#githubpages — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #githubpages, aggregated by home.social.
-
I finally got around to setting a #domain for my #bridgy account over on #bluesky. I'm just using my #githubpages as I can't be bothered to buy a domain name for it 🦋
-
Ah, the cutting-edge #innovation of decentralized social networking—now with a ✨sparkling✨ new paint job called "static sites". 🚀 Just fork, enable, and pretend you're not just slapping lipstick on an HTML pig. 🤡 Who needs dynamic interaction when you can have the excitement of watching paint dry on GitHub Pages instead? 🎨
http://satproto.org/ #decentralizedsocialnetworking #static #sites #GitHubPages #webdevelopment #humor #HackerNews #ngated -
Local-Only File Encryption with JavaScript.
I've been exploring the #WebCryptoAPI and I'm impressed!
When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!
I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.
Live Demo: https://dim.positive-intentions.com/?path=/story/usefs--encrypted-demo
Demo Code: https://github.com/positive-intentions/dim/blob/staging/src/stories/05-Hooks-useFS.stories.js
About the Dim framework:
https://positive-intentions.com/docs/category/dimIMPORTANT NOTES (PLEASE READ!):
* This is NOT a product. It's for #testing and #demonstration purposes only.
* It has NOT been reviewed or audited. Do NOT use for sensitive data.
* The password encryption currently uses a hardcoded password. This is for demonstration, not security.
* This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.#Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept
-
Local-Only File Encryption with JavaScript.
I've been exploring the #WebCryptoAPI and I'm impressed!
When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!
I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.
Live Demo: https://dim.positive-intentions.com/?path=/story/usefs--encrypted-demo
Demo Code: https://github.com/positive-intentions/dim/blob/staging/src/stories/05-Hooks-useFS.stories.js
About the Dim framework:
https://positive-intentions.com/docs/category/dimIMPORTANT NOTES (PLEASE READ!):
* This is NOT a product. It's for #testing and #demonstration purposes only.
* It has NOT been reviewed or audited. Do NOT use for sensitive data.
* The password encryption currently uses a hardcoded password. This is for demonstration, not security.
* This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.#Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept
-
Local-Only File Encryption with JavaScript.
I've been exploring the #WebCryptoAPI and I'm impressed!
When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!
I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.
Live Demo: https://dim.positive-intentions.com/?path=/story/usefs--encrypted-demo
Demo Code: https://github.com/positive-intentions/dim/blob/staging/src/stories/05-Hooks-useFS.stories.js
About the Dim framework:
https://positive-intentions.com/docs/category/dimIMPORTANT NOTES (PLEASE READ!):
* This is NOT a product. It's for #testing and #demonstration purposes only.
* It has NOT been reviewed or audited. Do NOT use for sensitive data.
* The password encryption currently uses a hardcoded password. This is for demonstration, not security.
* This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.#Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept
-
Local-Only File Encryption with JavaScript.
I've been exploring the #WebCryptoAPI and I'm impressed!
When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!
I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.
Live Demo: https://dim.positive-intentions.com/?path=/story/usefs--encrypted-demo
Demo Code: https://github.com/positive-intentions/dim/blob/staging/src/stories/05-Hooks-useFS.stories.js
About the Dim framework:
https://positive-intentions.com/docs/category/dimIMPORTANT NOTES (PLEASE READ!):
* This is NOT a product. It's for #testing and #demonstration purposes only.
* It has NOT been reviewed or audited. Do NOT use for sensitive data.
* The password encryption currently uses a hardcoded password. This is for demonstration, not security.
* This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.#Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept
-
Local-Only File Encryption with JavaScript.
I've been exploring the #WebCryptoAPI and I'm impressed!
When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!
I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.
Live Demo: https://dim.positive-intentions.com/?path=/story/usefs--encrypted-demo
Demo Code: https://github.com/positive-intentions/dim/blob/staging/src/stories/05-Hooks-useFS.stories.js
About the Dim framework:
https://positive-intentions.com/docs/category/dimIMPORTANT NOTES (PLEASE READ!):
* This is NOT a product. It's for #testing and #demonstration purposes only.
* It has NOT been reviewed or audited. Do NOT use for sensitive data.
* The password encryption currently uses a hardcoded password. This is for demonstration, not security.
* This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.#Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept
-
Jekyll sayesinde statik ve hızlı bir blog kurmak mümkün.
Ruby, Bundler, GitHub Pages ve Markdown ile içerik üretmek oldukça kolay.
İpucu: Markdown öğrenmek uzun vadede ciddi zaman kazandırıyor.
https://yuceltoluyag.github.io/jekyll-blog-kurulumu/
#Jekyll #WebDev #Markdown #GitHubPages #DevTips -
New hands-on tutorial on The Main Thread:
Build and deploy a static website with Quarkus + Roq — all powered by Java and GitHub Actions.✅ Generate your site in minutes
✅ Live reload during development
✅ Automatic deploys to GitHub PagesNo Node.js. No hassle. Just Java.
👉 https://www.the-main-thread.com/p/quarkus-roq-github-pages-static-site-tutorial
-
File Encryption with JavaScript.
I've been exploring the #WebCryptoAPI and I'm impressed!
When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!
I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.
Live Demo: https://dim.positive-intentions.com/?path=/story/usefs--encrypted-demo
Demo Code: https://github.com/positive-intentions/dim/blob/staging/src/stories/05-Hooks-useFS.stories.js
About the Dim framework:
https://positive-intentions.com/docs/category/dimIMPORTANT NOTES (PLEASE READ!):
* This is NOT a product. It's for #testing and #demonstration purposes only.
* It has NOT been reviewed or audited. Do NOT use for sensitive data.
* The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
* This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.#Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept
-
File Encryption with JavaScript.
I've been exploring the #WebCryptoAPI and I'm impressed!
When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!
I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.
Live Demo: https://dim.positive-intentions.com/?path=/story/usefs--encrypted-demo
Demo Code: https://github.com/positive-intentions/dim/blob/staging/src/stories/05-Hooks-useFS.stories.js
About the Dim framework:
https://positive-intentions.com/docs/category/dimIMPORTANT NOTES (PLEASE READ!):
* This is NOT a product. It's for #testing and #demonstration purposes only.
* It has NOT been reviewed or audited. Do NOT use for sensitive data.
* The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
* This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.#Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept
-
File Encryption with JavaScript.
I've been exploring the #WebCryptoAPI and I'm impressed!
When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!
I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.
Live Demo: https://dim.positive-intentions.com/?path=/story/usefs--encrypted-demo
Demo Code: https://github.com/positive-intentions/dim/blob/staging/src/stories/05-Hooks-useFS.stories.js
About the Dim framework:
https://positive-intentions.com/docs/category/dimIMPORTANT NOTES (PLEASE READ!):
* This is NOT a product. It's for #testing and #demonstration purposes only.
* It has NOT been reviewed or audited. Do NOT use for sensitive data.
* The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
* This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.#Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept
-
File Encryption with JavaScript.
I've been exploring the #WebCryptoAPI and I'm impressed!
When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!
I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.
Live Demo: https://dim.positive-intentions.com/?path=/story/usefs--encrypted-demo
Demo Code: https://github.com/positive-intentions/dim/blob/staging/src/stories/05-Hooks-useFS.stories.js
About the Dim framework:
https://positive-intentions.com/docs/category/dimIMPORTANT NOTES (PLEASE READ!):
* This is NOT a product. It's for #testing and #demonstration purposes only.
* It has NOT been reviewed or audited. Do NOT use for sensitive data.
* The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
* This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.#Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept
-
Time to make a move? #GiveUpGitHub
New How-to Guide on #BurgeonLab
https://www.burgeonlab.com/blog/migrate-github-pages-to-sourcehut-bunny/
It's a thorough guide of switching from an automated CI static site deployment workflow using GitHub Pages & GitHub Actions 🔄 to SourceHut Git and Builds + hosting on Bunny.net Storage & Bunny CDN.
#techguides #blog #blogging #blogpost #hugo #cicd #CDN #bunnycdn #bunnynet #github #sourcehut #githubactions #githubpages #srht
-
Time to make a move? #GiveUpGitHub
New How-to Guide on #BurgeonLab
https://www.burgeonlab.com/blog/migrate-github-pages-to-sourcehut-bunny/
It's a thorough guide of switching from an automated CI static site deployment workflow using GitHub Pages & GitHub Actions 🔄 to SourceHut Git and Builds + hosting on Bunny.net Storage & Bunny CDN.
#techguides #blog #blogging #blogpost #hugo #cicd #CDN #bunnycdn #bunnynet #github #sourcehut #githubactions #githubpages #srht
-
Time to make a move? #GiveUpGitHub
New How-to Guide on #BurgeonLab
https://www.burgeonlab.com/blog/migrate-github-pages-to-sourcehut-bunny/
It's a thorough guide of switching from an automated CI static site deployment workflow using GitHub Pages & GitHub Actions 🔄 to SourceHut Git and Builds + hosting on Bunny.net Storage & Bunny CDN.
#techguides #blog #blogging #blogpost #hugo #cicd #CDN #bunnycdn #bunnynet #github #sourcehut #githubactions #githubpages #srht
-
Time to make a move? #GiveUpGitHub
New How-to Guide on #BurgeonLab
https://www.burgeonlab.com/blog/migrate-github-pages-to-sourcehut-bunny/
It's a thorough guide of switching from an automated CI static site deployment workflow using GitHub Pages & GitHub Actions 🔄 to SourceHut Git and Builds + hosting on Bunny.net Storage & Bunny CDN.
#techguides #blog #blogging #blogpost #hugo #cicd #CDN #bunnycdn #bunnynet #github #sourcehut #githubactions #githubpages #srht
-
Time to make a move? #GiveUpGitHub
New How-to Guide on #BurgeonLab
https://www.burgeonlab.com/blog/migrate-github-pages-to-sourcehut-bunny/
It's a thorough guide of switching from an automated CI static site deployment workflow using GitHub Pages & GitHub Actions 🔄 to SourceHut Git and Builds + hosting on Bunny.net Storage & Bunny CDN.
#techguides #blog #blogging #blogpost #hugo #cicd #CDN #bunnycdn #bunnynet #github #sourcehut #githubactions #githubpages #srht
-
It took longer than expected for me (a day on and off) to get #sourcehut builds workflow to work with Bunny's SFTP limitations but I got it working! This is definitely going into a blog post! Really happy it worked out. Sourcehut Git repo + Builds + Bunny.net Storage + CDN replacing GitHub Git repo + Actions + Pages!
#github #githubpages #githubactions #srht #bunnynet #bunnycdn #bunnystorage #GiveUpGitHub #staticsite #hosting #cdn
-
It took longer than expected for me (a day on and off) to get #sourcehut builds workflow to work with Bunny's SFTP limitations but I got it working! This is definitely going into a blog post! Really happy it worked out. Sourcehut Git repo + Builds + Bunny.net Storage + CDN replacing GitHub Git repo + Actions + Pages!
#github #githubpages #githubactions #srht #bunnynet #bunnycdn #bunnystorage #GiveUpGitHub #staticsite #hosting #cdn
-
It took longer than expected for me (a day on and off) to get #sourcehut builds workflow to work with Bunny's SFTP limitations but I got it working! This is definitely going into a blog post! Really happy it worked out. Sourcehut Git repo + Builds + Bunny.net Storage + CDN replacing GitHub Git repo + Actions + Pages!
#github #githubpages #githubactions #srht #bunnynet #bunnycdn #bunnystorage #GiveUpGitHub #staticsite #hosting #cdn
-
It took longer than expected for me (a day on and off) to get #sourcehut builds workflow to work with Bunny's SFTP limitations but I got it working! This is definitely going into a blog post! Really happy it worked out. Sourcehut Git repo + Builds + Bunny.net Storage + CDN replacing GitHub Git repo + Actions + Pages!
#github #githubpages #githubactions #srht #bunnynet #bunnycdn #bunnystorage #GiveUpGitHub #staticsite #hosting #cdn
-
It took longer than expected for me (a day on and off) to get #sourcehut builds workflow to work with Bunny's SFTP limitations but I got it working! This is definitely going into a blog post! Really happy it worked out. Sourcehut Git repo + Builds + Bunny.net Storage + CDN replacing GitHub Git repo + Actions + Pages!
#github #githubpages #githubactions #srht #bunnynet #bunnycdn #bunnystorage #GiveUpGitHub #staticsite #hosting #cdn
-
New post on #BurgeonLab ✍️
➡️ https://www.burgeonlab.com/blog/hosting-static-sites-with-github-pages-or-bunny-net/
Finally decided to take my first actions on migrating away from GitHub.com (#GiveUpGitHub) by moving my burgeonlab.com static blog out of GitHub Pages to Bunny.net Storage + CDN.
Also, I've decided to go for @sourcehut as my Git repo host—but that warrants its own post.
#blogging #blogs #blog #hugo #srht #weblog #smallweb #github #sourcehut #bunnycdn #bunnynet #staticsite #webhosting #githubpages
-
New post on #BurgeonLab ✍️
➡️ https://www.burgeonlab.com/blog/hosting-static-sites-with-github-pages-or-bunny-net/
Finally decided to take my first actions on migrating away from GitHub.com (#GiveUpGitHub) by moving my burgeonlab.com static blog out of GitHub Pages to Bunny.net Storage + CDN.
Also, I've decided to go for @sourcehut as my Git repo host—but that warrants its own post.
#blogging #blogs #blog #hugo #srht #weblog #smallweb #github #sourcehut #bunnycdn #bunnynet #staticsite #webhosting #githubpages
-
New post on #BurgeonLab ✍️
➡️ https://www.burgeonlab.com/blog/hosting-static-sites-with-github-pages-or-bunny-net/
Finally decided to take my first actions on migrating away from GitHub.com (#GiveUpGitHub) by moving my burgeonlab.com static blog out of GitHub Pages to Bunny.net Storage + CDN.
Also, I've decided to go for @sourcehut as my Git repo host—but that warrants its own post.
#blogging #blogs #blog #hugo #srht #weblog #smallweb #github #sourcehut #bunnycdn #bunnynet #staticsite #webhosting #githubpages
-
New post on #BurgeonLab ✍️
➡️ https://www.burgeonlab.com/blog/hosting-static-sites-with-github-pages-or-bunny-net/
Finally decided to take my first actions on migrating away from GitHub.com (#GiveUpGitHub) by moving my burgeonlab.com static blog out of GitHub Pages to Bunny.net Storage + CDN.
Also, I've decided to go for @sourcehut as my Git repo host—but that warrants its own post.
#blogging #blogs #blog #hugo #srht #weblog #smallweb #github #sourcehut #bunnycdn #bunnynet #staticsite #webhosting #githubpages
-
New post on #BurgeonLab ✍️
➡️ https://www.burgeonlab.com/blog/hosting-static-sites-with-github-pages-or-bunny-net/
Finally decided to take my first actions on migrating away from GitHub.com (#GiveUpGitHub) by moving my burgeonlab.com static blog out of GitHub Pages to Bunny.net Storage + CDN.
Also, I've decided to go for @sourcehut as my Git repo host—but that warrants its own post.
#blogging #blogs #blog #hugo #srht #weblog #smallweb #github #sourcehut #bunnycdn #bunnynet #staticsite #webhosting #githubpages
-
Made a trial account on # BunnyCDN Maybe it's time to move one of my static sites from Github Pages over to Bunny's Storage + Pull Zone?
There's https://bunny-launcher.net/ which seems handy for deployment. But I need to learn a bit because I'm in unfamiliar territory!
-
File encryption with a browser.
I've been exploring the #WebCryptoAPI and I'm impressed!
When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!
I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.
Live Demo: https://dim.positive-intentions.com/?path=/story/usefs--encrypted-demo
Demo Code: https://github.com/positive-intentions/dim/blob/staging/src/stories/05-Hooks-useFS.stories.js
Hook Code: https://github.com/positive-intentions/dim/blob/staging/src/hooks/useFS.js
IMPORTANT NOTES (PLEASE READ!):
* This is NOT a product. It's for #testing and #demonstration purposes only.
* It has NOT been reviewed or audited. Do NOT use for sensitive data.
* The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
* This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.#Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept
-
File encryption with a browser.
I've been exploring the #WebCryptoAPI and I'm impressed!
When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!
I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.
Live Demo: https://dim.positive-intentions.com/?path=/story/usefs--encrypted-demo
Demo Code: https://github.com/positive-intentions/dim/blob/staging/src/stories/05-Hooks-useFS.stories.js
Hook Code: https://github.com/positive-intentions/dim/blob/staging/src/hooks/useFS.js
IMPORTANT NOTES (PLEASE READ!):
* This is NOT a product. It's for #testing and #demonstration purposes only.
* It has NOT been reviewed or audited. Do NOT use for sensitive data.
* The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
* This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.#Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept
-
File encryption with a browser.
I've been exploring the #WebCryptoAPI and I'm impressed!
When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!
I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.
Live Demo: https://dim.positive-intentions.com/?path=/story/usefs--encrypted-demo
Demo Code: https://github.com/positive-intentions/dim/blob/staging/src/stories/05-Hooks-useFS.stories.js
Hook Code: https://github.com/positive-intentions/dim/blob/staging/src/hooks/useFS.js
IMPORTANT NOTES (PLEASE READ!):
* This is NOT a product. It's for #testing and #demonstration purposes only.
* It has NOT been reviewed or audited. Do NOT use for sensitive data.
* The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
* This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.#Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept
-
File encryption with a browser.
I've been exploring the #WebCryptoAPI and I'm impressed!
When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!
I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.
Live Demo: https://dim.positive-intentions.com/?path=/story/usefs--encrypted-demo
Demo Code: https://github.com/positive-intentions/dim/blob/staging/src/stories/05-Hooks-useFS.stories.js
Hook Code: https://github.com/positive-intentions/dim/blob/staging/src/hooks/useFS.js
IMPORTANT NOTES (PLEASE READ!):
* This is NOT a product. It's for #testing and #demonstration purposes only.
* It has NOT been reviewed or audited. Do NOT use for sensitive data.
* The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
* This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.#Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept
-
File encryption with a browser.
I've been exploring the #WebCryptoAPI and I'm impressed!
When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!
I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.
Live Demo: https://dim.positive-intentions.com/?path=/story/usefs--encrypted-demo
Demo Code: https://github.com/positive-intentions/dim/blob/staging/src/stories/05-Hooks-useFS.stories.js
Hook Code: https://github.com/positive-intentions/dim/blob/staging/src/hooks/useFS.js
IMPORTANT NOTES (PLEASE READ!):
* This is NOT a product. It's for #testing and #demonstration purposes only.
* It has NOT been reviewed or audited. Do NOT use for sensitive data.
* The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
* This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.#Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept
-
Use a custom domain on GitHub Pages? Verify your domain to prevent takeover of subdomains:
-
id like to share some details about how my app works so you can discover/give me feedback on my app. id like to have wording in my app to say something like "most secure chat app in the world"... i probably cant do that because it doesnt qualify.
https://github.com/positive-intentions/chat
https://positive-intentions.com/blog/introducing-decentralized-chat
im not an expert on #cyberSecurity. im sure there are many gaps in my knowlege in this domain.
using #javascript, i initially created a fairly basic #chatApp using using #peerjs to create #encrypted #webrtc #connections. this was then easily enhanced by exchanging additional #encryption #keys from #cryptography functions built into browsers (#webcrypto api) to add a redundent layer of encryption. a #diffieHelman key #exchange is done over #webrtc (which can be considered #secure when exchanged over public channels) to create #serverless #p2p #authentication.
- i sometimes recieve feedback like "javascript is inherently insecure". i disagree with this and have #openedSource my #cryptography module. its basically a thin wrapper around vanilla cryptography functions of a #browser (webcrypto api).
- another concern for my kind of app (#PWA) is that the developer may introduce malicious code. this is an important point for which i open sourced the project and give instructions for #selfhosting. selhosting this app has some unique features. unlike many other #selfhosted #projects, this app can be hosted on #githubPages (instructions are provided in the readme). im also working towards having better support for running the index.html directly without a static server.
- to prevent things like browser extensions, the app uses strict #CSP headers to prevent #unauthorised code from running. #selfhosting users should take note of this when setting up their own instance.
- i received feedback the #Signal/#Simplex protocol is great. completely undertsandable and agree, but wonder if im reducing the #complexity by working with #webrtc. while it has its many flaws, i think risks can be reasonable mitigated if the #cryptography functions are implemented correctly. (all data out is #encrypted and all data in is #decrypted on-the-fly)
- the key detail that makes this approach unique, is because as a #webapp, unlike other solutions, users have a choice of using any #device/#os/#browser. while a webapp can have nuanced #vulnerabilities, i think by #openSourcing and providing instructions for #selfhosting and instructions to #build for various #platforms, it can provide a reasonable level of #security.
i think if i stick to the principle of avoiding using any kind of "required" service provider (myself included) and allowing the #frontend and the peerjs-server to be #hosted #independently, im on track for creating a #chatSystem with the "fewest moving parts". i hope you will agree this is true #p2p and i hope i can use this as a step towards true #privacy and #security. #security might be further improved by using a trusted #VPN.
while there are several similar apps out there like mine. i think mine is distinctly a different approach. so its hard to find #bestPractices for the functionalities i want to achieve. in particular #security practices to use when using #p2p technology.
(note: this app is an #unstable, #experiment, #proofOfConcept and not ready to replace any other app or service. It's far from finished and provided for #testing and #demo purposes only. This post is to get #feedback on the progress to determine if i'm going in the right direction for a secure chat app)
-
⚠️ .io domain¹ likely being phased-out² — seven suggested steps
Good article in The Verge summarizing recent .io related events, see that for more context if this is news to you:
* https://www.theverge.com/2024/10/8/24265441/uk-treaty-end-io-domain-chagos-islands
It looks likely .io (and .io domains) will go away in the next few years (as .cs and .yu did³), so here are my suggested steps to take depending on your usage of .io domains:
1. Avoid buying new .io domains (or making plans with existing ones; sell if you can)
2. If you currently run a .io service⁴ (for a company or community), make and publicize a transition plan (like a new domain, redirection, orderly shutdown plan for redirects)
3. If you have a personal site on a .io domain⁵ or subdomain, make your own transition plan, and perhaps post about how others should link to your posts
4. If you are using someone else’s .io domain to publish (like #GitHubPages⁶), make a transition plan to publish elsewhere and leave a forwarding note and link behind
5. If you use a .io domain as your Web sign-in login on any sites, switch them to another non-io personal domain
6. Similarly if your site accepts #WebSignIn logins (via #IndieAuth, #RelMeAuth, or even #OpenID), consider discouraging any new sign-ups from .io domains, and warning any existing users with .io domains to switch per # 5
7. If you have posts (or a whole #indieweb site) with links to .io sites or pages (like those in 2-4 above), make a plan for editing those links to point to an alternative or an archival copy (like on the Internet Archive)
And of course, post about your #dotIO plans.
Glossary
Domain
https://indieweb.org/domain
IndieAuth
https://indieweb.org/IndieAuth
Internet Archive
https://web.archive.org/
OpenID
https://indieweb.org/OpenID
Redirect
https://indieweb.org/redirect
RelMeAuth
https://indieweb.org/RelMeAuth
Web sign-in
https://indieweb.org/Web_sign-in
References:
¹ https://indieweb.org/.io
² https://en.wikipedia.org/wiki/.io#Phasing_Out
³ https://en.wikipedia.org/wiki/.cs
⁴ E.g. https://indieweb.org/webmention.io or https://indieweb.org/granary.io
⁵ E.g. https://indieweb.org/werd.io
⁶ https://indieweb.org/github.io
This is post 25 of #100PostsOfIndieWeb. #100Posts
← https://tantek.com/2024/283/t1/metaphors-constructive-cooperative-joyful
→ https://tantek.com/2024/287/t1/fediverse-unfollow-bridgyfed-bug -
Pages CMS: Ein CMS für statische Seiten auf GitHub Pages
Bekanntlich bin ich ja ein großer Fan statischer Seiten und auch dieses Blog Kritzelheft besteht aus von Quarto angetriebenen, statischen Seiten, die auf GitHub Pages gehostet werden. Leider mangelt es fast allen mir bekannten Generatoren statischer Seiten an der Einfachheit, die zum Beispiel ein Content Management System wie WordPress auszeichnet. https://kantel.github.io/posts/20240302401_pages_cms/ #StaticSite #GitHubPages #PagesCMS
-
@izaya Consider sepearating #Domains and #Hosting?
Cuz I can recommend #ClouDNS for #Domains & #DNS and you can then just choose #hosting for #eMail and/or #Web differently...
For example I did put https://os1337.com on #GithubPages and the Domain & #eMail #Forwarder via #ClouDNS...
-
@izaya Consider sepearating #Domains and #Hosting?
Cuz I can recommend #ClouDNS for #Domains & #DNS and you can then just choose #hosting for #eMail and/or #Web differently...
For example I did put https://os1337.com on #GithubPages and the Domain & #eMail #Forwarder via #ClouDNS...
-
@izaya Consider sepearating #Domains and #Hosting?
Cuz I can recommend #ClouDNS for #Domains & #DNS and you can then just choose #hosting for #eMail and/or #Web differently...
For example I did put https://os1337.com on #GithubPages and the Domain & #eMail #Forwarder via #ClouDNS...