Kryptor: A simple, modern, and secure encryption tool.

This page summarizes the projects mentioned and recommended in the original post on /r/crypto

Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
  • ChaCha20-BLAKE2b

    Committing ChaCha20-BLAKE2b, XChaCha20-BLAKE2b, and XChaCha20-BLAKE2b-SIV AEAD implementations.

    I see what you mean; https://github.com/samuel-lucas6/ChaCha20-BLAKE2b would be considered borderline rolling your own. Especially when compared to https://github.com/FiloSottile/age/commit/2194f6962c8bb3bca8a55f313d5b9302596b593b as one solution or mitigation to the attack, and considering that it does not seem to a big problem for key based encryption (judging by the comments in that commit).

  • Kryptor

    A simple, modern, and secure encryption and signing tool that aims to be a better version of age and Minisign.

    I wholly agree with discussions/10, FWIW, but never limit the upper end of security (or make it locked behind a flag like --stop-this-is-security-theatre) if I wanted to use argon2 with a ridiculous delay.

  • InfluxDB

    Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.

  • Introducing .NET Multi-platform App UI (MAUI)

    .NET MAUI is the .NET Multi-platform App UI, a framework for building native device applications spanning mobile, tablet, and desktop.

    Other than that one curiosity, this looks really cool. Any chance of a GUI once .net MAUI comes with .net6 or whenever it releases?

  • libsodium-core

    libsodium for .NET - A secure cryptographic library

    I'm using libsodium-core, which is a fork of libsodium-net. I'm not using Nsec because it doesn't have things like XChaCha20 exposed.

  • age

    A simple, modern and secure encryption tool (and Go library) with small explicit keys, no config options, and UNIX-style composability.

    I first heard about it through age. A 16 KiB chunk ciphertext can be decrypted with around 1000 keys, which means an attacker can test that many passwords at a time. So it gets worse with larger ciphertexts.

  • libsodium-doc

    Gitbook documentation for libsodium

    Interestingly, Frank just clarified a few things in some of the latest commits for the libsodium-doc repo. He is now saying to avoid using a password for encryption. I wonder what motivated him to do that.

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts