home.social

#proofofconcept — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #proofofconcept, aggregated by home.social.

  1. GhostLock Exploits Windows API to Disrupt File Access

    Meet GhostLock, a proof-of-concept that cleverly exploits Windows API to disrupt file access, causing operational downtime without data loss, similar to the impact of ransomware. By manipulating the CreateFileW sharing parameter, GhostLock effectively locks files, leaving other processes in the dark with a sharing violation error.

    osintsights.com/ghostlock-expl

    #WindowsApi #Ghostlock #DisruptionTactics #Proofofconcept #EmergingThreats

  2. Local-Only File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The password encryption currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  3. Local-Only File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The password encryption currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  4. Local-Only File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The password encryption currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  5. Local-Only File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The password encryption currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  6. Local-Only File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The password encryption currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  7. A Proof of Concept is not a mini product. It’s a disciplined experiment to answer one sharp question.

    In my latest piece, I explain how Java + Quarkus help you run PoCs fast, small, and focuse and why vendors play a role too.

    the-main-thread.com/p/proof-of

    #Java #Quarkus #EnterpriseDev #SoftwareArchitecture #ProofOfConcept

  8. Selhosted P2P E2EE File Transfer & Messaging PWA

    positive-intentions.com

    * #OpenSource
    * #CrossPlatform
    * #PWA
    * #iOS, #Android, #Desktop (self compile)
    * App store, Play store (coming soon)
    * Desktop
    * #Windows, #MacOS, #Linux (self compile)
    * run `index.html` on any modern #browser
    * #Decentralized
    * #Secure
    * #NoCookies
    * #P2P #encrypted
    * No registration
    * No installing
    * #Messaging
    * Group Messaging (coming soon)
    * Text Messaging
    * #Multimedia Messaging
    * #Screensharing (on desktop browsers)
    * Offline Messaging (in #research phase)
    * #FileTransfer
    * #VideoCalls
    * #DataOwnership
    * #SelfHosted
    * GitHub pages Hosting
    * #LocalOnly storage

    Check them out!

    (Degoogled links to the apps)
    - P2P Chat: chat.positive-intentions.com
    - P2P File: file.positive-intentions.com
    - Encrypted drive storage: dim.positive-intentions.com/?p

    - GitHub: github.com/positive-intentions

    IMPORTANT NOTES (PLEASE READ!):
    * These are NOT products. It's for #testing and #demonstration purposes only.
    * They have NOT been reviewed or audited. Do NOT use for sensitive data.
    * All functionality demonstrated is experimental.
    * This is NOT meant to replace robust solutions like #VeraCrypt, #Simplexchat, #Signal, #Whatsapp, #wetransfer. It's just a #proofofconcept to show what's possible with #browser #APIs.

  9. File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  10. File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  11. File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  12. File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  13. #KINews #Retröt

    #Gartner prognostiziert, dass 30 % der generativen #KIProjekte nach dem #ProofofConcept (PoC) abgebrochen werden.

    Aber das ist auch gut so: Ein #PoC ermöglicht es Unternehmen, #Risiken und #Machbarkeit frühzeitig zu bewerten, #Kosten zu sparen und wertvolle Erfahrungen zu sammeln. So lassen sich ineffiziente Projekte stoppen, bevor sie teurer werden. Ausprobieren lohnt sich und Abbrechen ist manchmal der bessere Weg.

    #KI #Projektmanagement

    tino-eberl.de/ki-news/gartner-

  14. #KINews #Retröt

    #Gartner prognostiziert, dass 30 % der generativen #KIProjekte nach dem #ProofofConcept (PoC) abgebrochen werden.

    Aber das ist auch gut so: Ein #PoC ermöglicht es Unternehmen, #Risiken und #Machbarkeit frühzeitig zu bewerten, #Kosten zu sparen und wertvolle Erfahrungen zu sammeln. So lassen sich ineffiziente Projekte stoppen, bevor sie teurer werden. Ausprobieren lohnt sich und Abbrechen ist manchmal der bessere Weg.

    #KI #Projektmanagement

    tino-eberl.de/ki-news/gartner-

  15. #KINews #Retröt

    #Gartner prognostiziert, dass 30 % der generativen #KIProjekte nach dem #ProofofConcept (PoC) abgebrochen werden.

    Aber das ist auch gut so: Ein #PoC ermöglicht es Unternehmen, #Risiken und #Machbarkeit frühzeitig zu bewerten, #Kosten zu sparen und wertvolle Erfahrungen zu sammeln. So lassen sich ineffiziente Projekte stoppen, bevor sie teurer werden. Ausprobieren lohnt sich und Abbrechen ist manchmal der bessere Weg.

    #KI #Projektmanagement

    tino-eberl.de/ki-news/gartner-

  16. #KINews #Retröt

    #Gartner prognostiziert, dass 30 % der generativen #KIProjekte nach dem #ProofofConcept (PoC) abgebrochen werden.

    Aber das ist auch gut so: Ein #PoC ermöglicht es Unternehmen, #Risiken und #Machbarkeit frühzeitig zu bewerten, #Kosten zu sparen und wertvolle Erfahrungen zu sammeln. So lassen sich ineffiziente Projekte stoppen, bevor sie teurer werden. Ausprobieren lohnt sich und Abbrechen ist manchmal der bessere Weg.

    #KI #Projektmanagement

    tino-eberl.de/ki-news/gartner-

  17. "Fairphone’s progress on core impact strategies, page 21.
    Under the header "Levels of circularity: 8 R’s" are 3 shaded areas pointing to "KPI 2", "KPI 3", then "KPI 3 + 4". A banded arrow along the left bridges these areas, pointing upward. Its label is "Order of Priority" from "Low" to "High".

    These point to KPI 2.
    Refuse: prevent raw materials use.
    Rethink: redesign product in view of circularity.

    These point to KPI 3.
    Reduce: decrease raw materials use.
    Repair: maintain and repair product.
    Refurbish: revive product.
    Remanufacture: make new product from second hand.
    Repurpose: re-use product but with other function.

    This points to KPI 3 + 4.
    Recycle: salvage material streams with highest possible value.

    FAIRPHONE Impact report 2021"

    Page 21 of fairphone.com/wp-content/uploa

    If that's not great alt text, idk what is.

    #AltText #AccessText #EaseOfAccess #Accessibility #AccessibilityIsForEveryone #AccessibilityIsHotAF #AccessForAll #EaseOfUseForAll #EaseOfText #FairPhone #Tech #sustainability #CircularEconomy #sustainable #ethics #ethical #incrementalism #HarmReduction #LeadByExample #ProofOfConcept

  18. Selhosted P2P E2EE File Transfer & Messaging PWA

    positive-intentions.com

    * #OpenSource
    * #CrossPlatform
    * #PWA
    * #iOS, #Android, #Desktop (self compile)
    * App store, Play store (coming soon)
    * Desktop
    * #Windows, #MacOS, #Linux (self compile)
    * run `index.html` on any modern #browser
    * #Decentralized
    * #Secure
    * #NoCookies
    * #P2P #encrypted
    * No registration
    * No installing
    * #Messaging
    * Group Messaging (coming soon)
    * Text Messaging
    * #Multimedia Messaging
    * #Screensharing (on desktop browsers)
    * Offline Messaging (in #research phase)
    * #FileTransfer
    * #VideoCalls
    * #DataOwnership
    * #SelfHosted
    * GitHub pages Hosting
    * #LocalOnly storage

    Check them out!

    (Degoogled links to the apps)
    - P2P Chat: chat.positive-intentions.com
    - P2P File: file.positive-intentions.com
    - Encrypted drive storage: dim.positive-intentions.com/?p

    - GitHub: github.com/positive-intentions

    IMPORTANT NOTES (PLEASE READ!):
    * These are NOT products. It's for #testing and #demonstration purposes only.
    * They have NOT been reviewed or audited. Do NOT use for sensitive data.
    * All functionality demonstrated is experimental.
    * This is NOT meant to replace robust solutions like #VeraCrypt, #Simplexchat, #Signal, #Whatsapp, #wetransfer. It's just a #proofofconcept to show what's possible with #browser #APIs.

    (Boosts appreciated)

  19. File encryption with a browser.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    Hook Code: github.com/positive-intentions

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  20. File encryption with a browser.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    Hook Code: github.com/positive-intentions

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  21. File encryption with a browser.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    Hook Code: github.com/positive-intentions

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  22. File encryption with a browser.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    Hook Code: github.com/positive-intentions

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  23. File encryption with a browser.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    Hook Code: github.com/positive-intentions

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  24. ✅ Success! Fell asleep during install… woke up to BashCore Injector fully deployed on:
    💻 Acer Aspire One D160 (2009) – #Atom 450, 2GB RAM

    Everything works, no errors.
    If it runs here, it runs anywhere 👌
    Tested earlier on #VirtualBox, but this was the real #proofofconcept 🔥

    #bashcore #ubuntu #lowend #pentesting #cli #linux #bashcoreinjector #opensource #oldhardware

  25. React-like functional webcomponents, but with vanilla HTML, JS and CSS

    Introducing Dim – a new #Framework that brings #ReactJS-like functional #JSX-syntax with #VanillaJS. Check it out here:
    🔗 Project: github.com/positive-intentions
    🔗 Website: dim.positive-intentions.com

    My journey with #WebComponents started with Lit, and while I appreciated its native browser support (less #Tooling!), coming from #ReactJS, the class components felt like a step backward. The #FunctionalProgramming approach in React significantly improved my #DeveloperExperience and debugging flow.

    So, I set out to build a thin, functional wrapper around #Lit, and Dim is the result! It's a #ProofOfConcept right now, with "main" #Hooks similar to React, plus some custom ones like useStore for #EncryptionAtRest. (Note: #StateManagement for encryption-at-rest is still unstable and currently uses a hardcoded password while I explore #Passwordless options like #WebAuthn/#Passkeys).

    You can dive deeper into the #Documentation and see how it works here:
    📚 Dim Docs: positive-intentions.com/docs/c

    This #OpenSource project is still in its early stages and very #Unstable, so expect #BreakingChanges. I've already received valuable #Feedback on some functions regarding #Security, and I'm actively investigating those. I'm genuinely open to all feedback as I continue to develop it!

    #FrontendDev #JSFramework #Innovation #Coding #Programmer #Tech

  26. 💡 Today, I built a Proof of Concept: a dynamic cryptocurrency miner! The idea was to use idle hardware resources to mine crypto. 🖥️💰

    BUT... after some testing, I realized it's not worth it in Germany due to high energy costs ⚡ and low crypto prices 📉.

    Check it out here (but I don’t recommend using it 😉):

    github.com/kevinveenbirkenbach

    #CryptoMining #ProofOfConcept #OpenSource #TechExperiments #DynamicMiner #EnergyCosts #CryptoPrices #Germany #ETC #BTC #Bitcoin #Docker #Currency #Crypto

  27. id like to share some details about how my app works so you can discover/give me feedback on my app. id like to have wording in my app to say something like "most secure chat app in the world"... i probably cant do that because it doesnt qualify.

    github.com/positive-intentions

    positive-intentions.com/blog/i

    im not an expert on #cyberSecurity. im sure there are many gaps in my knowlege in this domain.

    using #javascript, i initially created a fairly basic #chatApp using using #peerjs to create #encrypted #webrtc #connections. this was then easily enhanced by exchanging additional #encryption #keys from #cryptography functions built into browsers (#webcrypto api) to add a redundent layer of encryption. a #diffieHelman key #exchange is done over #webrtc (which can be considered #secure when exchanged over public channels) to create #serverless #p2p #authentication.

    - i sometimes recieve feedback like "javascript is inherently insecure". i disagree with this and have #openedSource my #cryptography module. its basically a thin wrapper around vanilla cryptography functions of a #browser (webcrypto api).

    - another concern for my kind of app (#PWA) is that the developer may introduce malicious code. this is an important point for which i open sourced the project and give instructions for #selfhosting. selhosting this app has some unique features. unlike many other #selfhosted #projects, this app can be hosted on #githubPages (instructions are provided in the readme). im also working towards having better support for running the index.html directly without a static server.

    - to prevent things like browser extensions, the app uses strict #CSP headers to prevent #unauthorised code from running. #selfhosting users should take note of this when setting up their own instance.

    - i received feedback the #Signal/#Simplex protocol is great. completely undertsandable and agree, but wonder if im reducing the #complexity by working with #webrtc. while it has its many flaws, i think risks can be reasonable mitigated if the #cryptography functions are implemented correctly. (all data out is #encrypted and all data in is #decrypted on-the-fly)

    - the key detail that makes this approach unique, is because as a #webapp, unlike other solutions, users have a choice of using any #device/#os/#browser. while a webapp can have nuanced #vulnerabilities, i think by #openSourcing and providing instructions for #selfhosting and instructions to #build for various #platforms, it can provide a reasonable level of #security.

    i think if i stick to the principle of avoiding using any kind of "required" service provider (myself included) and allowing the #frontend and the peerjs-server to be #hosted #independently, im on track for creating a #chatSystem with the "fewest moving parts". i hope you will agree this is true #p2p and i hope i can use this as a step towards true #privacy and #security. #security might be further improved by using a trusted #VPN.

    while there are several similar apps out there like mine. i think mine is distinctly a different approach. so its hard to find #bestPractices for the functionalities i want to achieve. in particular #security practices to use when using #p2p technology.

    (note: this app is an #unstable, #experiment, #proofOfConcept and not ready to replace any other app or service. It's far from finished and provided for #testing and #demo purposes only. This post is to get #feedback on the progress to determine if i'm going in the right direction for a secure chat app)

  28. id like to share some details about how my app works so you can discover/give me feedback on my app. id like to have wording in my app to say something like "most secure chat app in the world"... i probably cant do that because it doesnt qualify.

    github.com/positive-intentions

    positive-intentions.com/blog/i

    im not an expert on #cyberSecurity. im sure there are many gaps in my knowlege in this domain.

    using #javascript, i initially created a fairly basic #chatApp using using #peerjs to create #encrypted #webrtc #connections. this was then easily enhanced by exchanging additional #encryption #keys from #cryptography functions built into browsers (#webcrypto api) to add a redundent layer of encryption. a #diffieHelman key #exchange is done over #webrtc (which can be considered #secure when exchanged over public channels) to create #serverless #p2p #authentication.

    - i sometimes recieve feedback like "javascript is inherently insecure". i disagree with this and have #openedSource my #cryptography module. its basically a thin wrapper around vanilla cryptography functions of a #browser (webcrypto api).

    - another concern for my kind of app (#PWA) is that the developer may introduce malicious code. this is an important point for which i open sourced the project and give instructions for #selfhosting. selhosting this app has some unique features. unlike many other #selfhosted #projects, this app can be hosted on #githubPages (instructions are provided in the readme). im also working towards having better support for running the index.html directly without a static server.

    - to prevent things like browser extensions, the app uses strict #CSP headers to prevent #unauthorised code from running. #selfhosting users should take note of this when setting up their own instance.

    - i received feedback the #Signal/#Simplex protocol is great. completely undertsandable and agree, but wonder if im reducing the #complexity by working with #webrtc. while it has its many flaws, i think risks can be reasonable mitigated if the #cryptography functions are implemented correctly. (all data out is #encrypted and all data in is #decrypted on-the-fly)

    - the key detail that makes this approach unique, is because as a #webapp, unlike other solutions, users have a choice of using any #device/#os/#browser. while a webapp can have nuanced #vulnerabilities, i think by #openSourcing and providing instructions for #selfhosting and instructions to #build for various #platforms, it can provide a reasonable level of #security.

    i think if i stick to the principle of avoiding using any kind of "required" service provider (myself included) and allowing the #frontend and the peerjs-server to be #hosted #independently, im on track for creating a #chatSystem with the "fewest moving parts". i hope you will agree this is true #p2p and i hope i can use this as a step towards true #privacy and #security. #security might be further improved by using a trusted #VPN.

    while there are several similar apps out there like mine. i think mine is distinctly a different approach. so its hard to find #bestPractices for the functionalities i want to achieve. in particular #security practices to use when using #p2p technology.

    (note: this app is an #unstable, #experiment, #proofOfConcept and not ready to replace any other app or service. It's far from finished and provided for #testing and #demo purposes only. This post is to get #feedback on the progress to determine if i'm going in the right direction for a secure chat app)

  29. id like to share some details about how my app works so you can discover/give me feedback on my app. id like to have wording in my app to say something like "most secure chat app in the world"... i probably cant do that because it doesnt qualify.

    github.com/positive-intentions

    positive-intentions.com/blog/i

    im not an expert on #cyberSecurity. im sure there are many gaps in my knowlege in this domain.

    using #javascript, i initially created a fairly basic #chatApp using using #peerjs to create #encrypted #webrtc #connections. this was then easily enhanced by exchanging additional #encryption #keys from #cryptography functions built into browsers (#webcrypto api) to add a redundent layer of encryption. a #diffieHelman key #exchange is done over #webrtc (which can be considered #secure when exchanged over public channels) to create #serverless #p2p #authentication.

    - i sometimes recieve feedback like "javascript is inherently insecure". i disagree with this and have #openedSource my #cryptography module. its basically a thin wrapper around vanilla cryptography functions of a #browser (webcrypto api).

    - another concern for my kind of app (#PWA) is that the developer may introduce malicious code. this is an important point for which i open sourced the project and give instructions for #selfhosting. selhosting this app has some unique features. unlike many other #selfhosted #projects, this app can be hosted on #githubPages (instructions are provided in the readme). im also working towards having better support for running the index.html directly without a static server.

    - to prevent things like browser extensions, the app uses strict #CSP headers to prevent #unauthorised code from running. #selfhosting users should take note of this when setting up their own instance.

    - i received feedback the #Signal/#Simplex protocol is great. completely undertsandable and agree, but wonder if im reducing the #complexity by working with #webrtc. while it has its many flaws, i think risks can be reasonable mitigated if the #cryptography functions are implemented correctly. (all data out is #encrypted and all data in is #decrypted on-the-fly)

    - the key detail that makes this approach unique, is because as a #webapp, unlike other solutions, users have a choice of using any #device/#os/#browser. while a webapp can have nuanced #vulnerabilities, i think by #openSourcing and providing instructions for #selfhosting and instructions to #build for various #platforms, it can provide a reasonable level of #security.

    i think if i stick to the principle of avoiding using any kind of "required" service provider (myself included) and allowing the #frontend and the peerjs-server to be #hosted #independently, im on track for creating a #chatSystem with the "fewest moving parts". i hope you will agree this is true #p2p and i hope i can use this as a step towards true #privacy and #security. #security might be further improved by using a trusted #VPN.

    while there are several similar apps out there like mine. i think mine is distinctly a different approach. so its hard to find #bestPractices for the functionalities i want to achieve. in particular #security practices to use when using #p2p technology.

    (note: this app is an #unstable, #experiment, #proofOfConcept and not ready to replace any other app or service. It's far from finished and provided for #testing and #demo purposes only. This post is to get #feedback on the progress to determine if i'm going in the right direction for a secure chat app)

  30. id like to share some details about how my app works so you can discover/give me feedback on my app. id like to have wording in my app to say something like "most secure chat app in the world"... i probably cant do that because it doesnt qualify.

    github.com/positive-intentions

    positive-intentions.com/blog/i

    im not an expert on #cyberSecurity. im sure there are many gaps in my knowlege in this domain.

    using #javascript, i initially created a fairly basic #chatApp using using #peerjs to create #encrypted #webrtc #connections. this was then easily enhanced by exchanging additional #encryption #keys from #cryptography functions built into browsers (#webcrypto api) to add a redundent layer of encryption. a #diffieHelman key #exchange is done over #webrtc (which can be considered #secure when exchanged over public channels) to create #serverless #p2p #authentication.

    - i sometimes recieve feedback like "javascript is inherently insecure". i disagree with this and have #openedSource my #cryptography module. its basically a thin wrapper around vanilla cryptography functions of a #browser (webcrypto api).

    - another concern for my kind of app (#PWA) is that the developer may introduce malicious code. this is an important point for which i open sourced the project and give instructions for #selfhosting. selhosting this app has some unique features. unlike many other #selfhosted #projects, this app can be hosted on #githubPages (instructions are provided in the readme). im also working towards having better support for running the index.html directly without a static server.

    - to prevent things like browser extensions, the app uses strict #CSP headers to prevent #unauthorised code from running. #selfhosting users should take note of this when setting up their own instance.

    - i received feedback the #Signal/#Simplex protocol is great. completely undertsandable and agree, but wonder if im reducing the #complexity by working with #webrtc. while it has its many flaws, i think risks can be reasonable mitigated if the #cryptography functions are implemented correctly. (all data out is #encrypted and all data in is #decrypted on-the-fly)

    - the key detail that makes this approach unique, is because as a #webapp, unlike other solutions, users have a choice of using any #device/#os/#browser. while a webapp can have nuanced #vulnerabilities, i think by #openSourcing and providing instructions for #selfhosting and instructions to #build for various #platforms, it can provide a reasonable level of #security.

    i think if i stick to the principle of avoiding using any kind of "required" service provider (myself included) and allowing the #frontend and the peerjs-server to be #hosted #independently, im on track for creating a #chatSystem with the "fewest moving parts". i hope you will agree this is true #p2p and i hope i can use this as a step towards true #privacy and #security. #security might be further improved by using a trusted #VPN.

    while there are several similar apps out there like mine. i think mine is distinctly a different approach. so its hard to find #bestPractices for the functionalities i want to achieve. in particular #security practices to use when using #p2p technology.

    (note: this app is an #unstable, #experiment, #proofOfConcept and not ready to replace any other app or service. It's far from finished and provided for #testing and #demo purposes only. This post is to get #feedback on the progress to determine if i'm going in the right direction for a secure chat app)

  31. id like to share some details about how my app works so you can discover/give me feedback on my app. id like to have wording in my app to say something like "most secure chat app in the world"... i probably cant do that because it doesnt qualify.

    github.com/positive-intentions

    positive-intentions.com/blog/i

    im not an expert on #cyberSecurity. im sure there are many gaps in my knowlege in this domain.

    using #javascript, i initially created a fairly basic #chatApp using using #peerjs to create #encrypted #webrtc #connections. this was then easily enhanced by exchanging additional #encryption #keys from #cryptography functions built into browsers (#webcrypto api) to add a redundent layer of encryption. a #diffieHelman key #exchange is done over #webrtc (which can be considered #secure when exchanged over public channels) to create #serverless #p2p #authentication.

    - i sometimes recieve feedback like "javascript is inherently insecure". i disagree with this and have #openedSource my #cryptography module. its basically a thin wrapper around vanilla cryptography functions of a #browser (webcrypto api).

    - another concern for my kind of app (#PWA) is that the developer may introduce malicious code. this is an important point for which i open sourced the project and give instructions for #selfhosting. selhosting this app has some unique features. unlike many other #selfhosted #projects, this app can be hosted on #githubPages (instructions are provided in the readme). im also working towards having better support for running the index.html directly without a static server.

    - to prevent things like browser extensions, the app uses strict #CSP headers to prevent #unauthorised code from running. #selfhosting users should take note of this when setting up their own instance.

    - i received feedback the #Signal/#Simplex protocol is great. completely undertsandable and agree, but wonder if im reducing the #complexity by working with #webrtc. while it has its many flaws, i think risks can be reasonable mitigated if the #cryptography functions are implemented correctly. (all data out is #encrypted and all data in is #decrypted on-the-fly)

    - the key detail that makes this approach unique, is because as a #webapp, unlike other solutions, users have a choice of using any #device/#os/#browser. while a webapp can have nuanced #vulnerabilities, i think by #openSourcing and providing instructions for #selfhosting and instructions to #build for various #platforms, it can provide a reasonable level of #security.

    i think if i stick to the principle of avoiding using any kind of "required" service provider (myself included) and allowing the #frontend and the peerjs-server to be #hosted #independently, im on track for creating a #chatSystem with the "fewest moving parts". i hope you will agree this is true #p2p and i hope i can use this as a step towards true #privacy and #security. #security might be further improved by using a trusted #VPN.

    while there are several similar apps out there like mine. i think mine is distinctly a different approach. so its hard to find #bestPractices for the functionalities i want to achieve. in particular #security practices to use when using #p2p technology.

    (note: this app is an #unstable, #experiment, #proofOfConcept and not ready to replace any other app or service. It's far from finished and provided for #testing and #demo purposes only. This post is to get #feedback on the progress to determine if i'm going in the right direction for a secure chat app)

  32. @panic #Audion (Viewer) as #AppleMusic controller is just awesome!

    There is a github repo with some basic changes need to do to make it work: github.com/zydeco/audion/tree/

    I build my self a version based on the lastest sources (gitlab.com/panicinc/audion).

    Sadly there are a few bugs. For example:
    - The scrolling song title breaks out
    - The interface settings dialog doesn’t work - it’s just a placeholder

    #mp3player #musicplayer #proofofconcept #retro #retrocomputing

  33. Palo Alto Networks released additional details about CVE-2024-3400: the fact that it is a combination of two bugs in PAN-OS; how an attacker was exploiting it; how disabling telemetry initially worked; and how they fixed it. The timeline from discovery to remediation encompasses the whole blog post. Overall a comprehensive after-action review from a company that notified the public almost immediately of an exploited zero-day. 🔗paloaltonetworks.com/blog/2024

    #CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #ProofofConcept #PANOS #IOC

  34. Zscaler observed exploitation of the Palo Alto Networks PAN-OS command injection zero-day vulnerability CVE-2024-3400 following the release of the PoC exploit code. Zscaler provides an attack flow diagram, and a technical analysis of the Upstyle backdoor and its layers. IOC provided. 🔗 zscaler.com/blogs/security-res

    #CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #ProofofConcept #threatintel #IOC

  35. TrustedSec CTO Justin Elze shared CVE-2024-3400 exploit in the wild on Twitter yesterday, reports that 149.28.194.95 was attempting to exploit CVE-2024-3400

    #CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #ProofofConcept #threatintel #IOC

  36. In case you missed it, Palo Alto Networks updated their security advisory in terms of product and mitigation guidance, exploit status, and PAN-OS fix availability: 🔗 security.paloaltonetworks.com/

    • Exploitation status: Proof of concepts for this vulnerability have been publicly disclosed by third parties.
    • Workarounds and mitigations: In earlier versions of this advisory, disabling device telemetry was listed as a secondary mitigation action. Disabling device telemetry is no longer an effective mitigation. Device telemetry does not need to be enabled for PAN-OS firewalls to be exposed to attacks related to this vulnerability.
    • Solution:
      • - 10.2.6-h3 (Released 4/16/24)
      • - 11.0.3-h10 (Released 4/16/24)
      • - 11.0.2-h4 (Released 4/16/24)
      • - 11.1.0-h3 (Released 4/16/24)

    #CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #ProofofConcept

  37. Really excited about today, when we have the kick-off meeting for the UKRI / MRC-funded "TeenSim" study in York.

    We'll be getting our heads together about technical details to extend the #ProofOfConcept #microsimulation model originally presented here:
    microsimulation.pub/articles/0

    #HRQL #MCS #Rstats

  38. A team of #researchers at the #IstitutoItalianoDiTecnologia ( #IIT - #Italian Institute of #Technology ) has #created a totally #edible & #rechargeable #battery - starting from materials that are normally consumed as part of our daily diet. The #ProofOfConcept #BatteryCell has been described in a paper, recently published in the #AdvancedMaterials journal. The possible applications are in #health diagnostics, #FoodQuality #monitoring & edible soft #robotics .

    technologynetworks.com/applied

    #NewTecg

  39. @phoe

    Note that the #PrettyPrinting dispatch tables of #CommonLisp conceptionally are a #GenericFunction with #ParametricDispatch.

    The function SET-PPRINT-DISPATCH is essentially an ADD-METHOD to the pretty printing parametric dispatch.

    (Unfortunatly, the canonical, #ProofOfConcept implementation of PP by #RichardWaters is one single convoluted mess; basically a negative example of software design, even by standards of its time.)

    🌺

    🏷️ #Lisp #Scheme #CLOS #AMOP #MetaObject #MetaObjectSystem

  40. @phoe

    Note that the #PrettyPrinting dispatch tables of #CommonLisp conceptionally are a #GenericFunction with #ParametricDispatch.

    The function SET-PPRINT-DISPATCH is essentially an ADD-METHOD to the pretty printing parametric dispatch.

    (Unfortunatly, the canonical, #ProofOfConcept implementation of PP by #RichardWaters is one single convoluted mess; basically a negative example of software design, even by standards of its time.)

    🌺

    🏷️ #Lisp #Scheme #CLOS #AMOP #MetaObject #MetaObjectSystem

  41. @phoe

    Note that the #PrettyPrinting dispatch tables of #CommonLisp conceptionally are a #GenericFunction with #ParametricDispatch.

    The function SET-PPRINT-DISPATCH is essentially an ADD-METHOD to the pretty printing parametric dispatch.

    (Unfortunatly, the canonical, #ProofOfConcept implementation of PP by #RichardWaters is one single convoluted mess; basically a negative example of software design, even by standards of its time.)

    🌺

    🏷️ #Lisp #Scheme #CLOS #AMOP #MetaObject #MetaObjectSystem