etsd
node-argon2
Our great sponsors
etsd | node-argon2 | |
---|---|---|
4 | 11 | |
48 | 1,783 | |
- | - | |
3.6 | 7.5 | |
8 months ago | 6 days ago | |
JavaScript | JavaScript | |
GNU Affero General Public License v3.0 | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
etsd
-
How I run my servers
A pretty same setup with a bunch of differences:
1. I'm using a single postgresql database for all apps (each with a different user) on a different server; each app has a different db user
2. I use a minio instance for file/media uploads/serving
3. I mostly use nginx but i'm transitioning new apps to caddy because of automatic integration with let's encrypt and much smaller config for common purposes
4. I use a fab-classic (fabric 1x) script to deploy new versions: https://github.com/spapas/etsd/blob/master/fabfile.py
5. For backup I do a logical db backup once per day via cron (using a script similar to this https://spapas.github.io/2016/11/02/postgresql-backup/)
6. One memcache instance of all apps
7. Each app gets a redis instance (if redis is needed): https://gist.github.com/akhdaniel/04e4bb2df76ef534b0cb982c1d...
8. Use systemd for app control
-
Show HN: Enc – A modern and friendly CLI alternative to GnuPG
For anybody that still believes in gpg and is interested in using it to transmit data across his organisation we've built https://github.com/spapas/etsd.
This is a project that holds the hands of the users of an organisation to help them send gpg encrypted messages. We're using it successfully for almost a year.
Yes, you are right on that. If the server is compromised a malicious user may change the client-side code to add a backdoor and steal your private key when you unlock it. He'll be able to steal only the keys that are unlocked while the backdoor stays undetected (not all the data).
The ideal way to resolve that would be to change the service to an API and offer binaries with a correct signature so the user can check and make sure that they get the correct thing. Actually I tried writing the client binaries using electron (https://github.com/spapas/etsd/tree/master/client) but didn't have the time for that :(
You are rigth though, I've added a Risks section to warn for that thingie https://github.com/spapas/etsd/blob/master/README.md#risks
node-argon2
-
A Step-by-Step Guide to Implement JWT Authentication in NestJS using Passport
❓ Why is hashing and salting passwords mandatory? A salt is simply a random data used as an additional input to the hashing function to safeguard your password. The random string from the salt makes the hash unpredictable. A password hash involves converting the password into an alphanumeric string using specialized algorithms. Hashing and salting are irreversible and ensure that even if someone gains access to the hashed passwords, they will not be able to decrypt them to recover the original passwords. Hystorically bcrypt is recognized as the best hashing algorithm. However, in terms of robustness against all the new cryptographic attacks targeting hashing algorithms, the current clear winner is argon2. However, since the “youth" (2015) of this algorithm, I chose to use bcrypt
-
Best Node hashing algorithm option?
Argon2: this is the newest highly recommended algorithm, and recommended by OWASP. (Edit: originally linked to a low-download library.)
- Authentication with Next.js - The do's and don'ts, and why next-auth is your friend [ part 1 of 2 ]
-
How to sign out user after a period of time
Though I am using bcrypt to hash passwords, recommended approach currently is argon2
- "They [Google] don't [hash passwords on client side, and nobody does" "This is why it's so easy to hack into their servers. All of the IT people working for those companies have no clue what security truly is"
-
How to implement Authentication with GraphQL and Redis
We make sure to hash the password using argon2 before storing it🔐
What are some alternatives?
crypto-hash - Tiny hashing module that uses the native crypto API in Node.js and the browser
CyberChef - The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
next-auth - Authentication for the Web.
Passport - Simple, unobtrusive authentication for Node.js.
SofleKeyboard - A split keyboard based on Lily58, Crkbd and Helix keyboards
linux - Linux kernel source tree
Keycloak - Open Source Identity and Access Management For Modern Applications and Services
frank_jwt - JSON Web Token implementation in Rust.
startergraphqlserver
kruptein - crypto; from kruptein to hide or conceal
enc - 🔑🔒 A modern and friendly CLI alternative to GnuPG: generate and download keys, encrypt, decrypt, and sign text and files, and more.
docker-rollout - 🚀 Zero Downtime Deployment for Docker Compose