home.social

#webcryptoapi — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #webcryptoapi, aggregated by home.social.

  1. Local-Only File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The password encryption currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  2. Local-Only File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The password encryption currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  3. Local-Only File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The password encryption currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  4. Local-Only File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The password encryption currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  5. Local-Only File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The password encryption currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  6. Send files privately. No cloud. No trace.

    glitr.io

    I’m working towards something for #secure / #private / #simple #P2P #filetransfer. It isnt as “simple” as it could be, im still working on it, but ive got it down to:

    Zero-installation as a #PWA

    Zero-registration by using local-only storage

    #P2P-authentication using #WebCryptoAPI

    Fast #datatransfer using #WebRTC, #syncthing, #croc, #sphynctershare and countless others. the key difference in my approach is that its a #webapp thats ready to go without any "real" setup process. you just need a browser.

    I’m aware there are things like #SFTP and several other established protocols and tools. I started doing this because I was learning about #WebRTC and it seems suprisingly capable. This isnt ready to replace any existing apps or services.

    (Note: I know you guys are typically interested in #opensource code. this project is a spin-off from a bigger project: github.com/positive-intentions)

    Let me know what you think about the app, features and experience you would expect from a tool like this.

    ---

    SUPER IMPORTANT NOTES TO PREVENT MISLEADING:

    These projects are not ready to replace any existing apps or services.

    These projects are not peer-reviewed or security audited.

    The chat-app is #opensource for transparency (as linked above)... but the file-app is not open souce at all (especially spicy when not reviewed or audited.).

    All projects behind positive-intentions are provided for testing and demo purposes only.

  7. File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  8. File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  9. File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  10. File Encryption with JavaScript.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    About the Dim framework:
    positive-intentions.com/docs/c

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  11. File encryption with a browser.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    Hook Code: github.com/positive-intentions

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  12. File encryption with a browser.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    Hook Code: github.com/positive-intentions

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  13. File encryption with a browser.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    Hook Code: github.com/positive-intentions

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  14. File encryption with a browser.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    Hook Code: github.com/positive-intentions

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  15. File encryption with a browser.

    I've been exploring the #WebCryptoAPI and I'm impressed!

    When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

    I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

    Live Demo: dim.positive-intentions.com/?p

    Demo Code: github.com/positive-intentions

    Hook Code: github.com/positive-intentions

    IMPORTANT NOTES (PLEASE READ!):
    * This is NOT a product. It's for #testing and #demonstration purposes only.
    * It has NOT been reviewed or audited. Do NOT use for sensitive data.
    * The "password encryption" currently uses a hardcoded password. This is for demonstration, not security.
    * This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

    #Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

  16. Send files privately. No cloud. No trace.

    glitr.io

    I’m working towards something for #secure / #private / #simple #P2P #filetransfer. It isnt as “simple” as it could be, im still working on it, but ive got it down to:

    Zero-installation as a #PWA

    Zero-registration by using local-only storage

    #P2P-authentication using #WebCryptoAPI

    Fast #datatransfer using #WebRTC

    It’s far from finished, but i think ive got it “usable” enough to ask for feedback on it.

    When comparing this project to things like #wormhole, #onionshare, #localsend, #syncthing, #croc, #sphynctershare and countless others. the key difference in my approach is that its a #webapp thats ready to go without any "real" setup process. you just need a browser.

    I’m aware there are things like #SFTP and several other established protocols and tools. I started doing this because I was learning about #WebRTC and it seems suprisingly capable. This isnt ready to replace any existing apps or services.

    (Note: I know you guys are typically interested in #opensource code. this project is a spin-off from a bigger project: github.com/positive-intentions)

    Let me know what you think about the app, features and experience you would expect from a tool like this.

    ---

    SUPER IMPORTANT NOTES TO PREVENT MISLEADING:

    These projects are not ready to replace any existing apps or services.

    These projects are not peer-reviewed or security audited.

    The chat-app is #opensource for transparency (as linked above)... but the file-app is not open souce at all (especially spicy when not reviewed or audited.).

    All projects behind positive-intentions are provided for testing and demo purposes only.

  17. Native support for ed25519/x25519 in the browser would be a huge step forward for in-browser/client-side cryptography.

    Looks like Google is holding up our ability to use it in production.

    (Firefox and Safari both have support enabled by default.)

    caniuse.com/mdn-api_subtlecryp

    #ed25519 #x25519 #cryptography #browsers #web #mozilla #apple #google #firefox #safari #chrome #privacy #security #WebCryptoAPI