Blaze

joined 1 year ago
[–] [email protected] 4 points 1 day ago

There was a recent post on [email protected]

 

cross-posted from: https://newsie.social/users/TheConversationUS/statuses/113909551624831355

Philadelphia's $800K police drone program highlights the challenge of balancing public safety and #privacy. Criminologists explain how lessons from stop-and-frisk can guide responsible drone use in law enforcement. https://buff.ly/4anJYJ7

 

cross-posted from: https://lemmy.zip/post/30920964

With Signal on Desktop and iPad, you can link your primary Android or iOS account with another device, letting you check and respond to messages in both places or conduct video meetings and calls from the comfort of a bigger screen.

[–] [email protected] 5 points 4 days ago (3 children)

As stated at the beginning of the post, it's not mine, feel free to share your concerns on the author's Github: https://github.com/osbytes/crypt.fyi/issues !

[–] [email protected] 2 points 4 days ago

Yes, lessons learned. Just sold it back to the place I purchased it.

 

From an author:

I wanted to share crypt.fyi - a free, open-source tool I built for securely sharing sensitive data/files. It uses client-side encryption and zero-knowledge architecture.

Key features:

- Zero-knowledge architecture
- End-to-end encryption using AES-256-GCM (actively investigating post-quantum encryption options)
- Self-hostable
- Suite of configurations (password, burn after read, max read count, ip/cidr-allow list, webhooks)
- Strict rate-limiting
- Strict CSP to mitigate supply chain attacks
- Web, cli, and chrome-extension clients
- Fully open source (Github)

The problems I aimed to solve: Many people share sensitive info (passwords, keys, etc.) through email, Slack, or SMS - which often leaves plaintext copies in multiple places. Existing solutions either require accounts, aren't open source, or have security/privacy/ui/ux/feature/config gaps/limitations.

crypt.fyi is built with privacy-first principles:

- No logging of sensitive data
- No analytics or tracking
- Separation of web and api servers
- All encryption/decryption happens client-side using shared cross-platform cryptography primitives from noble cryptography
- TLS encryption for all traffic
- Encrypted data is automatically destroyed after being read with strong guarantees around once-only reads

The entire codebase is open source and available for review. I'd love to get feedback from the privacy community on how to make it even better!

 

cross-posted from: https://lemmy.world/post/24739690

Still in testing, Google Messages has made a small color tweak to the upcoming redesign of RCS read receipts that makes them bolder.

 

cross-posted from: https://lemmy.sdf.org/post/28525951

(also see https://www.androidauthority.com/kiwi-browser-shutting-down-3519510/ ) > > A while ago Mull/Mulch (and DivestOS) died, and now this.. I wonder what I'll use now.

[–] [email protected] 2 points 5 days ago (2 children)

In terms of other options, there are already

There are only so many people interested in the topic on Lemmy, and .ml is already the most active community by far.

[–] [email protected] 2 points 5 days ago (1 children)

The objective is to indeed make [email protected] grow.

In terms of other options, there are

There are only so many people interested in the topic on Lemmy, and .ml is already the most active community by far.

[–] [email protected] 8 points 5 days ago (2 children)

For people unaware, there is [email protected]

[–] [email protected] 1 points 5 days ago (1 children)

Sorry about the downvotes

[–] [email protected] 3 points 5 days ago

Shia Labeouf meme

 

[email protected] as announced in a previous post

The mod is okay with me opening this post: https://sopuli.xyz/comment/14240553

view more: next ›