termpair
ProtonMail Web Client
Our great sponsors
termpair | ProtonMail Web Client | |
---|---|---|
8 | 180 | |
1,585 | 4,099 | |
- | 1.7% | |
3.2 | 10.0 | |
almost 2 years ago | 13 days ago | |
TypeScript | TypeScript | |
MIT License | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
termpair
-
ProtonMail: Important clarifications regarding arrest of climate activist
A counter to this would be to let users deploy their open source client [0] themselves to wherever (as one example, this is something that TermPair implements [1]).
[0] https://github.com/ProtonMail/WebClients
[1] https://github.com/cs01/termpair/#static-hosting
-
Hacker News top posts: May 31, 2021
TermPair: Terminal sharing with AES-GCM 128 bit end-to-end encryption\ (34 comments)
-
TermPair: Terminal sharing with AES-GCM 128 bit end-to-end encryption
From a quick skim it looks like the key is base64 encoded into the URL in terminal_id param, so presumably you just share the URL and the collaborator stays on the URL with the key? If the key is ephemeral/regenerated for each session it seems to eliminate most of your concerns.
https://github.com/cs01/termpair/blob/1d273fa306a543fefbf2cf...
-
GoTTY – Share your terminal as a web application
This looks pretty similar to the few years old TermPair [0], featuring AES-GCM 128 bit end-to-end encryption and built with FastApi (Python).
[0] https://github.com/cs01/termpair
ProtonMail Web Client
- Has anyone tried to run the Proton Mail UI locally?
-
ProtonDrive encryption key
The source code is here https://github.com/ProtonMail/WebClients
-
Proton Pass – Protecting your passwords and online identity
> Finally, in keeping with our long track record of transparency, Proton Pass is open source so anyone can review and verify our security architecture
They sure do enjoy writing that sentence without including any hyperlinks. This (https://github.com/ProtonMail/WebClients/tree/main/applicati...) appears to be the browser extension and https://github.com/ProtonMail/WebClients/tree/main/packages/... appears to look like the backend referenced in the extension's readme, but that directory's readme is zero bytes so (shrug)
- Where is the source code for Proton Drive?
-
Basic HTML Mode?
Fork the frontend and make your own lightweight option
- Where can I find the source code of the web app?
-
Announcement: SMTP Server in Rust with DMARC, DANE, MTA-STS, Sieve, OTEL support
PS: I hope that we selfhosters will have a modern, efficient, easy to use mail suite one day with modern features like JMAP, good self-learning spam integration, automated checks and validations for SPF/DMARC/DKIM or whether the IP/host suddenly appears in a blocklist and integrated encryption at rest for emails. Something that isn't 30 services in a container image, with 30 different configuration styles. Maybe even with an API integrated that's compatible to the ProtonMail frontend (like the neutron server once intended to be). Anyway, I'm sorry for dreaming. ;)
-
Why is the "Special offer" button still there after I purchased 1 year of Mail Plus through that very button?? Not happy.
And if you want to customize it further you can use Stylus to add custom CSS, Tampermonkey to add JS, or even modify the whole thing yourself from source (if you run it locally it syncs with your actual account).
- Is Proton Drive better than Sync.com?
-
Is there any tool to verify client-side website code you get served is the same as the open source version?
There are lots of useful End to end encrypted webapps such as Protonmail, cryptpad, cryptee and many others. And part of why we trust them is that the client side code is open source, so we can see that end to end encryption is really going on and is really secure. Its impossible to verify what code they are running in their server, but if the data we send them is already encrypted we can rest easy.
What are some alternatives?
tmate - Instant Terminal Sharing
SimpleLogin - The SimpleLogin back-end and web app
simplex-chat - SimpleX - the first messaging network operating without user identifiers of any kind - 100% private by design! iOS, Android and desktop apps 📱!
Roundcube - The Roundcube Webmail suite
cpace - A CPace PAKE implementation using libsodium.
RainLoop - Simple, modern & fast web-based email client
notionapi - A Notion API SDK, written in Golang
Tutanota makes encryption easy - Tuta is an email service with a strong focus on security and privacy that lets you encrypt emails, contacts and calendar entries on all your devices.
node-pty - Fork pseudoterminals in Node.JS
Mailpile - A free & open modern, fast email client with user-friendly encryption and privacy features
pq-dashboard - FastAPI frontend for monitoring PQ queues
proton-mail - React web application to manage ProtonMail