scrambpy VS backbone-python

Compare scrambpy vs backbone-python and see what are their differences.

Our great sponsors
  • WorkOS - The modern identity platform for B2B SaaS
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • SaaSHub - Software Alternatives and Reviews
scrambpy backbone-python
1 3
56 5
- -
0.0 2.0
almost 2 years ago about 1 year ago
Python Python
GNU General Public License v3.0 only GNU General Public License v3.0 or later
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

scrambpy

Posts with mentions or reviews of scrambpy. We have used some of these posts to build our list of alternatives and similar projects.

backbone-python

Posts with mentions or reviews of backbone-python. We have used some of these posts to build our list of alternatives and similar projects.
  • Encrypt. Now
    1 project | news.ycombinator.com | 17 Oct 2023
    It's only impractical if you actually require end users to understand and apply all of these technologies. It's a lot more tractable if they're abstracted away.

    The fact is that developers very (very) rarely have to interface directly with TLS or the Signal protocol, yet billions of non-technical users implicitly use them in our browsers and via Signal or WhatsApp.

    In my view, the challenge in the adoption of secure/private-by-design tech is the simplicity and usability of the interfaces and the capabilities these tools provide.

    We need secure tools to compete on capability in order to garner mass usage. Without (significant) feature superiority there's little reason for users to make the switch. I'm actively trying to solve some of these problems at Backbone [0]; aiming to build a usable, secure experience for end users and a simple, robust end-to-end-encryption interface for developers.

    [0] https://backbone.dev/

  • Launch HN: Idemeum (YC S21) – Passwordless access to apps and infrastructure
    1 project | news.ycombinator.com | 26 Oct 2022
    > Data in our cloud is end to end encrypted so your credentials are never exposed to anyone but you.

    A few comments:

    1. You might want to avoid calling this zero-knowledge. While your docs suggest some use of E2EE, there seems to be a significant amount of metadata that remains both unencrypted and unauthenticated.

    2. Having read your white paper, it appears your E2EE setup is vulnerable to various forms of forgery. In a simple case, an attacker that has compromised your infrastructure can easily substitute the credentials of arbitrary users in a way that is NOT tamper-evident.

    3. There seems to be no post-compromise security. If your user private key is compromised (e.g. extracted from the extension's local storage), there seems to be no way to reset it.

    4. The recovery flow is questionable. Do you really want to store critical cryptographic material in plaintext and in a third-party cloud?

    When rolling out E2EE from scratch, it's very easy to give rise to issues like #2. At Backbone[1], we've built a framework for building end-to-end encrypted applications with building blocks designed to preserve confidentiality, integrity and nonrepudiatiability under a strict threat model.

    Feel free to reach out if you might like to discuss how we're solving issues the above.

    [1] https://backbone.dev/

  • Backbone: End-to-end-encryption as a service
    1 project | /r/cypherpunk | 12 Oct 2022
    Backbone is designed to reduce the need to trust third parties — it operates under a strict threat model, providing confidentiality, integrity and nonrepudiatiability even under the assumption that Backbone itself is pwned. We’re dedicated to operating transparently, leading us to build our open-source client on top of libsodium.

What are some alternatives?

When comparing scrambpy and backbone-python you can also consider the following projects:

pytorch-widedeep - A flexible package for multimodal-deep-learning to combine tabular data with text and images using Wide and Deep models in Pytorch

ziti-sdk-py - Ziti SDK for Python

python-halftone - A python module that uses PIL/Pillow to give images a halftone effect

bloom-legacy - DEPRECATED - End-to-end encrypted Notes, Files, Calendar, Contacts... for Android, IOS, Linux & MacOS

vortex - Vortex is a secure, transport-agnostic, E2EE chat in under 600 lines.

krypton - Data encryption at rest and IAM for Python

Pinacol - Python program for encryptIoN And COmpression of FiLes

photos-app - ➡️ Moved to https://github.com/ente-io/ente

py-image-compressor - Efficient and expeditious software designed for the swift compression, conversion, and resizing of multiple images simultaneously.

Ockam - Orchestrate end-to-end encryption, cryptographic identities, mutual authentication, and authorization policies between distributed applications – at massive scale.

TwoPhotosOnA6x4 - Stitches 2 photos for printing on a 6"x4" photo.

bloom-legacy-e2ee - End-to-end encrypted Notes, Files, Calendar, Contacts... for Android, IOS, Linux & MacOS