Discussion
Loading...

#Tag

Log in
  • About
  • Code of conduct
  • Privacy
  • Users
  • Instances
  • About Bonfire
Tuta
Tuta
@Tutanota@mastodon.social  ยท  activity timestamp last week

New Year, new digital life: it's time to #deGoogle! ๐ŸŽ‰ โค๏ธ

Gift your friends a Tuta Mail gift card & help them take the first step toward privacy, security & independence. ๐Ÿ”’โœจ

Available in your Tuta Settings: just click the ๐ŸŽ symbol to the left.

Big list of deGoogle alternatives
Big list of deGoogle alternatives
Big list of deGoogle alternatives
Have you
started deGoogling
Your Life?

Let us know your favorite Google alternatives in the comments!
Have you started deGoogling Your Life? Let us know your favorite Google alternatives in the comments!
Have you started deGoogling Your Life? Let us know your favorite Google alternatives in the comments!
๐ŸŒฑ๐Ÿดโ€๐Ÿ…ฐ๏ธ๐Ÿณ๏ธโ€โšง๏ธ๐Ÿง๐Ÿ“Ž Ambiyelp
๐ŸŒฑ๐Ÿดโ€๐Ÿ…ฐ๏ธ๐Ÿณ๏ธโ€โšง๏ธ๐Ÿง๐Ÿ“Ž Ambiyelp
@ambiguous_yelp@veganism.social replied  ยท  activity timestamp last week

@Tutanota I've mentioned this before but SimpleX is more private secure and anonymous that signal threema and session.

SimpleX is decentralised meaning taking down a single group of servers or org wouldnt destroy the simplex network, people can run completely anonymous simplex servers over tor, this puts simplex ahead of Signal and Threema

SimpleX has quantum resistant encryption which puts it ahead of Threema and Session, the UK military[1] and NATO[2] both consider quantum computers to be a threat now because of store now decrypt later attacks

SimpleX has no user identifiers not even random strings, its essentially like having a "burner phone for every contact". Two or more compromised contacts could corroborate your messages by linking them to your signal username or your session id, but with simplex your contacts can't prove your identity even between eachother. This fact puts SimpleX above Signal Threema and Session

These technical details about the simplex protocol can all be found on the project website including the whitepaper[3]

[1]
https://www.ncsc.gov.uk/whitepaper/preparing-for-quantum-safe-cryptography

[2]
https://www.nato.int/docu/review/articles/2021/06/03/quantum-technologies-in-defence-security/index.html

[3]
http://isdb4l77sjqoy2qq7ipum6x3at6hyn3jmxfx4zdhc72ufbmuq4ilwkqd.onion/

#SimpleX #Threema #Signal #Session #PSA #Privacy #Security #Anonymity #NATO #UnitedKingdom #Tor #QuantumResistantEncryption

Preparing for Quantum-Safe Cryptography

An NCSC whitepaper about mitigating the threat to cryptography from development in Quantum Computing.
  • Copy link
  • Flag this comment
  • Block
Tuta
Tuta
@Tutanota@mastodon.social  ยท  activity timestamp last month

๐Ÿšจ 3.5 billion users: Entire WhatsApp directory publicly accessible

Source: https://www.theregister.com/2025/11/19/whatsapp_enumeration_flaw/

Here are our best #WhatsApp alternatives: https://tuta.com/blog/best-whatsapp-alternatives-privacy

Conclusion: Choose #Signal

ฤžร–Kรœ๐Ÿ‘ป๐Ÿ‘ปโ„ข
ฤžร–Kรœ๐Ÿ‘ป๐Ÿ‘ปโ„ข
@GOKUSHRM@mastodon.social replied  ยท  activity timestamp last month

@Tutanota #molly #session are best alternative of waatapp ๐Ÿ˜

  • Copy link
  • Flag this comment
  • Block
devSJR :python: :rstats: boosted
F-Droid
F-Droid
@fdroidorg@floss.social  ยท  activity timestamp 2 months ago

This week in #FDroid (TWIF) is brought to you by SSSE3:

* Polish app guide? Fennec has great translations
* #ArcaneChat #DeltaChat w/ better onboarding
* #Kotatsu stopped development
* #Luanti #Minetest now on #OpenCollective
* #Notesnook caught up
* Anoher big #OSMAnd release
* #Session Messenger vs screenshots
* Repomaker at #DroidCon #Kampala
+ 15 new apps
& 197 updates
- 2 archived

And we have yet to unleash all its power: https://f-droid.org/2025/11/13/twif.html

  • Copy link
  • Flag this post
  • Block
F-Droid
F-Droid
@fdroidorg@floss.social  ยท  activity timestamp 2 months ago

This week in #FDroid (TWIF) is brought to you by SSSE3:

* Polish app guide? Fennec has great translations
* #ArcaneChat #DeltaChat w/ better onboarding
* #Kotatsu stopped development
* #Luanti #Minetest now on #OpenCollective
* #Notesnook caught up
* Anoher big #OSMAnd release
* #Session Messenger vs screenshots
* Repomaker at #DroidCon #Kampala
+ 15 new apps
& 197 updates
- 2 archived

And we have yet to unleash all its power: https://f-droid.org/2025/11/13/twif.html

  • Copy link
  • Flag this post
  • Block
Electronic Frontier Foundation
Electronic Frontier Foundation
@eff@mastodon.social  ยท  activity timestamp 2 months ago

There's a more secure alternative to texting via your phone's native messaging app. Signal is a free app that employs end-to-end encryption and we have a step-by-step guide to help you learn how to use it. https://ssd.eff.org/module/how-to-use-signal

How to: Use Signal

Download location: Google Play Store, Apple App Store System requirements: Android 5 or later, iOS 13 or later Version used in this guide: Android: 7.38.6 iPhone: 7.5.1 License: GPLv3 Level: Beginner Time required: 15-20 minutes Other reading: https://signal.org/ https://support.signal.org/ https://signal.org/blog/ Table of Contents Download and Install Signal Register and Verify...
Demy
Demy
@DemyOhr@mastodon.social replied  ยท  activity timestamp 2 months ago

@eff #Signal is not secure!

1
It supports #surveillance
https://www.counterpunch.org/2025/03/07/the-revolution-will-not-be-signaled/

2
#SignalApp is #Trump friendly
https://therecord.media/signal-no-longer-cooperating-with-ukraine

3
It collects your #Metadata like #WhatsApp
https://primal.net/e/note14hf9d3fkkhrsygkyzz8snuwyukckd4yqx0cq62z35cwp53a20a8suw457j

4
Everyone can spy you
https://heise.de/-10515774

#UnPlugTrump & #DeleteSignal

Check:

https://SecureMessagingApps.com

rate
๐ŸŸฉ=3
๐ŸŸจ=1
๐ŸŸฅ=0

=

86 #Threema = Winner

81 #SimpleXChat
80 #Signal
77 #Session
68 #Wire
56 #Element / #Matrix
37 #Apple #iMessage
32 #WhatsApp
27 #Telegram
26 #FB Messenger

Security

What WhatsApp and Signal reveal, despite encryption

Signal is famous for good end-to-end encryption, WhatsApp is following suit. At DEFCON, two Austrians show what the messengers reveal nonetheless.

Signal no longer cooperating with Ukraine on Russian cyberthreats, official says

The encrypted messaging app Signal has stopped responding to requests from Ukrainian law enforcement regarding Russian cyberthreats, a Ukrainian official claimed, warning that the shift is aiding Moscowโ€™s intelligence efforts.
  • Copy link
  • Flag this comment
  • Block
Stefano Marinelli boosted
vermaden
vermaden
@vermaden@mastodon.bsd.cafe  ยท  activity timestamp 2 months ago

Added ๐—จ๐—ฃ๐——๐—”๐—ง๐—˜ ๐Ÿฎ [UPDATE 2] to ๐—™๐—ฟ๐—ฒ๐—ฒ๐—•๐—ฆ๐—— ๐——๐—ฒ๐˜€๐—ธ๐˜๐—ผ๐—ฝ - ๐—ฃ๐—ฎ๐—ฟ๐˜ ๐Ÿฎ๐Ÿณ - ๐—–๐—ผ๐—ป๐—ณ๐—ถ๐—ด๐˜‚๐—ฟ๐—ฎ๐˜๐—ถ๐—ผ๐—ป - ๐—ก๐—ฒ๐˜๐—ณ๐—น๐—ถ๐˜… ๐—ฆ๐—ถ๐—ด๐—ป๐—ฎ๐—น ๐—ง๐—ฒ๐—น๐—ฒ๐—ด๐—ฟ๐—ฎ๐—บ [FreeBSD Desktop - Part 27 - Configuration - Netflix Signal Telegram] article.

https://vermaden.wordpress.com/2021/09/06/freebsd-desktop-part-27-configuration-netflix-signal-telegram#more

#verblog #session #deltachat #pidgin #freebsd #desktop #laptop @feld

๐šŸ๐šŽ๐š›๐š–๐šŠ๐š๐šŽ๐š—

FreeBSD Desktop โ€“ Part 27 โ€“ Configuration โ€“ Netflix Signal Telegram

In this article you will learn how to use Netflix (also other streaming services that require Widevine DRM) and Signal/Telegram on FreeBSD desktop. You may want to check other articles in the FreeBโ€ฆ
Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
  • Copy link
  • Flag this post
  • Block
vermaden
vermaden
@vermaden@mastodon.bsd.cafe  ยท  activity timestamp 2 months ago

Added ๐—จ๐—ฃ๐——๐—”๐—ง๐—˜ ๐Ÿฎ [UPDATE 2] to ๐—™๐—ฟ๐—ฒ๐—ฒ๐—•๐—ฆ๐—— ๐——๐—ฒ๐˜€๐—ธ๐˜๐—ผ๐—ฝ - ๐—ฃ๐—ฎ๐—ฟ๐˜ ๐Ÿฎ๐Ÿณ - ๐—–๐—ผ๐—ป๐—ณ๐—ถ๐—ด๐˜‚๐—ฟ๐—ฎ๐˜๐—ถ๐—ผ๐—ป - ๐—ก๐—ฒ๐˜๐—ณ๐—น๐—ถ๐˜… ๐—ฆ๐—ถ๐—ด๐—ป๐—ฎ๐—น ๐—ง๐—ฒ๐—น๐—ฒ๐—ด๐—ฟ๐—ฎ๐—บ [FreeBSD Desktop - Part 27 - Configuration - Netflix Signal Telegram] article.

https://vermaden.wordpress.com/2021/09/06/freebsd-desktop-part-27-configuration-netflix-signal-telegram#more

#verblog #session #deltachat #pidgin #freebsd #desktop #laptop @feld

๐šŸ๐šŽ๐š›๐š–๐šŠ๐š๐šŽ๐š—

FreeBSD Desktop โ€“ Part 27 โ€“ Configuration โ€“ Netflix Signal Telegram

In this article you will learn how to use Netflix (also other streaming services that require Widevine DRM) and Signal/Telegram on FreeBSD desktop. You may want to check other articles in the FreeBโ€ฆ
Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
  • Copy link
  • Flag this post
  • Block
Felix Palmen :freebsd: :c64:
Felix Palmen :freebsd: :c64:
@zirias@mastodon.bsd.cafe  ยท  activity timestamp 7 months ago

First step towards implementing #JWT in #swad done, just committed a good 1000 LOC and now my #poser lib can do #JSON ๐Ÿ˜Ž
https://github.com/Zirias/poser/commit/7f1772e85c869d544f8a12099ed6545e163dc163

Felix Palmen :freebsd: :c64:
Felix Palmen :freebsd: :c64:
@zirias@mastodon.bsd.cafe replied  ยท  activity timestamp 7 months ago

Doing some first experiments, here's how a #JWT for #swad might look like, containing a custom property that has the "auth info" that's currently stored in the server-side #session ... ๐Ÿค”

Now add a JOSE header, base64-encode and sign that beast...

Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
  • Copy link
  • Flag this comment
  • Block
ThePfromtheO
ThePfromtheO
@ThePfromtheO@social.vivaldi.net  ยท  activity timestamp 7 months ago

@Tutanota
๐–ด๐—‰ ๐—๐—ˆ ๐–ฝ๐—ˆ๐—๐—‡, ๐—…๐–พ๐–ฟ๐— ๐—๐—ˆ ๐—‹๐—‚๐—€๐—๐—:
#DeepL; #VivaldiWebmail #Calendar; #Brave_Search/ #DuckDuckGo_Search; #ProtonPass; #Session; #VivaldiBrowser; #OnlyOffice; #Aurora_Store/ #FDroid; #e_OS (๐™ฃ๐™ค๐™ฉ ๐™ฎ๐™š๐™ฉ); #Ente_Photo; #Logseq; #Heliboard; #ProtonMail/ #VivaldiWebmail/ #TutaMail; #MiroTalk_SFU; #Ente_Auth; #ProtonDrive/ #filen_io; #LibreTube; #OsmAnd

  • Copy link
  • Flag this post
  • Block
Felix Palmen :freebsd: :c64:
Felix Palmen :freebsd: :c64:
@zirias@mastodon.bsd.cafe  ยท  activity timestamp 8 months ago

I now decided I'll at least aim for some middle grounds: Rework #swad so it only needs a (server-side) #session once a user is #authenticated!

This does have some implications, e.g. passing a redirect argument to the authentication endpoint won't work any more. But experimentation shows a workaround would be to use an "internal redirect" to the login endpoint in #nginx.

We'll see where I end up. Having sessions only for authenticated users should reduce the need for server-side RAM significantly, so I hope ๐Ÿ˜‰

  • Copy link
  • Flag this post
  • Block
Felix Palmen :freebsd: :c64:
Felix Palmen :freebsd: :c64:
@zirias@mastodon.bsd.cafe  ยท  activity timestamp 9 months ago

More #poser improvements:

* Use arc4random() if available, avoids excessive syscalls just to get high-quality random data
* Add a "resolver" to do #reverse#DNS lookups in a batch, remove the reverse lookup stuff from the connection which was often useless anyways, when a short-lived connection was deleted before resolving could finish ๐Ÿ™ˆ

As a result, #swad can now reliably log requests with reverse lookups enabled ๐Ÿฅณ

#C #coding

syslog excerpt of swad's request logging with resolving remote hosts enabled
syslog excerpt of swad's request logging with resolving remote hosts enabled
syslog excerpt of swad's request logging with resolving remote hosts enabled
Felix Palmen :freebsd: :c64:
Felix Palmen :freebsd: :c64:
@zirias@mastodon.bsd.cafe replied  ยท  activity timestamp 9 months ago

About the #random thingie ... I need random data in #swad to generate unpredictable #session IDs.

I previously had an implementation trying the #Linux-originating #getrandom if available, with a fallback to a stupid internal #xorshift#PRNG, which could be disabled because it's obviously NOT cryptographically secure, and WAS disabled for the generation of session IDs.

Then I learned #arc4random is available on many systems nowadays (#FreeBSD, #NetBSD, even Linux with a recent-enough glibc), so I decided to add a compile check for it and replace the whole mess with nothing but an arc4random call IF it is available.

arc4random originates from #OpenBSD and provides the only sane way to get cryptographically secure random data. It automatically and transparently (re-)seeds from OS entropy sources, but uses an internal CSPRNG most of the time (nowadays typically #ChaCha20, so it's a misnomer, but hey ...). It never fails, it never blocks. It just works. Awesome.

  • Copy link
  • Flag this comment
  • Block

bonfire.cafe

A space for Bonfire maintainers and contributors to communicate

bonfire.cafe: About ยท Code of conduct ยท Privacy ยท Users ยท Instances
Bonfire social ยท 1.0.1-alpha.41 no JS en
Automatic federation enabled
Log in
  • Explore
  • About
  • Members
  • Code of Conduct