openpgpjs
ProtonMail Web Client
openpgpjs | ProtonMail Web Client | |
---|---|---|
33 | 181 | |
5,591 | 4,146 | |
0.6% | 2.1% | |
6.7 | 10.0 | |
6 days ago | about 1 month ago | |
JavaScript | TypeScript | |
GNU Lesser General Public License v3.0 only | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
openpgpjs
-
Why isn't VeraCrypt being updated? Is it abandoned?
not a great example, in the FOSS side of things GnuPG is being constantly worked on as is openpgp.js
-
Client-side encryption for Gmail is now generally available
https://openpgpjs.org/
A number of Chrome (and I think also Firefox) extensions include their own local copy of OoenPGP.js for use with various webmail services, including GMail.
WKD (and HKP) depends upon HTTPS without cert pinning, FWIU: https://wiki.gnupg.org/WKD
How does an email client use WKD?
-
Help with BouncyCastle OpenPGP (Java)
I know this might not be the appropriate sub, but does anyone know if there are any good learning resources on this? I am struggling to implement an OpenPGP application using Java, and the documentation is no help. I have had great luck with https://openpgpjs.org/ (a very well documented resource), but I don't understand how to accomplish generating keys, storing them in armored files, and using the stored keys for signing and encryption with BouncyCastle. Any pointers would be greatly appreciated.
- Storing user data on a server without the server admin being able to read it
- Does Proton Drive compress files when you upload to the platform?
-
How to use nodejs libs in react native?
I used openpgpjs to do all the encryption and decryption. It works perfectly in the browser and nodejs, but not in react native :(
-
I'm Phil Zimmermann and I created PGP, the most widely used email encryption software in the world. Ask me anything!
What's your opinion of OpenPGPJs? Do you think JavaScript is just too insecure for it to be safe?
- How do a I code a super long "word" (pgp key) using html without spaces at the end of line? Better description of problem in post
- Self-hosted end-to-end encrypted email service?
-
A few questions for the dev…
a) We use an open source cryptographic library, OpenPGPjs, which is built by the good folks over at Protonmail, and the library itself is frequently audited. Here's one. And everything you see and use on Cryptee is built on top of this.
ProtonMail Web Client
-
Proton Mail Discloses User Data Leading to Arrest in Spain
> Is this password-derived key the "account key" which I see in the Proton Mail settings interface?
No, the account key is an OpenPGP key which is encrypted with a key derived from your password. The "key encryption key" is not separately visible. The address keys are in turn encrypted using the account key.
> Please clarify what key derivation function is being used.
We use bcrypt, in addition to the OpenPGP S2K (i.e. the bcrypt output is fed as the "password" to OpenPGP's key encryption).
We are in the process of rolling out OpenPGP.js v6, which supports Argon2 for the OpenPGP S2K step, after which we'll start using that - but we aren't quite yet.
> Are there instructions for verifying that all this is happening? I think a lot of folks on HN won't be convinced otherwise.
Take a look at https://github.com/ProtonMail/WebClients/blob/main/packages/..., for example. Though to be honest, if you want to verify that we aren't sending the password to the server anywhere, in principle you'd have to check the code of the entire web app. It's all open source, but it's a lot of work, of course. But you can also check the latest audit report: https://proton.me/blog/security-audit. They also verified all of this stuff.
> It's just that I'm going to create an OpenPGP identity for things like signing code commits on git, signing packages I publish. (...) So I was really hoping to be able to use Proton Mail with this identity instead of the key pair that's generated for the account.
Yeah, I understand. Though, the typical advice from a cryptographer's perspective would be, it's better to use separate keys for separate purposes; and the simplest way to do that is to generate separate OpenPGP certificates, so that's what we'd generally recommend. But, if you want to generate separate subkeys and sign them all using a common primary key, that's also reasonable enough. And, we can improve the documentation on that, although it's a bit of a niche use case (not for HN of course, but for the general audience it is).
> Thanks for reaching out here on HN. I've been a really happy Proton Mail customer and now I'm even happier.
Thanks, glad to hear! :)
- Has anyone tried to run the Proton Mail UI locally?
-
ProtonDrive encryption key
The source code is here https://github.com/ProtonMail/WebClients
-
Proton Pass – Protecting your passwords and online identity
> Finally, in keeping with our long track record of transparency, Proton Pass is open source so anyone can review and verify our security architecture
They sure do enjoy writing that sentence without including any hyperlinks. This (https://github.com/ProtonMail/WebClients/tree/main/applicati...) appears to be the browser extension and https://github.com/ProtonMail/WebClients/tree/main/packages/... appears to look like the backend referenced in the extension's readme, but that directory's readme is zero bytes so (shrug)
- Where is the source code for Proton Drive?
-
Basic HTML Mode?
Fork the frontend and make your own lightweight option
- Where can I find the source code of the web app?
-
Announcement: SMTP Server in Rust with DMARC, DANE, MTA-STS, Sieve, OTEL support
PS: I hope that we selfhosters will have a modern, efficient, easy to use mail suite one day with modern features like JMAP, good self-learning spam integration, automated checks and validations for SPF/DMARC/DKIM or whether the IP/host suddenly appears in a blocklist and integrated encryption at rest for emails. Something that isn't 30 services in a container image, with 30 different configuration styles. Maybe even with an API integrated that's compatible to the ProtonMail frontend (like the neutron server once intended to be). Anyway, I'm sorry for dreaming. ;)
-
Why is the "Special offer" button still there after I purchased 1 year of Mail Plus through that very button?? Not happy.
And if you want to customize it further you can use Stylus to add custom CSS, Tampermonkey to add JS, or even modify the whole thing yourself from source (if you run it locally it syncs with your actual account).
- Is Proton Drive better than Sync.com?
What are some alternatives?
libsignal - Home to the Signal Protocol as well as other cryptographic primitives which make Signal possible.
SimpleLogin - The SimpleLogin back-end and web app
end-to-end - End-To-End is a crypto library to encrypt, decrypt, digital sign, and verify signed messages (implementing OpenPGP)
Roundcube - The Roundcube Webmail suite
Coze - Coze is a cryptographic JSON messaging specification.
RainLoop - Simple, modern & fast web-based email client
WebClient - Monorepo hosting the proton web clients [Moved to: https://github.com/ProtonMail/WebClients]
Tutanota makes encryption easy - Tuta is an email service with a strong focus on security and privacy that lets you encrypt emails, contacts and calendar entries on all your devices.
PGP-Anywhere - Chrome browser extension to de- & encrypt PGP in your browser
Mailpile - A free & open modern, fast email client with user-friendly encryption and privacy features
neutron - Self-hosted server for the ProtonMail client
proton-mail - React web application to manage ProtonMail