cryptsetup
session-android
cryptsetup | session-android | |
---|---|---|
55 | 174 | |
- | 1,658 | |
- | 1.8% | |
- | 9.5 | |
- | 8 days ago | |
Java | ||
- | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
cryptsetup
-
The Linux Process Journey — “dmcrypt_write”
Overall, “dm-crypt” is a device-mapper target (https://elixir.bootlin.com/linux/v6.5-rc3/source/drivers/md/dm-crypt.c#L3689) supported from kernel version 2.6.4 (https://elixir.bootlin.com/linux/v2.6.4/source/drivers/md/dm-crypt.c). It is responsible for transparent (aka real-time/on-the-fly encryption) block device encryption while using the kernel crypto API (https://gitlab.com/cryptsetup/cryptsetup/-/wikis/DMCrypt) .
-
Most secure and private (trace resistant) messaging app in market?
For more information check section 5.21 Why is there no "Nuke-Option"? of LUKS FAQ.
-
Is it possible to make my linux system automatically wipe everything if someone enters a wrong password twice
Please read the section 5.21 Why is there no "Nuke-Option"? of the LUKS FAQ for more information (eg. when a "wipe" option could actually harm you).
-
Federal Judge Makes History in Holding That Border Searches of Cell Phones Require a Warrant
Check out the section 5.2 and 5.18 of the LUKS FAQ for more information.
-
Custom Encryption
See section 5.2 of LUKS FAQ and Key disclosure law all over the world.
- Encryption of boot issue in the process: failed at update-grub
- Cannot create dm-integrity block device
- LuKs cryptsetup and sha256
-
Can I only partially clone a LUKS encrypted drive?
References: - Frequently Asked Questions Cryptsetup/LUKS - Question 2.15: "neither dm-crypt nor LUKS1 stores partition size and LUKS2 uses a generic "whole device" size as default." - Stackexchange: What does cryptsetup resize do if LUKS doesn't store partition size?
-
Is it possible to create a directory that is automatically encrypted at rest?
LUKS is probably what you want
session-android
- Signal: Keep your phone number private with Signal usernames
-
What are you shocked people are still doing nowadays?
Other alternatives include Session (free) and Threema (paid - 5€).
-
Tyranny Censorship? No problem, Self-custody your content distribution
Test it by downloading session at getsession.org and DM the bot by starting a new message and sending it to “Simple” (without quotes)
- Launching Default End-to-End Encryption on Messenger
- Which communication App is most secure / anonymous?
-
Official/Unofficial Monero Session Community Hangout?
Figured there should be moves to set one up if not - https://getsession.org/
- Session: Send Messages, Not Metadata
-
Signal: The Pqxdh Key Agreement Protocol
* marketing "Perfect Forward Secrecy" AKA "Forward Secrecy"[0].
I favor Session Private Messenger[1] because it is decentralized and allows third party clients, but Signal enthusiasts warn me that the Session client may, hypothetically, at some future date, integrate a cryptocurrency, as the Signal client already does[2].
[0] https://en.wikipedia.org/wiki/Forward_secrecy
[1] https://getsession.org
[2] https://www.stephendiehl.com/blog/signal.html
-
U.K. Abandons, for Now, Legislation That Would Have Banned End-to-End Encryption
If you have a mobile phone number, the domestic intelligence agency knows exactly where you are at all times and any LEO (without a warrant) can also find you. In addition, there have been numerous CCC presentations showing how insecure the global (excluding US) and (separately) US carriers are guilty of promiscuous metadata trafficking ($$) and insecure SS7 setups. As a consequence, for low $, you can go to any one of several shady websites and find the last location of almost any phone number (person unique ID) globally. There are additional varying exploitable vulnerabilities depending on the exact combination of {handset x carrier x country} to impersonate them, tap their line, reveal their exact location, and redirect their phone number through a third-party handset or even a PBX. These are more expensive and some capabilities are forbidden for all but a few selective intelligence uses.
Session (Signal fork) doesn't use phone numbers. It's pretty well-designed overall and uses an onion routing approach. It's already a superset of Signal except it doesn't use phone numbers. https://getsession.org
Also look interesting:
* (unproven) https://www.olvid.io/technology
* (unproven) https://simplex.chat
PS: Using regular TOR on home broadband or cloud servers is relatively risky and inefficient. Sybil attacks on it are common. And to network operators and security agencies it gives an easy "flow tag" of your uplink and exit node data traffic as automatically suspicious.
- E2EE messenger for who want absolute privacy and freedom from any surveillance
What are some alternatives?
sedutil - DTA sedutil Self encrypting drive software
simplex-chat - SimpleX - the first messaging network operating without user identifiers of any kind - 100% private by design! iOS, Android and desktop apps 📱!
LUKS2-docs
berty - Berty is a secure peer-to-peer messaging app that works with or without internet access, cellular data or trust in the network
luks.go - Pure Golang library to manage LUKS partitions
session-open-group-server
go-cryptsetup - Go bindings for libcryptsetup.
loki-network - Lokinet is an anonymous, decentralized and IP based overlay network for the internet.
edgewalker - A DIY VPN setup script based on OpenBSD, OpenIKEd, Wireguard and Let's Encrypt
lokinet-gui - GUI Control panel for Lokinet built using electron
sbctl - :computer: :lock: :key: Secure Boot key manager
µWebSockets - Simple, secure & standards compliant web server for the most demanding of applications