phc-winner-argon2 VS uBlock

Compare phc-winner-argon2 vs uBlock and see what are their differences.

phc-winner-argon2

The password hash Argon2, winner of PHC (by P-H-C)

uBlock

uBlock Origin - An efficient blocker for Chromium and Firefox. Fast and lean. (by gorhill)
Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
phc-winner-argon2 uBlock
14 2,992
4,650 43,007
1.1% -
0.0 9.9
about 2 months ago 6 days ago
C JavaScript
GNU General Public License v3.0 or later GNU General Public License v3.0 only
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

phc-winner-argon2

Posts with mentions or reviews of phc-winner-argon2. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-01-10.
  • Argon2 Password Hashing Utility
    1 project | news.ycombinator.com | 11 Apr 2024
  • User tool to use Argon2 ideally Argon2id
    1 project | /r/privacy | 13 May 2023
  • PSA: upgrade your LUKS key derivation function
    1 project | /r/linux_programming | 18 Apr 2023
    Argon2, and it's derivations, are all memory hard. Beyond that, why change from 2i to 2id?
  • Why Argon2d and not Argon2id?
    1 project | /r/Dashlane | 3 Feb 2023
    ''Even though https://github.com/p-h-c/phc-winner-argon2 was standardized only somewhat recently, it is the result of the https://password-hashing.net/ and was a late re-design of Argon which also picked up ideas from a few other finalists. Since then there have been attacks on it, which caused the scheme to be tweaked to counter them better, this is why we have Argon2 v1.3 as the most current version, you may want to note that most of these attacks mostly weakened Argon2i and not Argon2d. Now during the competition results came up that your defense against time-memory trade-off attacks will suffer if you make sure that your scheme is immune to the various kinds of side-channel attacks that people have come up with (which also includes more "crazy" stuff like leaked intermediate state). Because of this, it was decided that there should be two versions: Argon2i and Argon2d. One offering the best possible protection while trying its best to be immune against side-channel attacks (by using data- and password-independent memory access patterns) and the other dropping these requirements and all-out optimizing against such attacks (by using data- and possibly password-dependent memory access patterns). Argon2d offers better protection than Argon2i at the expense of being more vulnerable to side-channel attacks. Now you have to ask yourself: Do these apply? No, not really. You said that you are on Android, which is not exactly known for high platform security, so if you have an attacker in such a privileged position to execute something like cache-timing attacks or similar attacks that try to exploit memory access patterns, your user has already much bigger problems anyways. It's a similar logic as with AES: https://en.wikipedia.org/wiki/Advanced\_Encryption\_Standard#Side-channel\_attacks, but these have never been observed in the wild, probably because other options are much easier, more reliable and equally as effective. So the conclusion is: You want to use Argon2d. So for whom is Argon2i? People who need to run applications on shared hardware or where timing attacks are a real thread. For example if you run a webserver in a public cloud on shared hardware. Then you have to be worried about who else is on the same CPU. And with webservers it's also easier to measure the timing of reactions and trying to deduce information from that."
  • The forgotten mistake that killed Japan’s software industry
    2 projects | /r/programming | 10 Jan 2023
    And if you don't like my code you should take a look at the reference implementation.
  • Can't find documentation for C library, openssl for hashing.
    1 project | /r/programminghelp | 26 Oct 2022
    AFAIK, Argon2 is the algorithm that's currently recommended for this. OpenSSL doesn't have support for it, so I'd recommend using the Argon2 reference implementation instead.
  • Which argon2 crate to use?
    2 projects | /r/rust | 20 Sep 2022
    Which one should I use in terms of performance/standards? How about their performances comparing to the c implementation, https://github.com/P-H-C/phc-winner-argon2?
  • Is anyone aware of an argon2/argon2id javascript implementation that will work in both NodeJS and the beowser and produce the same hashes?
    1 project | /r/cryptography | 25 Aug 2022
    Did you try the Argon2 test vectors on each? They should all come out the same for both implementations, any implementation that doesn't match the test vectors is buggy.
  • Intel and AMD CPUs vulnerable to a new speculative execution attack (RETBLEED)
    5 projects | news.ycombinator.com | 12 Jul 2022
    > Is there anything stronger than blowfish?

    I think you mean bcrypt..

    Both Argon2 and scrypt win over that:

    https://github.com/P-H-C/phc-winner-argon2

  • The entirety of Twitch has reportedly been leaked (Source codes and user payouts among the data) | VGC
    1 project | /r/Games | 6 Oct 2021
    Here is the documentation for Argon2 to see why and how it's different, also why it won an award: https://github.com/P-H-C/phc-winner-argon2/blob/master/argon2-specs.pdf

uBlock

Posts with mentions or reviews of uBlock. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-04-16.
  • Apr 24th is JavaScript Naked Day – Browse the web without JavaScript
    1 project | news.ycombinator.com | 21 Apr 2024
  • Mobile Ad Blocker Will No Longer Stop YouTube's Ads
    13 projects | news.ycombinator.com | 16 Apr 2024
  • Some notes on Firefox's media autoplay settings in practice as of Firefox 124
    2 projects | news.ycombinator.com | 30 Mar 2024
    Check out uBlock Origin's per site switches [1]

    [1]: https://github.com/gorhill/uBlock/wiki/Per-site-switches#no-...

  • Brave's AI assistant now integrates with PDFs and Google Drive
    6 projects | news.ycombinator.com | 23 Feb 2024
    If ads, in particular on YouTube, are the problem, anything Chromium-based is probably only going to get worse and worse (see [1] and [2]). So that basically leaves you with Firefox and Safari.

    I work for Mozilla (speaking for myself, of course), so I'll leave you to guess which I'd recommend :P

    [1] https://github.com/gorhill/uBlock/wiki/uBlock-Origin-works-b...

    [2] https://arstechnica.com/gadgets/2023/09/googles-widely-oppos...

  • X.org Server Clears Out Remnants for Supporting Old Compilers
    2 projects | news.ycombinator.com | 21 Feb 2024
    https://github.com/gorhill/uBlock

    Or if on mobile, it is well worth it to look up adblock options for the browser you use.

  • Mozilla thinks Apple, Google, Microsoft should play fair
    2 projects | news.ycombinator.com | 27 Jan 2024
    What are the compelling advantages of Chrome nowadays?

    Chrome is working to limit the capabilities of ad blockers:

    https://www.malwarebytes.com/blog/news/2023/11/chrome-pushes...

    Whereas a compelling advantage of Firefox is that uBlock Origin works best in Firefox:

    https://github.com/gorhill/uBlock/wiki/uBlock-Origin-works-b...

    Advertising networks have often been vectors for malware. Using an ad blocker is an important security measure. Even the FBI recommends ad blockers:

    https://www.malwarebytes.com/malvertising

    https://theconversation.com/spyware-can-infect-your-phone-or...

    https://www.ic3.gov/Media/Y2022/PSA221221?=8324278624

  • Brave Leo now uses Mixtral 8x7B as default
    7 projects | news.ycombinator.com | 27 Jan 2024
    > It allows for 30,000 dynamic rules

    That is not what we mean by dynamic filters. From https://developer.chrome.com/blog/improvements-to-content-fi...

    > However, to support more frequent updates and user-defined rules, extensions can add rules dynamically too, without their developers having to upload a new version of the extension to the Chrome Web Store.

    What Chrome is talking about is the ability to specify rules at runtime. What critics of Manifest V3 are talking about is not the ability to dynamically add rules (although that can be an issue), it is the ability to add dynamic rules -- ie rules that analyze and rewrite requests in the style of the blockingWebRequest permission.

    It's a little deceptive to claim that the concerns here are outdated and to point to vague terminology that sounds like it's correcting the problem, but on actual inspection turns out to be entirely separate functionality from what the GP was talking about.

    > Giving this ability to extensions can slow down the browser for the user. These ads can still be blocked through other means.

    This is the debate; most of the adblocking community disagrees with this assertion. uBO maintains a list of some common features that are already not possible to support in Chrome ( https://github.com/gorhill/uBlock/wiki/uBlock-Origin-works-b... ) and has written about features that are not able to be supported via Chrome's current V3 API ( https://github.com/uBlockOrigin/uBOL-home/wiki/Frequently-as... ). Of particular note are filtering for large media elements (I use this a lot on mobile Firefox, it's great for reducing page size), and top-level filtering of domains/fonts.

  • uBlock Origin – 1.55.0
    1 project | news.ycombinator.com | 3 Jan 2024
  • In 2024, please switch to Firefox
    9 projects | news.ycombinator.com | 29 Dec 2023
    > "Its happened before"

    > That's not an argument

    It's a subheading to "2. Browser engine monopoly". The subsection's purpose is describing how bad things were during the IE monopoly to reinforce that it's something to be avoided.

    > in fact you could counter-argue that IE left a lot of technical debt

    That would be agreeing with the article, unless I understand what you mean.

    > On top of that, the internet was very different back then.

    In a way that now makes it harder for truly new competing engines to pop up due to increased complexity of the web.

    > I'm still not convinced, why would I change my browser?

    The points made in the article are:

    * Increased privacy, opposed to willingly giving your data to an ad-tech company

    * Helps avoid a browser engine monopoly which would effectively let Google dictate web standards

    * It’s fast and has a nice user interface

    Onto which I'd add:

    * Content blockers work best on Firefox (https://github.com/gorhill/uBlock/wiki/uBlock-Origin-works-b...), doubly so when Manifest V3 rolls out

    * Allows more customization of interface and home page

    * UX improvements, like the clutter-free reader mode, aren't vetoed to protect search revenue as with Chrome (https://news.ycombinator.com/item?id=37675467)

  • Ask HN: Is Firefox team too small to do serious security tests?
    1 project | news.ycombinator.com | 23 Dec 2023
    Advertising networks are vectors for malware:

    https://www.cisecurity.org/insights/blog/malvertising

    https://www.malwarebytes.com/malvertising

    https://theconversation.com/spyware-can-infect-your-phone-or...

    So if you're concerned about security then you want the browser with the best ad blocker.

    uBlock Origin works best in Firefox:

    https://github.com/gorhill/uBlock/wiki/uBlock-Origin-works-b...

What are some alternatives?

When comparing phc-winner-argon2 and uBlock you can also consider the following projects:

orion - Usable, easy and safe pure-Rust crypto

VideoAdBlockForTwitch - Blocks Ads on Twitch.tv.

orion - Usable, easy and safe pure-Rust crypto [Moved to: https://github.com/orion-rs/orion]

Spotify-Ad-Blocker - EZBlocker - A Spotify Ad Blocker for Windows

scrypt - The scrypt key derivation function was originally developed for use in the Tarsnap online backup system and is designed to be far more secure against hardware brute-force attacks than alternative functions such as PBKDF2 or bcrypt.

bypass-paywalls-chrome - Bypass Paywalls web browser extension for Chrome and Firefox.

PyNacl - Python binding to the Networking and Cryptography (NaCl) library

duckduckgo-privacy-extension - DuckDuckGo Privacy Essentials browser extension for Firefox, Chrome.

ClearUrls

AdNauseam - AdNauseam: Fight back against advertising surveillance

uMatrix - uMatrix: Point and click matrix to filter net requests according to source, destination and type

brave-core - Core engine for the Brave browser for mobile and desktop. For issues https://github.com/brave/brave-browser/issues