simplex-chat
termpair
Our great sponsors
simplex-chat | termpair | |
---|---|---|
247 | 8 | |
5,285 | 1,585 | |
4.0% | - | |
9.9 | 3.2 | |
about 4 hours ago | almost 2 years ago | |
Haskell | TypeScript | |
GNU Affero General Public License v3.0 | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
simplex-chat
-
What are your favorite End-to-End encrypted tools for online privacy?
For messaging I'm currently on Olvid (E2E with physical key exchange) but since it still use their servers, I'm currently testing SimpleX where I can host my own servers.
- Apple reveals 'push notification spying' by foreign governments
- simplex bugs/ missing features
- Launching Default End-to-End Encryption on Messenger
-
Apple Confirms Governments Using Push Notifications to Surveil Users
Notice how SimpleX (https://simplex.chat/) has no push notifications by default because of this issue.
- Possible today in Signal? Disable link preview
-
SMS Security and Privacy Gaps
I've been using SimpleX [0] with a couple of friends recently. It appears to work as advertised.
[0] https://simplex.chat
- SimpleX Chat v5.3.0 – Local file encryption and delivery receipts
-
U.K. Abandons, for Now, Legislation That Would Have Banned End-to-End Encryption
If you have a mobile phone number, the domestic intelligence agency knows exactly where you are at all times and any LEO (without a warrant) can also find you. In addition, there have been numerous CCC presentations showing how insecure the global (excluding US) and (separately) US carriers are guilty of promiscuous metadata trafficking ($$) and insecure SS7 setups. As a consequence, for low $, you can go to any one of several shady websites and find the last location of almost any phone number (person unique ID) globally. There are additional varying exploitable vulnerabilities depending on the exact combination of {handset x carrier x country} to impersonate them, tap their line, reveal their exact location, and redirect their phone number through a third-party handset or even a PBX. These are more expensive and some capabilities are forbidden for all but a few selective intelligence uses.
Session (Signal fork) doesn't use phone numbers. It's pretty well-designed overall and uses an onion routing approach. It's already a superset of Signal except it doesn't use phone numbers. https://getsession.org
Also look interesting:
* (unproven) https://www.olvid.io/technology
* (unproven) https://simplex.chat
PS: Using regular TOR on home broadband or cloud servers is relatively risky and inefficient. Sybil attacks on it are common. And to network operators and security agencies it gives an easy "flow tag" of your uplink and exit node data traffic as automatically suspicious.
-
Re: Profile Pictures
Why not open up a Feature request on https://github.com/simplex-chat/simplex-chat/issues
termpair
-
ProtonMail: Important clarifications regarding arrest of climate activist
A counter to this would be to let users deploy their open source client [0] themselves to wherever (as one example, this is something that TermPair implements [1]).
[0] https://github.com/ProtonMail/WebClients
[1] https://github.com/cs01/termpair/#static-hosting
-
Hacker News top posts: May 31, 2021
TermPair: Terminal sharing with AES-GCM 128 bit end-to-end encryption\ (34 comments)
-
TermPair: Terminal sharing with AES-GCM 128 bit end-to-end encryption
From a quick skim it looks like the key is base64 encoded into the URL in terminal_id param, so presumably you just share the URL and the collaborator stays on the URL with the key? If the key is ephemeral/regenerated for each session it seems to eliminate most of your concerns.
https://github.com/cs01/termpair/blob/1d273fa306a543fefbf2cf...
-
GoTTY – Share your terminal as a web application
This looks pretty similar to the few years old TermPair [0], featuring AES-GCM 128 bit end-to-end encryption and built with FastApi (Python).
[0] https://github.com/cs01/termpair
What are some alternatives?
Element - A glossy Matrix collaboration client for the web.
tmate - Instant Terminal Sharing
session-android - A private messenger for Android.
cpace - A CPace PAKE implementation using libsodium.
nostr - a truly censorship-resistant alternative to Twitter that has a chance of working
notionapi - A Notion API SDK, written in Golang
Signal-Android - Fork from a private messenger for Android with extra options added: full backup and (partial, ony text) xml backup of messages. Restore can happen at any time, not only after a fresh install. Import SMS database. Import of (unencrypted) WhatsApp databases. Removed apk expire. Choose between passphrase protection and the Android screenlock. Choice for the backup location (internal or removable storage on Android < 11 (on 11 and higher this is already possible)). Set the maptype in the place picker. Option to treat view-once media as normal media. Option to ignore remote deletion. Choose between FCM or websocket notification delivery.
node-pty - Fork pseudoterminals in Node.JS
Signal-Server - Server supporting the Signal Private Messenger applications on Android, Desktop, and iOS
pq-dashboard - FastAPI frontend for monitoring PQ queues
Signal-iOS - A private messenger for iOS.
mailvelope - Browser extension for OpenPGP encryption with Webmail