home.social

#veracrypt — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #veracrypt, aggregated by home.social.

  1. @harld : het ligt wat ingewikkelder: het plaatje past niet bij de nu vrijgegeven hacktool.

    Je kunt Bitlocker zó configureren dat er bij opstarten géén wachtwoord of pincode wordt gevraagd: als ik het goed begrijp werkt de huidige tool alleen in dat geval.

    De maker claimt wel dat een bypass ook mogelijk is bij gebruik van een pin of wachtwoord, maar v.z.i.w. is dat nog niet gepubliceerd.

    P.S. Niet dat ik fan ben van Bitlocker, want daar is al heel lang controverse over.

    #Bitlocker #VeraCrypt #FDE

  2. Comento esta información para actualizala: o 10 de Abril a Microsoft devolveu ao desenvolvedor de #veracrypt o acceso ás claves necesarias para asinar os drivers e o bootloader, o que é necesario para que o cifrado completo do disco funcione en Windows.
    Así que VeraCrypt continúa a ser a mellor opción para impedir accesos non desexados ao teu portátil con Windows. Moito, moitísimo mellor que #bitlocker :
    bitnos.info/2026/03/31/por-que

  3. Как шифровать сообщения в любом мессенджере и соцсети

    В нынешних условиях многим пользователям приходится по принуждению использовать незащищённые мессенджеры и социальные сети, то есть скомпрометированные каналы связи. К счастью, есть возможность передавать секретные зашифрованные сообщения по публичным открытым каналам. Это стандартная задача, которая давно решена в криптографии. Более того, зашифрованное сообщение можно сделать похожим на обычный текст или даже скрыть в обычном контенте — видео, звуковых файлах и тексте, который не вызовет подозрений у «цензора». Это область стеганографии Но прямо сейчас людям нужен простой и практичный способ шифровать сообщения, максимально удобным способом. Рассмотрим самые простые онлайновые утилиты, которые позволяют это делать.

    habr.com/ru/companies/globalsi

    #шифрование #Paranoia_Text_Encryption #LOCKPUB #GCHQ_CyberChef #AES_Utils #GnuPG #OpenSSL #ccrypt #VeraCrypt #Cryptomator

  4. Как шифровать сообщения в любом мессенджере и соцсети

    В нынешних условиях многим пользователям приходится по принуждению использовать незащищённые мессенджеры и социальные сети, то есть скомпрометированные каналы связи. К счастью, есть возможность передавать секретные зашифрованные сообщения по публичным открытым каналам. Это стандартная задача, которая давно решена в криптографии. Более того, зашифрованное сообщение можно сделать похожим на обычный текст или даже скрыть в обычном контенте — видео, звуковых файлах и тексте, который не вызовет подозрений у «цензора». Это область стеганографии Но прямо сейчас людям нужен простой и практичный способ шифровать сообщения, максимально удобным способом. Рассмотрим самые простые онлайновые утилиты, которые позволяют это делать.

    habr.com/ru/companies/globalsi

    #шифрование #Paranoia_Text_Encryption #LOCKPUB #GCHQ_CyberChef #AES_Utils #GnuPG #OpenSSL #ccrypt #VeraCrypt #Cryptomator

  5. Как шифровать сообщения в любом мессенджере и соцсети

    В нынешних условиях многим пользователям приходится по принуждению использовать незащищённые мессенджеры и социальные сети, то есть скомпрометированные каналы связи. К счастью, есть возможность передавать секретные зашифрованные сообщения по публичным открытым каналам. Это стандартная задача, которая давно решена в криптографии. Более того, зашифрованное сообщение можно сделать похожим на обычный текст или даже скрыть в обычном контенте — видео, звуковых файлах и тексте, который не вызовет подозрений у «цензора». Это область стеганографии Но прямо сейчас людям нужен простой и практичный способ шифровать сообщения, максимально удобным способом. Рассмотрим самые простые онлайновые утилиты, которые позволяют это делать.

    habr.com/ru/companies/globalsi

    #шифрование #Paranoia_Text_Encryption #LOCKPUB #GCHQ_CyberChef #AES_Utils #GnuPG #OpenSSL #ccrypt #VeraCrypt #Cryptomator

  6. Как шифровать сообщения в любом мессенджере и соцсети

    В нынешних условиях многим пользователям приходится по принуждению использовать незащищённые мессенджеры и социальные сети, то есть скомпрометированные каналы связи. К счастью, есть возможность передавать секретные зашифрованные сообщения по публичным открытым каналам. Это стандартная задача, которая давно решена в криптографии. Более того, зашифрованное сообщение можно сделать похожим на обычный текст или даже скрыть в обычном контенте — видео, звуковых файлах и тексте, который не вызовет подозрений у «цензора». Это область стеганографии Но прямо сейчас людям нужен простой и практичный способ шифровать сообщения, максимально удобным способом. Рассмотрим самые простые онлайновые утилиты, которые позволяют это делать.

    habr.com/ru/companies/globalsi

    #шифрование #Paranoia_Text_Encryption #LOCKPUB #GCHQ_CyberChef #AES_Utils #GnuPG #OpenSSL #ccrypt #VeraCrypt #Cryptomator

  7. @heisec
    Auch #wireguard jetzt auch noch?

    Das mit #Veracrypt in Kombination damit, dass die #bitlocker Keys an #microsoft geschickt werden, klingt für mich eher nach einem Plan der #geheimdienste in Kooperation mit dem Konzern.

    Zum Glück benutze #windows nur noch auf dem Firmen-Laptop. Da kann mir die Spionage egal sein, sind nur Geschäftsgeheimnisse und je nach Abteilung und Projekt mal was für ne Bundesbehörde oder die #bundeswehr drauf. Wobei letzteres bei mir als Azubi eher weniger.

  8. Ah, #Microsoft — gatekeeper of Windows updates and, apparently, spontaneous executioner of accounts. 🔪 VeraCrypt's lifeline to updates? Swiftly terminated, because who needs #encryption when you can have #chaos instead? 😂🔐
    404media.co/microsoft-abruptly #VeraCrypt #WindowsUpdates #HackerNews #ngated

  9. #Microsoft locks account that #VeraCrypt maintainer uses to sign #Windows bootloaders with no explanation or route for appeal. If they don't fix this, in a few months every Windows computer that uses VeraCrypt whole-disk encryption will stop being able to boot and all the data on it that isn't backed up elsewhere will be lost. 🤦
    If this doesn't convince you big tech has too much control, I don't know what will.
    h/t @zackwhittaker
    techcrunch.com/2026/04/08/vera
    #infosec #privacy #TechIsShitDispatch

  10. VeraCrypt to stop developing Windows application due to Microsoft revoking their driver signing certificate:

    sourceforge.net/p/veracrypt/di

    Sorry to hear about this turn of events, but it was pretty much to be expected given the way the world is turning, and Microsoft being Microsoft.

    Switch to Linux if you can, and come give Shufflecake a try ;)

    #veracrypt #truecrypt #privacy #cryptography #plausibledeniability #shufflecake #microsof #windows #enshittification #surveillance #cypherpunk

  11. VeraCrypt to stop developing Windows application due to Microsoft revoking their driver signing certificate:

    sourceforge.net/p/veracrypt/di

    We are sorry to hear this turn of events and we wish VeraCrypt team all the best. For us, Windows was never an option.

  12. @SpaceLifeForm : a spare motherbord won't help just like that.

    The actual encryption key is stored in a TPM chip (the rescue code is used to allow the system to access to the actual encryption key).

    So even if you have a spare mobo, you'll have to transplant the TPM chip from the old to the new mobo.

    The best advice: have a backup, as recent as possible. My backups are on VeraCrypt encrypted external (USB) HDD's.

    #BitLocker #Veracrypt #FDE #FullDriveEncryption #TPM

  13. Local-Only File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The password encryption currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  14. Local-Only File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The password encryption currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  15. Local-Only File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The password encryption currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  16. Local-Only File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The password encryption currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  17. Local-Only File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The password encryption currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  18. We are going to present Shufflecake and give some news and updates at a small upcoming event in Ticino, Switzerland, organized by the local CCC South Alps club: hny.indyfac.ch/schedule#shuffl

    Come to say hi!

  19. Microsoft gave FBI a set of BitLocker encryption keys to unlock suspects’ laptops

    techcrunch.com/2026/01/23/micr

    Because, of course, by default, BitLocker recovery keys are uploaded to Microsoft’s cloud, and it looks like you need to pay for the privilege of having the Pro edition if you want to have the option of opting out.

    Reject this BS. Use proper disk encryption! Or, even better, if you care about plausible deniability, use Shufflecake! shufflecake.net/

    #shufflecake #truecrypt #veracrypt #microsoft #bitlocker #luks #security #privacy #fbi #surveillance

  20. 💥🍾🎆 Happy New Year 2026 From Shufflecake - 2025 in Review 🎆🍾💥

    2025 was a good year for our little project!

    We focused mostly on improving the performance and correctness of Shufflecake Lite, and the results are *impressive*! We reached, and in some test case *exceeded* the I/O throughput of dm-crypt, which is the *golden standard* for encrypted filesystems on Linux!

    (continue)

  21. @shufflecake Elia and I have bee quite under the water recently, but we've been quietly working to this new release - mostly Elia, TBH :)

    In addition to the long due test units and dev guide, we worked a lot on FLUSH and FUA requests for block device I/O. We got SCARY performances, very close and at times beyond dm-crypt in fio tests!

    I think it is safe to say that performances won't be our priority from now on (at least for the Lite scheme), and we can keep focusing on new features and the roadmap to our Holy Grail: a fully hidden Linux OS!

    #shufflecake #crypto #cryptography #privacy #veracrypt #plausibledeniability #linux #cypherpunk

  22. 💥 ❤️ 📣 NEW RELEASE 📣 ❤️ 💥 v0.5.6 brings a TON of good news! First of all, it's *blazing fast*: we implemented better handling of I/O requests, and now we have performances that in many scenarios *exceed* those of bare dm-crypt/LUKS! We also added a proper test suite and a developer guide, and we fixed a bunch of bugs, in particular restoring full crash consistency for the Lite scheme!

  23. Linux Mint – VeraCrypt

    Die Installation von VeraCrypt als Systempaket über die Anwendungsverwaltung war problemlos. Auch das einhängen einer externen verschlüsselten Festplatte machte keine Probleme. Das Problem: Ich habe VeraCrypt als Root-User bzw. als User mit Sudo-Rechten installiert und gestartet. Jetzt, als "normaler" User, funktionierte Veracrypt nicht mehr. Grrrrr.

    Fehlermeldu

    web-as.com/linux-mint-veracryp

    #LinuxMint #linux #Mint #su #VeraCrypt #visudo

  24. Selhosted P2P E2EE File Transfer & Messaging PWA

    positive-intentions.com

    * #OpenSource
    * #CrossPlatform
    * #PWA
    * #iOS, #Android, #Desktop (self compile)
    * App store, Play store (coming soon)
    * Desktop
    * #Windows, #MacOS, #Linux (self compile)
    * run `index.html` on any modern #browser
    * #Decentralized
    * #Secure
    * #NoCookies
    * #P2P #encrypted
    * No registration
    * No installing
    * #Messaging
    * Group Messaging (coming soon)
    * Text Messaging
    * #Multimedia Messaging
    * #Screensharing (on desktop browsers)
    * Offline Messaging (in #research phase)
    * #FileTransfer
    * #VideoCalls
    * #DataOwnership
    * #SelfHosted
    * GitHub pages Hosting
    * #LocalOnly storage

    Check them out!

    (Degoogled links to the apps)
    - P2P Chat: chat.positive-intentions.com
    - P2P File: file.positive-intentions.com
    - Encrypted drive storage: dim.positive-intentions.com/?p

    - GitHub: github.com/positive-intentions

    IMPORTANT NOTES (PLEASE READ!):
    * These are NOT products. It's for #testing and #demonstration purposes only.
    * They have NOT been reviewed or audited. Do NOT use for sensitive data.
    * All functionality demonstrated is experimental.
    * This is NOT meant to replace robust solutions like #VeraCrypt, #Simplexchat, #Signal, #Whatsapp, #wetransfer. It's just a #proofofconcept to show what's possible with #browser #APIs.

  25. File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  26. File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  27. File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  28. File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  29. We stumbled onto an interesting HackerNews submission about Graphene OS, the secure AOSP mobile OS. The topic is about the request for a GOS duress password feature that, instead of wiping the device (as it does now), unlocks a "decoy" user profile. A comment by a user claiming to be an official GOS community mod caught our attention. We would like to respond to the arguments of that user. [continue...]

  30. Selhosted P2P E2EE File Transfer & Messaging PWA

    positive-intentions.com

    * #OpenSource
    * #CrossPlatform
    * #PWA
    * #iOS, #Android, #Desktop (self compile)
    * App store, Play store (coming soon)
    * Desktop
    * #Windows, #MacOS, #Linux (self compile)
    * run `index.html` on any modern #browser
    * #Decentralized
    * #Secure
    * #NoCookies
    * #P2P #encrypted
    * No registration
    * No installing
    * #Messaging
    * Group Messaging (coming soon)
    * Text Messaging
    * #Multimedia Messaging
    * #Screensharing (on desktop browsers)
    * Offline Messaging (in #research phase)
    * #FileTransfer
    * #VideoCalls
    * #DataOwnership
    * #SelfHosted
    * GitHub pages Hosting
    * #LocalOnly storage

    Check them out!

    (Degoogled links to the apps)
    - P2P Chat: chat.positive-intentions.com
    - P2P File: file.positive-intentions.com
    - Encrypted drive storage: dim.positive-intentions.com/?p

    - GitHub: github.com/positive-intentions

    IMPORTANT NOTES (PLEASE READ!):
    * These are NOT products. It's for #testing and #demonstration purposes only.
    * They have NOT been reviewed or audited. Do NOT use for sensitive data.
    * All functionality demonstrated is experimental.
    * This is NOT meant to replace robust solutions like #VeraCrypt, #Simplexchat, #Signal, #Whatsapp, #wetransfer. It's just a #proofofconcept to show what's possible with #browser #APIs.

    (Boosts appreciated)

  31. File encryption with a browser.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    Hook Code: github.com/positive-intentions

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  32. File encryption with a browser.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    Hook Code: github.com/positive-intentions

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  33. File encryption with a browser.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    Hook Code: github.com/positive-intentions

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  34. File encryption with a browser.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    Hook Code: github.com/positive-intentions

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  35. File encryption with a browser.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    Hook Code: github.com/positive-intentions

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  36. I gave a talk on #shufflecake at the #oscw (open source cryptography workshop) in #sofia #bulgaria. Many thanks to Cindy Lin, Ioana Nedelcu, Elizaveta Tretiakova (#google) and Anna Weine (#mozilla) for organizing. #privacy #truecrypt #veracrypt #horizenlabs #zkverify