kvass,一个个人键值存储器 (Show HN: Kvass, a personal key-value store)
- GitHub - maxmunzel/kvass: a personal key-value store
-
Show HN: Kvass, a personal key-value store
Hi mbreeze!
> this seems to just be a SQLite database with values in fields?
Sqlite is used as a storage format ("SQLite competes with fopen()"). The key-value pairs are stored as a modified Append-Only CRDT. The LUB-Operation (to merge to states while syncing) is implemented here: https://github.com/maxmunzel/kvass/blob/e32fdabdc86b039f716c...
> anyone with access to the file would be able to see all data stored?
Yes, attackers with access to your fs are not part of my attacker model. I rely on disk encryption for that matter.
> Do the clients cache data locally? It looks like you're basically syncing from the server for every request. You're already making a round trip to the server for a request anyway, so why not keep state only on the server? I can understand an offline-only mode, but this would require a significantly more robust sync mechanism. If this was the goal, I'd love to see this discussed more in the README too.
The sync mechanism is actually pretty solid, as its based on CRDTs. One of the applications of kvass is central management of config files, so automatic syncing and offline fallback are important.
> What is the purpose of the ProcessID?
The Counter Variable implements a rudimentary implementation of Lamport clocks. To get a total order from Lamport clocks, you need ordered, distinct process ids. The process id's don't really need to mean anything and the Lamport clock is itself just a fallback for the case that the wall-clock timestamps collide (see the Max() function), so it's practical to just draw them randomly.
> I didn't see any authn/authz in the requests. You're also unmarshalling random data from the request w/o confirming that it is valid first. This seems risky to me and could potentially crash the server if I were to send it random data.
Authentication is provided by the GCM mode of AES. As I decrypt (and thereby verify) early, I can assume to work on trustworthy payloads. GCM is also non-malleable unlike for example CBC or CTR.
As suggested by losfair, I'll switch to PSK TLS as soon as it's available or just put HTTPS in front of the end-points. But that's not high-priority right now.
-
Hacker News top posts: Jul 24, 2022
Show HN: Kvass, a personal key-value store\ (51 comments)
What are some alternatives?
passff - zx2c4 pass manager extension for Firefox, Chrome and Opera
OfficerBreaker - OOXML password remover
pass-import - A pass extension for importing data from most existing password managers
Prima
go - The Go programming language
llvm-m88k - LLVM backend for m88k architecture
CachyOS-Browser-Common
badger - Fast key-value DB in Go.
csync