home.social

#githubpages — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #githubpages, aggregated by home.social.

  1. I finally got around to setting a #domain for my #bridgy account over on #bluesky. I'm just using my #githubpages as I can't be bothered to buy a domain name for it 🦋

  2. Ah, the cutting-edge #innovation of decentralized social networking—now with a ✨sparkling✨ new paint job called "static sites". 🚀 Just fork, enable, and pretend you're not just slapping lipstick on an HTML pig. 🤡 Who needs dynamic interaction when you can have the excitement of watching paint dry on GitHub Pages instead? 🎨
    satproto.org/ #decentralizedsocialnetworking #static #sites #GitHubPages #webdevelopment #humor #HackerNews #ngated

  3. Local-Only File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The password encryption currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  4. Local-Only File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The password encryption currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  5. Local-Only File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The password encryption currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  6. Local-Only File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The password encryption currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  7. Local-Only File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The password encryption currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  8. Jekyll sayesinde statik ve hızlı bir blog kurmak mümkün.
    Ruby, Bundler, GitHub Pages ve Markdown ile içerik üretmek oldukça kolay.
    İpucu: Markdown öğrenmek uzun vadede ciddi zaman kazandırıyor.
    yuceltoluyag.github.io/jekyll-
    #Jekyll #WebDev #Markdown #GitHubPages #DevTips

  9. New hands-on tutorial on The Main Thread:
    Build and deploy a static website with Quarkus + Roq — all powered by Java and GitHub Actions.

    ✅ Generate your site in minutes
    ✅ Live reload during development
    ✅ Automatic deploys to GitHub Pages

    No Node.js. No hassle. Just Java.

    👉 the-main-thread.com/p/quarkus-

    #Quarkus #Java #Roq #GitHubPages #DevOps

  10. File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  11. File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  12. File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  13. File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  14. Time to make a move? #GiveUpGitHub

    New How-to Guide on #BurgeonLab

    burgeonlab.com/blog/migrate-gi

    It's a thorough guide of switching from an automated CI static site deployment workflow using GitHub Pages & GitHub Actions 🔄 to SourceHut Git and Builds + hosting on Bunny.net Storage & Bunny CDN.

    #techguides #blog #blogging #blogpost #hugo #cicd #CDN #bunnycdn #bunnynet #github #sourcehut #githubactions #githubpages #srht

  15. Naty @eclecticpassions ·

    Time to make a move?

    New How-to Guide on

    burgeonlab.com/blog/migrate-gi

    It's a thorough guide of switching from an automated CI static site deployment workflow using GitHub Pages & GitHub Actions 🔄 to SourceHut Git and Builds + hosting on Bunny.net Storage & Bunny CDN.

  16. Time to make a move? #GiveUpGitHub

    New How-to Guide on #BurgeonLab

    burgeonlab.com/blog/migrate-gi

    It's a thorough guide of switching from an automated CI static site deployment workflow using GitHub Pages & GitHub Actions 🔄 to SourceHut Git and Builds + hosting on Bunny.net Storage & Bunny CDN.

    #techguides #blog #blogging #blogpost #hugo #cicd #CDN #bunnycdn #bunnynet #github #sourcehut #githubactions #githubpages #srht

  17. Time to make a move? #GiveUpGitHub

    New How-to Guide on #BurgeonLab

    burgeonlab.com/blog/migrate-gi

    It's a thorough guide of switching from an automated CI static site deployment workflow using GitHub Pages & GitHub Actions 🔄 to SourceHut Git and Builds + hosting on Bunny.net Storage & Bunny CDN.

    #techguides #blog #blogging #blogpost #hugo #cicd #CDN #bunnycdn #bunnynet #github #sourcehut #githubactions #githubpages #srht

  18. Time to make a move? #GiveUpGitHub

    New How-to Guide on #BurgeonLab

    burgeonlab.com/blog/migrate-gi

    It's a thorough guide of switching from an automated CI static site deployment workflow using GitHub Pages & GitHub Actions 🔄 to SourceHut Git and Builds + hosting on Bunny.net Storage & Bunny CDN.

    #techguides #blog #blogging #blogpost #hugo #cicd #CDN #bunnycdn #bunnynet #github #sourcehut #githubactions #githubpages #srht

  19. It took longer than expected for me (a day on and off) to get #sourcehut builds workflow to work with Bunny's SFTP limitations but I got it working! This is definitely going into a blog post! Really happy it worked out. Sourcehut Git repo + Builds + Bunny.net Storage + CDN replacing GitHub Git repo + Actions + Pages!

    #github #githubpages #githubactions #srht #bunnynet #bunnycdn #bunnystorage #GiveUpGitHub #staticsite #hosting #cdn

  20. Naty @eclecticpassions ·

    It took longer than expected for me (a day on and off) to get builds workflow to work with Bunny's SFTP limitations but I got it working! This is definitely going into a blog post! Really happy it worked out. Sourcehut Git repo + Builds + Bunny.net Storage + CDN replacing GitHub Git repo + Actions + Pages!

  21. It took longer than expected for me (a day on and off) to get #sourcehut builds workflow to work with Bunny's SFTP limitations but I got it working! This is definitely going into a blog post! Really happy it worked out. Sourcehut Git repo + Builds + Bunny.net Storage + CDN replacing GitHub Git repo + Actions + Pages!

    #github #githubpages #githubactions #srht #bunnynet #bunnycdn #bunnystorage #GiveUpGitHub #staticsite #hosting #cdn

  22. It took longer than expected for me (a day on and off) to get #sourcehut builds workflow to work with Bunny's SFTP limitations but I got it working! This is definitely going into a blog post! Really happy it worked out. Sourcehut Git repo + Builds + Bunny.net Storage + CDN replacing GitHub Git repo + Actions + Pages!

    #github #githubpages #githubactions #srht #bunnynet #bunnycdn #bunnystorage #GiveUpGitHub #staticsite #hosting #cdn

  23. It took longer than expected for me (a day on and off) to get #sourcehut builds workflow to work with Bunny's SFTP limitations but I got it working! This is definitely going into a blog post! Really happy it worked out. Sourcehut Git repo + Builds + Bunny.net Storage + CDN replacing GitHub Git repo + Actions + Pages!

    #github #githubpages #githubactions #srht #bunnynet #bunnycdn #bunnystorage #GiveUpGitHub #staticsite #hosting #cdn

  24. New post on #BurgeonLab ✍️

    ➡️ burgeonlab.com/blog/hosting-st

    Finally decided to take my first actions on migrating away from GitHub.com (#GiveUpGitHub) by moving my burgeonlab.com static blog out of GitHub Pages to Bunny.net Storage + CDN.

    Also, I've decided to go for @sourcehut as my Git repo host—but that warrants its own post.

    #blogging #blogs #blog #hugo #srht #weblog #smallweb #github #sourcehut #bunnycdn #bunnynet #staticsite #webhosting #githubpages

  25. Naty @eclecticpassions ·

    New post on ✍️

    ➡️ burgeonlab.com/blog/hosting-st

    Finally decided to take my first actions on migrating away from GitHub.com () by moving my burgeonlab.com static blog out of GitHub Pages to Bunny.net Storage + CDN.

    Also, I've decided to go for @sourcehut as my Git repo host—but that warrants its own post.

  26. New post on #BurgeonLab ✍️

    ➡️ burgeonlab.com/blog/hosting-st

    Finally decided to take my first actions on migrating away from GitHub.com (#GiveUpGitHub) by moving my burgeonlab.com static blog out of GitHub Pages to Bunny.net Storage + CDN.

    Also, I've decided to go for @sourcehut as my Git repo host—but that warrants its own post.

    #blogging #blogs #blog #hugo #srht #weblog #smallweb #github #sourcehut #bunnycdn #bunnynet #staticsite #webhosting #githubpages

  27. New post on #BurgeonLab ✍️

    ➡️ burgeonlab.com/blog/hosting-st

    Finally decided to take my first actions on migrating away from GitHub.com (#GiveUpGitHub) by moving my burgeonlab.com static blog out of GitHub Pages to Bunny.net Storage + CDN.

    Also, I've decided to go for @sourcehut as my Git repo host—but that warrants its own post.

    #blogging #blogs #blog #hugo #srht #weblog #smallweb #github #sourcehut #bunnycdn #bunnynet #staticsite #webhosting #githubpages

  28. New post on #BurgeonLab ✍️

    ➡️ burgeonlab.com/blog/hosting-st

    Finally decided to take my first actions on migrating away from GitHub.com (#GiveUpGitHub) by moving my burgeonlab.com static blog out of GitHub Pages to Bunny.net Storage + CDN.

    Also, I've decided to go for @sourcehut as my Git repo host—but that warrants its own post.

    #blogging #blogs #blog #hugo #srht #weblog #smallweb #github #sourcehut #bunnycdn #bunnynet #staticsite #webhosting #githubpages

  29. Naty @eclecticpassions ·

    Made a trial account on # BunnyCDN Maybe it's time to move one of my static sites from Github Pages over to Bunny's Storage + Pull Zone?

    There's bunny-launcher.net/ which seems handy for deployment. But I need to learn a bit because I'm in unfamiliar territory!

  30. File encryption with a browser.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    Hook Code: github.com/positive-intentions

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  31. File encryption with a browser.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    Hook Code: github.com/positive-intentions

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  32. File encryption with a browser.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    Hook Code: github.com/positive-intentions

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  33. File encryption with a browser.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    Hook Code: github.com/positive-intentions

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  34. File encryption with a browser.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    Hook Code: github.com/positive-intentions

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  35. id like to share some details about how my app works so you can discover/give me feedback on my app. id like to have wording in my app to say something like "most secure chat app in the world"... i probably cant do that because it doesnt qualify.

    github.com/positive-intentions

    positive-intentions.com/blog/i

    im not an expert on #cyberSecurity. im sure there are many gaps in my knowlege in this domain.

    using #javascript, i initially created a fairly basic #chatApp using using #peerjs to create #encrypted #webrtc #connections. this was then easily enhanced by exchanging additional #encryption #keys from #cryptography functions built into browsers (#webcrypto api) to add a redundent layer of encryption. a #diffieHelman key #exchange is done over #webrtc (which can be considered #secure when exchanged over public channels) to create #serverless #p2p #authentication.

    - i sometimes recieve feedback like "javascript is inherently insecure". i disagree with this and have #openedSource my #cryptography module. its basically a thin wrapper around vanilla cryptography functions of a #browser (webcrypto api).

    - another concern for my kind of app (#PWA) is that the developer may introduce malicious code. this is an important point for which i open sourced the project and give instructions for #selfhosting. selhosting this app has some unique features. unlike many other #selfhosted #projects, this app can be hosted on #githubPages (instructions are provided in the readme). im also working towards having better support for running the index.html directly without a static server.

    - to prevent things like browser extensions, the app uses strict #CSP headers to prevent #unauthorised code from running. #selfhosting users should take note of this when setting up their own instance.

    - i received feedback the #Signal/#Simplex protocol is great. completely undertsandable and agree, but wonder if im reducing the #complexity by working with #webrtc. while it has its many flaws, i think risks can be reasonable mitigated if the #cryptography functions are implemented correctly. (all data out is #encrypted and all data in is #decrypted on-the-fly)

    - the key detail that makes this approach unique, is because as a #webapp, unlike other solutions, users have a choice of using any #device/#os/#browser. while a webapp can have nuanced #vulnerabilities, i think by #openSourcing and providing instructions for #selfhosting and instructions to #build for various #platforms, it can provide a reasonable level of #security.

    i think if i stick to the principle of avoiding using any kind of "required" service provider (myself included) and allowing the #frontend and the peerjs-server to be #hosted #independently, im on track for creating a #chatSystem with the "fewest moving parts". i hope you will agree this is true #p2p and i hope i can use this as a step towards true #privacy and #security. #security might be further improved by using a trusted #VPN.

    while there are several similar apps out there like mine. i think mine is distinctly a different approach. so its hard to find #bestPractices for the functionalities i want to achieve. in particular #security practices to use when using #p2p technology.

    (note: this app is an #unstable, #experiment, #proofOfConcept and not ready to replace any other app or service. It's far from finished and provided for #testing and #demo purposes only. This post is to get #feedback on the progress to determine if i'm going in the right direction for a secure chat app)

  36. ⚠️ .io domain¹ likely being phased-out² — seven suggested steps

    Good article in The Verge summarizing recent .io related events, see that for more context if this is news to you:
    * https://www.theverge.com/2024/10/8/24265441/uk-treaty-end-io-domain-chagos-islands

    It looks likely .io (and .io domains) will go away in the next few years (as .cs and .yu did³), so here are my suggested steps to take depending on your usage of .io domains:

    1. Avoid buying new .io domains (or making plans with existing ones; sell if you can)
    2. If you currently run a .io service (for a company or community), make and publicize a transition plan (like a new domain, redirection, orderly shutdown plan for redirects)
    3. If you have a personal site on a .io domain or subdomain, make your own transition plan, and perhaps post about how others should link to your posts
    4. If you are using someone else’s .io domain to publish (like #GitHubPages), make a transition plan to publish elsewhere and leave a forwarding note and link behind
    5. If you use a .io domain as your Web sign-in login on any sites, switch them to another non-io personal domain
    6. Similarly if your site accepts #WebSignIn logins (via #IndieAuth, #RelMeAuth, or even #OpenID), consider discouraging any new sign-ups from .io domains, and warning any existing users with .io domains to switch per # 5
    7. If you have posts (or a whole #indieweb site) with links to .io sites or pages (like those in 2-4 above), make a plan for editing those links to point to an alternative or an archival copy (like on the Internet Archive)

    And of course, post about your #dotIO plans.

    Glossary

    Domain
     https://indieweb.org/domain
    IndieAuth
     https://indieweb.org/IndieAuth
    Internet Archive
     https://web.archive.org/
    OpenID
     https://indieweb.org/OpenID
    Redirect
     https://indieweb.org/redirect
    RelMeAuth
     https://indieweb.org/RelMeAuth
    Web sign-in
     https://indieweb.org/Web_sign-in


    References:

    ¹ https://indieweb.org/.io
    ² https://en.wikipedia.org/wiki/.io#Phasing_Out
    ³ https://en.wikipedia.org/wiki/.cs
    E.g. https://indieweb.org/webmention.io or https://indieweb.org/granary.io
    E.g. https://indieweb.org/werd.io
    https://indieweb.org/github.io


    This is post 25 of #100PostsOfIndieWeb. #100Posts

    https://tantek.com/2024/283/t1/metaphors-constructive-cooperative-joyful
    https://tantek.com/2024/287/t1/fediverse-unfollow-bridgyfed-bug

  37. Pages CMS: Ein CMS für statische Seiten auf GitHub Pages

    Bekanntlich bin ich ja ein großer Fan statischer Seiten und auch dieses Blog Kritzelheft besteht aus von Quarto angetriebenen, statischen Seiten, die auf GitHub Pages gehostet werden. Leider mangelt es fast allen mir bekannten Generatoren statischer Seiten an der Einfachheit, die zum Beispiel ein Content Management System wie WordPress auszeichnet. kantel.github.io/posts/2024030 #StaticSite #GitHubPages #PagesCMS

  38. @izaya Consider sepearating and ?

    Cuz I can recommend for & and you can then just choose for and/or differently...

    For example I did put os1337.com on and the Domain & via ...

  39. @izaya Consider sepearating #Domains and #Hosting?

    Cuz I can recommend #ClouDNS for #Domains & #DNS and you can then just choose #hosting for #eMail and/or #Web differently...

    For example I did put os1337.com on #GithubPages and the Domain & #eMail #Forwarder via #ClouDNS...

  40. @izaya Consider sepearating #Domains and #Hosting?

    Cuz I can recommend #ClouDNS for #Domains & #DNS and you can then just choose #hosting for #eMail and/or #Web differently...

    For example I did put os1337.com on #GithubPages and the Domain & #eMail #Forwarder via #ClouDNS...