The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning. Learn more →
Top 23 Libsodium Open-Source Projects
-
-
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
The first step is to install the gem with bundle add authtrail. Additionally, since you'll be storing user-identifiable information such as emails and IP addresses in your app database, it's highly recommended that you encrypt this data in production using a combination of Lockbox and Blindindex gems.
-
-
-
-
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
-
-
-
I like the "solve the now" perspective here, and having code examples is very helpful to understand some of the rational behind the approach. Having read your previous "tedious survey"[0] post on various token formats, I generally agree with a lot of your conclusions. Curious though about your thought process wrt macaroons vs biscuits.
To me the one major downside of macaroons has always been the single shared root symmetric key. Many use cases are addressed by third party attenuation, but then there are the problems like key rotation, having to do online verification, no built in encryption, no peer-to-peer support through an "untrusted" fly.io, and no third party token verification without decryption like in signcryption[1] schemes. Of course this is traded off by having to do PK issuance and management so I can see the simplicity of it.
Is fly.io scoping this pretty hard to just auth tokens with third party attenuation, or do you see further development and maybe moving to other token systems like biscuit when/if the need arises to address those known issues?
fwiw I've done a bit of research work myself on a token format using signcryption [2] where I explored addressing some of these ideas (but not the attenuation side of it yet, which I get is a big deal here).
[0] https://fly.io/blog/api-tokens-a-tedious-survey/
[1] https://github.com/jedisct1/libsodium-signcryption
[2] https://github.com/michelp/pgsodium/blob/feat/signcryption-t...
-
-
Kryptor
A simple, modern, and secure encryption and signing tool that aims to be a better version of age and Minisign.
Bit new to this, but would it be possible to have Peazip as a frontend that supports Xchacha20? I believe it could interface with something like Kryptor here: https://www.kryptor.co.uk/
-
-
-
-
android
Official Android client for keyspace.cloud. A beautiful and secure password manager. (by Keyspace-cloud)
-
kotlin-multiplatform-libsodium
A kotlin multiplatform wrapper for libsodium, using directly built libsodium for jvm and native, and libsodium.js for js targets.
Project mention: Show HN: Mementō – File browser for local and cloud storage | news.ycombinator.com | 2023-10-18Android (Google play store): https://play.google.com/store/apps/details?id=com.ionspin.me...
We also have a iOS build for testing through TestFlight available on this link: https://testflight.apple.com/join/ohRS4Pd4
You can learn more about mementō and the company here http://www.ionspin.com
If you want to share your feedback directly with us you can send it to [email protected], it'll get forwarded directly to all of our inboxes.
I'll also be here for a couple of hours to answer all of your questions.
Ugi
[1] Kotlin wrapped libsodium - https://github.com/ionspin/kotlin-multiplatform-libsodium
-
sodium-universal
Universal wrapper for sodium-javascript and sodium-native working in Node.js and the Browser
-
-
I like the "solve the now" perspective here, and having code examples is very helpful to understand some of the rational behind the approach. Having read your previous "tedious survey"[0] post on various token formats, I generally agree with a lot of your conclusions. Curious though about your thought process wrt macaroons vs biscuits.
To me the one major downside of macaroons has always been the single shared root symmetric key. Many use cases are addressed by third party attenuation, but then there are the problems like key rotation, having to do online verification, no built in encryption, no peer-to-peer support through an "untrusted" fly.io, and no third party token verification without decryption like in signcryption[1] schemes. Of course this is traded off by having to do PK issuance and management so I can see the simplicity of it.
Is fly.io scoping this pretty hard to just auth tokens with third party attenuation, or do you see further development and maybe moving to other token systems like biscuit when/if the need arises to address those known issues?
fwiw I've done a bit of research work myself on a token format using signcryption [2] where I explored addressing some of these ideas (but not the attenuation side of it yet, which I get is a big deal here).
[0] https://fly.io/blog/api-tokens-a-tedious-survey/
[1] https://github.com/jedisct1/libsodium-signcryption
[2] https://github.com/michelp/pgsodium/blob/feat/signcryption-t...
-
-
-
crypto
Cryptographic operations in WASM, C, Typescript for Nodejs and the browser. (by deliberative)
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
Libsodium related posts
- Macaroons Escalated Quickly
- Show HN: Mementō – File browser for local and cloud storage
- Does Halite do PGP?
- Typescript/WASM library with cryptographic operations based on libsodium, Shamir secret sharing, Merkle trees. Runs on Nodejs and the browser. Feedback is encouraged!
- [Noob alert] Is there a way to encrypt and decrypt a file with a password using rust?
- Supabase secrets management available in beta
- pgcrypto question
-
A note from our sponsor - WorkOS
workos.com | 18 Apr 2024
Index
What are some of the best open-source Libsodium projects? This list will help you:
Project | Stars | |
---|---|---|
1 | hat.sh | 2,028 |
2 | tweetnacl-js | 1,716 |
3 | lockbox | 1,390 |
4 | wire-webapp | 1,116 |
5 | Halite | 1,111 |
6 | PyNacl | 1,032 |
7 | RbNaCl | 978 |
8 | libsodium.js | 935 |
9 | sodium_compat | 869 |
10 | pgsodium | 508 |
11 | Swift-Sodium | 507 |
12 | Kryptor | 398 |
13 | node-sodium | 352 |
14 | dryoc | 234 |
15 | serde-encrypt | 175 |
16 | android | 134 |
17 | kotlin-multiplatform-libsodium | 77 |
18 | sodium-universal | 66 |
19 | rawr-x3dh | 65 |
20 | libsodium-signcryption | 57 |
21 | sodium.cr | 46 |
22 | cpace | 33 |
23 | crypto | 25 |