naiveproxy
TextSecure
naiveproxy | TextSecure | |
---|---|---|
12 | 985 | |
6,235 | 24,890 | |
- | 0.3% | |
6.0 | 9.9 | |
7 days ago | 8 days ago | |
C++ | Java | |
BSD 3-clause "New" or "Revised" License | GNU Affero General Public License v3.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
naiveproxy
- Naiveproxy – Make a Fortune Quietly
-
500 Lines or Less – Writing a useful program in fewer than 500 line code – AOSA
What language is "Electron" written in and how many lines of it are used. Even more, what languages are Chromium brower engine and Node.js written in and how many lines of it are used.
When we make assumptions, e.g., no need to initialise hardware, no need for bootcode, no need for bootloader, no need for drivers, no need for kernel, no need for operating system, and so on, then, IMHO, the comparisons do not make as much sense.
Perhaps it is not "how you use them" but "what they can actually do". To me, getting a computer to boot is still an essential task. Building things "from the ground up" is still, to me, the path with fewer limitations and boundaries. As I understand it, building things from the ground up is how the creator of UNIX preferred to work.
To be honest, IMO, it's really about "what you are trying to do". And the assumption in comments like these is that one is trying to do the exact same thing in (less than or equal to 500 lines of) language X, Y or Z. But what if one wants to do somehting different that no one has done before.
When I was a kid, I faintly remember Lego sets that sometimes had pre-constructed "add-ons" with moving parts. These attachments might have even been motorised. Although such attachments might have had a Lego logo with a trademark symbol on them, making them appear to be part of a set, they did not really belong with the plastic building blocks. They were obviously not meant to be pulled apart and rebuilt.
The pre-compiled "browser", a single large binary that does "everything its user could ever want to do" as determined by someone else, not the user, controlled and distributed by an advertising services company, is it a building block or one of those motorised add-ons. How many "developers" pull the browser apart and rebuild it.^1 It seems the advertising company is expecting most will not do that.
1. One exception, which uses only the networking code, is https://github.com/klzgrad/naiveproxy/
The "modern browser" is what could be many programs. Instead, these are all rolled into one.
- Naive Proxy
-
Obfuscate Wireguard (with V2Ray)
Your best bet would be naiveproxy. WG does not design with obfuscation in mind. Or you could use shadowsocks with v2ray instead.
- 懂哥指导下自建梯子教程
- 大家有没有觉得翻墙更困难了?
- Question about setting VPS to use it as VPN
- Shadowsocks 10 周年
-
Bypass school restrictions
If it still fails, try Outline VPN which Shadowsocks protocol made some attempt to evade detection. If you're only using browsers, https://github.com/klzgrad/naiveproxy can masquerade common traffic assuming your school doesn't use whitelist.
- Next Step to Circumvent DPI
TextSecure
-
The xz sshd backdoor rabbithole goes quite a bit deeper
Moxie's reasons for disallowing Signal distribution via F-droid always rang a little flat to me ( https://github.com/signalapp/Signal-Android/issues/127 ). Lots of chatter about the supposedly superior security model of Google Play Store, and as a result fewer eyes independently building and testing the Signal code base. Everyone is entitled to their opinions, but independent and reproducible builds seem like a net positive for everyone. Always struggled to understand releasing code as open source without taking advantage of the community's willingness to build and test. Looking at it in a new light after the XZ backdoor, and Jia Tan's interactions with other FOSS folk.
- WhatsApp forces Pegasus spyware maker to share its secret code
-
Signal: Keep your phone number private with Signal usernames
Signal has documentation on how to reproduce their Play Store builds and compare them with what you've installed locally:
https://github.com/signalapp/Signal-Android/blob/main/reprod...
-
Signal v7.0.0 with phone number privacy
There's nothing on Signal blog as of yet, but Signal's git repository was tagged with v7.0.0 yesterday and we can see from the commit history since the previously tagged version (v6.74.4) that there will be a setting to hide one's phone number [1], as well as disabling the previous default behavior of advertising that one is on Signal to all their contacts already using it [2].
[1] https://github.com/signalapp/Signal-Android/commit/8797236b5... (PNP stands for "Phone Number Privacy")
[2] https://github.com/signalapp/Signal-Android/commit/6097e6c30...
-
What are you shocked people are still doing nowadays?
Signal works the same but without the user tracking from Meta/Facebook. Many people use it as well but I'm surprised that a majority sticks to WhatsApp.
-
Apple has seemingly found a way to block Android’s new iMessage app
Telegram and Signal solve this.
-
Apple Just Confirmed Governments Are Spying on People’s Phones With Push Notifications
Sadly yes: Looks like an open issue 13290 for Signal, sounds like they were/are indeed still interacting through google's push notification service, wat, and per a link at that issue it was a chore for Tutanota to break away once they realised it was a problem some years ago (though at least they thought about it years ago? wtf Signal...)
-
Building end-to-end security for Messenger – Engineering at Meta
Here is one: https://github.com/signalapp/Signal-Android/tree/main/reprod...
- Are Signal Notifications Encrypted ?
-
Facebook & Messenger finally get end-to-end encryption
Rule 1: Posts to r/signal must relate to Signal.
What are some alternatives?
forwardproxy - Forward proxy plugin for the Caddy web server
undiscord - Undiscord - Delete all messages in a Discord server / channel or DM (Easy and fast) Bulk delete
Signal-TLS-Proxy
trojan - An unidentifiable mechanism that helps you bypass GFW.
duckduckgo-locales - Translation files for <a href="https://duckduckgo.com"> </a>
oxen-mobile-wallet - A Mobile Wallet for Oxen
session-desktop - Session Desktop - Onion routing based messenger
forwardproxy - Forward proxy plugin for the Caddy web server
MaterialAudiobookPlayer - Minimalistic audiobook player
v2ray-core - A platform for building proxies to bypass network restrictions.
Signal-Android - Patches to Signal for Android removing dependencies on closed-source Google Mobile Services and Firebase libraries. In branches whose names include "-FOSS". Uses new "foss" or "gms" flavor dimension: build with "./gradlew assemblePlayFossProdRelease".