Protocol Alternatives
Similar projects and alternatives to protocol
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
-
PairDrop
Discontinued PairDrop: Local file sharing in your browser. Inspired by Apple's AirDrop. Fork of Snapdrop.
-
uploadserver
Simple Rust file server which lets you upload, share, and download files from a web browser. Ready-to-run binaries for Windows, Mac, and Linux. Free/Open-Source alternative to AirDrop/Dropbox for transferring files on your local network without having to install anything. A more sophisticated version of `python3 -m http.server 8000`.
-
FlyingCarpet
Cross-platform AirDrop. File transfer between Android, iOS, Linux, macOS, and Windows over ad hoc WiFi. No network infrastructure required, just two devices with WiFi chips in close range.
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
protocol reviews and mentions
- LocalSend: Open-source, cross-platform file sharing to nearby devices
-
Localsend: Open-Source Airdrop Alternative
Not the fort-knox implementation it claims on the tin.
'LocalSend uses a secure communication protocol that allows devices to communicate with each other using a REST API. All data is sent securely over HTTPS, and the TLS/SSL certificate is generated on the fly on each device, ensuring maximum security.'
How do they achieve maximum security while generating X.509 certs on device?
Let's look; 'https://github.com/localsend/protocol#2-fingerprint'
'When encryption is on (HTTPS), then the fingerprint is the SHA-256 hash of the certificate'
Confusingly there is a HTTP non encrypted mode, and the docs claim the fingerprint only used to avoid discovery collisions.
Out-of-band [visual comparison / QR code scanning step] sharing of fingerprints COULD be acceptable to prevent 'man in the middle' attacks, however the documentation doesn't seem to indicate that this detail is surfaced or shared with the user.
Stats
Popular Comparisons
Sponsored