sentc
Ockam
sentc | Ockam | |
---|---|---|
5 | 76 | |
35 | 4,355 | |
- | 0.7% | |
8.9 | 10.0 | |
about 1 month ago | 1 day ago | |
Rust | Rust | |
GNU Affero General Public License v3.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
sentc
- Sentc end-to-end encryption sdk, now with 2-factor authentication and light version without encryption. It is cross compiled to flutter and wasm.
- Sentc. An End-to-end encryption sdk with groups, server side key rotation and file handling + searchable encryption
-
Sentc. An End-to-end encryption sdk with groups, server side key rotation and file handling. Now with easier self-hosting.
doc: https://sentc.com/
-
Sentc An End-to-end encryption SDK with groups, serverside keyrotation and files
- flutter: https://github.com/sentclose/sentc-flutter
Im focusing on groups and subgroups with server side key rotation (but the server still don't know the keys) and large encrypted file handling (even in browser).
I hope you may like it. If you have questions, just ask.
Have a great day and thank you for your time.
-
Sentc. An End-to-end encryption sdk with groups, server side key rotation and file handling
the core sdk: https://github.com/sentclose/sentc
Ockam
-
Tunnelmole, an ngrok alternative (open source)
disclosure: I work at Ockam.
The Portals for Mac app is an example of the type of thing you could build using the open source stack of protocols. The README (linked by parent) links out to all of the relevant parts of the protocol documentation to explain how these work together. The NAT Traversal (https://github.com/build-trust/ockam/blob/develop/examples/a...) part of the README is probably the best explanation of why the free relay you get via Ockam Orchestrator is a useful part of this demo.
As for why would anyone trust this: The protocols are designed so you absolutely don't have to trust the relay. Trust is pushed out to the edges that you control and so you're not susceptible to a MITM attack if something like a relay is compromised. The protocol design for all of this is open and documented, and was independently audited by (IMO) some of the best in the business, Trail of Bits: https://docs.ockam.io/reference/protocols.
- Alt to Ngrok, Written in Rust
-
How we built a Swift app that uses Rust
🚀 Portals for Mac – A macOS app built in Swift that uses the Ockam Rust library to privately share a service on your Mac with anyone, anywhere. The service is shared securely over an end-to-end encrypted and mutually authenticated Ockam Portal. Your friends will have access to it on their localhost! This app is a great example of the kinds of things you can build with Ockam 👉
- Ockam is participating in Hacktoberfest - great opportunity for your first OSS contribution
- Participate in Hacktoberfest with Ockam!
-
Create End-to-End Channels in Rust with Ockam Routing
Ockam is a suite of programming libraries, command line tools, and managed cloud services to orchestrate end-to-end encryption, mutual authentication, key management, credential management, and authorization policy enforcement — all at massive scale. Ockam's end-to-end secure channels guarantee authenticity, integrity, and confidentiality of all data-in-motion at the application layer.
- Please do not spam other GitHub users via email
-
Tunnel via Cloudflare to Any TCP Service
We’ve been working on something (https://github.com/build-trust/ockam) that enables exactly this, among a whole host of other use cases. If you check out some of the code examples in the docs you’ll see how to setup a tunnel using the CLI.
For other use cases there’s also the programming libraries (only Rust atm, though I was spiking a TypeScript/Node PoC this week) which might provide more flexibility. Personally I’m excited by the idea of being able to move this kind of secure by design connectivity all the way into the application layer though.
-
How to grow an OSS community
If you're not already an active contributor to an open source project or two it can seem very daunting. You don't want to do the wrong thing and embarrass yourself. Remove that anxiety for people by giving them an easy way to do something low risk. Matt did that a couple of years ago by creating a long-lived issue for people to simply say hello. That's it. Say hi, introduce yourself. It's a safe place to make a first step.
- Hiring - Ockam (Series A SaaS)