WardPearce

Open source developer & privacy advocate.

  • 8 Posts
  • 32 Comments
Joined 1Y ago
cake
Cake day: Jun 07, 2023

help-circle
rss

It requires the Invidious instance to have the correct COR values for Materialious, but yes connects to a existing instance.


Materialious does currently just use Invidious’ API. If extending it requires a custom backend it will be a completely different project (what will still be using Invidious)


Isn’t just a theme, is a completely different application built on top of Invidious’ API. What works completely differently to Invidious’ current UI. A LOT of things are handled different then how Invidious handles it on their frontend. Replacing Invidious current interface with Materialious isn’t a good idea, because its quite a bit bigger & requires JS compared to Invidious’ current UI.

Calling Materialious a theme would be like calling clipious a theme.


I believe loading videos directly works, but discover/trending doesn’t to my understanding.


Yea just need to avoid it from being bloated. The idea would be to have a global feed, what you can filter by platform.


Yea, Materialious is a bit more complex then a theme as it has a lot of custom client side logic (Like sync parties, playlists, etc).

If I expanded Materialious you’d still be able to use just Invidious or Safetwitch etc.

But Materialious at its core would still be built off the API of giants. So it wouldn’t be reinventing the wheel for scrapping/handling data from twitch, YouTube etc.

Haven’t used Proxitok in a while, so not sure if its working currently. Seems to be in active development tho. Misspoken, doesn’t appear to be working & hasn’t been updated in awhile


Expanding Materialious to other platforms
Hello, I'm the developer behind Materialious. Perhaps you came across my post a few weeks back regarding the launch of my Material design frontend for Invidious. I'm reaching out to gauge interest in expanding Materialious to serve as a unified interface for TikTok (Via Proxitok), Twitch (Via SafeTwitch), YouTube (Via Invidious), and potentially even search (Via SearxNG). I'd love to hear your ideas and thoughts on this!
fedilink

Material design 3 was released in 2021, so I’d call that somewhat modern and is the latest release of Material design. Unlike Apple’s design language Material design is also meant for the web.

There is already a Invidious interface for Apple devices, but ofc isn’t a web interface like Materialious.

https://github.com/yattee/yattee



For the last month I've been working on a modern, material you interface for Invidious. [Github](https://github.com/WardPearce/Materialious) (Leave a star if you want) [Hosted instance](https://materialio.us/) # Features - Sponsorblock built-in. - Return YouTube dislikes built-in. - Video progress tracking & resuming. - No ads. - No tracking. - Light/Dark themes. - Custom colour themes. - Integrates with Invidious subscriptions, watch history & more. - Live stream support. - Dash support. - Chapters. - Audio only mode. - Playlists. - PWA support. ![](https://lemmy.nz/pictrs/image/c99bf0b7-38b2-41e9-83d2-311ba32e8468.png) ![](https://lemmy.nz/pictrs/image/9dd388d5-2578-4154-9090-9ff81a2e47fe.png) ![](https://lemmy.nz/pictrs/image/3ace1327-8e02-4e2d-8f1d-912795634435.png) ![](https://lemmy.nz/pictrs/image/2ef8c0c8-1d93-4144-9521-187280b04b7c.png) ![](https://lemmy.nz/pictrs/image/0938f72e-2088-41b9-9e0f-091165dc91e9.png) ![](https://lemmy.nz/pictrs/image/17e23825-5c4f-4d9f-af13-0ffe1c3e971e.png)
fedilink

does Partisan-SMS function as a basic sms messager without encryption?


The state of open source SMS messagers
With simple messager selling out & qksms no longer being actively worked on. What's our options for open source sms messagers? Should I dedicate time to learning flutter and building my own or does anyone know any cool foss projects working on this issue?
fedilink

Basically think of it as a SDK for defining data deletion on a platform. Omitme handles all the annoying stuff like account storage, building a CLI/GUI & sessions.

The core of Omitme is Seleniumwire used to grab login session tokens for platforms & HTTPX for making requests with those session tokens. Then you simply define you data deletion “targets” and the API calls to delete such data.


Currently it delays if discord issues a rate limit.


Thought I'd share a little side project I've been working on. Omitme is a open-source, free CLI tool (& work-in-progress GUI) for managing your data on platforms like Discord & Reddit. It's built to be expandable & generic making it easy for Omitme to work on any platform. Learn more on our [Github](https://github.com/WardPearce/omitme)
fedilink

Also to note, that Purplix does warn users to assume the site has been compromised if the latest statement has expired.


Agreed, should have an alart for missed canaries. Each canary has “statements” you publish new statements to update ur canary. This provides a signed record of passed canaries.

Browser extension or even mobile app could be another aspect of further securing validation. Currently we do store a offline backup for each public key in idb storage & a signed copy if you have a account for further validation if the URL hash has been tampered with.

Thank you for your kind words ❤️❤️


Github: https://github.com/WardPearce/Purplix.io View our canary: https://purplix.io/c/purplix.io/3ZjhTlZRWv8iqa6sn9yJ3TRiIkVbwITOOlwLjJD36jQ ## What is Purplix Canary? Purplix Canary is a free & open source warrant canary tool what helps you to build trust with your users. It allows you to inform users cryptographically if your site has been compromised, seized or raided by anyone. ### How does it work? #### Site verification Purplix uses DNS records to verify the domain the canary is for, giving your users confidence they are trusting the right people. #### Canary signatures Each domain is associated with a unique key pair. The private key is generated locally and securely stored within the owner's keychain. When a user visits a canary from a specific domain for the first time, their private key is used to sign the public key. This signed version of the public key is then automatically employed for subsequent visits, effectively mitigating man-in-the-middle attacks and ensuring the trustworthiness of canary statements from the respective domain. #### Files Canaries can include signed documents to help users further understand a situation. #### Notifications Users are automatically notified on the event of a new statement being published. ![](https://lemmy.nz/pictrs/image/dcf1257b-b26c-4526-8586-e64cdd80e87e.png) ![](https://lemmy.nz/pictrs/image/dd1ce480-90ab-46cb-bc66-cf0167dcff83.png) ![](https://lemmy.nz/pictrs/image/c0162d33-83c7-4824-ab1c-fbf57972887d.png)
fedilink

I’d love to be covered in your blog, feel free to add me on Matrix if you have any questions.

https://matrix.to/#/@wardpearce:matrix.org


Had some services not auto starting correctly, should be fixed


Currently we aren’t taking donations, till we have some sort of transparency system in place.

Thanks for expressing your interest in a blog, could be interested.


has been a old and off project for a few months. Would call it niche in terms of people who care about e2ee tools, but in general how insecure surveys are shouldn’t be as common place as it is.


Visit our site: https://purplix.io Support us on Github: https://github.com/WardPearce/Purplix.io ## What is Purplix Survey? Purplix Survey is a free & open source survey tool what can't read your questions & answers. With traditional surveys you are one data breach, one rouge employee or one government warrant away from all your user's data being exposed. Purplix uses modern encryption techniques to keep your user's data away from any actors. ### How does it work? #### Questions, Descriptions & Title encryption When you create a survey, we encrypt your title, descriptions & questions with a secret key. This key is then stored encrypted in your keychain. When you share your survey with others using a link, the key is stored in the link for your participants. This ensures that your survey questions can only be read by your participants. #### Answers encryption Every survey has its own unique key pair. The private key is securely stored in your keychain, while the public key is used by users to encrypt their answers. Only you have the means to decrypt the answers once they are submitted. When you share a survey, we include a hash of the public key in the URL to prevent main-in-the-middle attacks. #### Preventing spam & multiple submissions Survey creators can opt-in to use VPN blocking, requiring a Purplix account or IP blocking. IP blocking works by storing a hash of the IP salted with a key not stored by Purplix, minimizing the attack surface of tracking submission locations, these IP hashes are only stored for 7 days or until the survey closes. Users will always be informed when any of these features are enabled. Fill out a survey! https://purplix.io/s/651e32f0ab4897a99d28ea0e/CCpu5Nd8guMbuEw-jIEv10l6ICSvdCr84AtRYf9fPWk#905wt-r_OcvYfhQKhdS2Cjc1HXm7Vw6W_sm--9GkaOw ![](https://lemmy.nz/pictrs/image/446ad955-7e66-4723-9fb4-8a9ff56f5895.png)---- ![](https://lemmy.nz/pictrs/image/9f020332-dc06-4a57-981a-0038f21f6b88.png)
fedilink

I’m pro XMR, but how is Fediverse anything to do with Crypto.


Sheeesshh, you know when Public lewdness supports your project you know its good! Thanks for the kind words, have a great day.


Purplix now supports per Survey & per Canary themes.


Don’t know the complete inner workings of Cryptpad. But it appears Purplix uses more modern encryption, uses more modern frameworks & has more safe guards against MITM attacks. Also additional options like captcha, proxy block, account required etc.


Purplix is planning to launch with multiple choice, single choice, short answer and long answer. After launch we’ll be adding additional answer types.


Not 100% sure what you mean, but the encryption key for questions are only known by users who are shared the link & is never transmitted to the server. Answers are encrypted by the survey’s public key what only the creator of said survey knows the private key. The public key is also encrypted by the secret key in the URL so the server can’t even submit answers.

Here is a example URL of a survey.

example.com/s/64b185662c74e7c40cac5e66/KfcrkxiR-4nomGbEqNos0dyhEBsgiUAqPpZiRQt5syE#oAnQnjWhxq2IFTZBvrylVSHxg92HoWQr2mJQ-qZwvPY

  • s/64b185662c74e7c40cac5e66 - This is the survey ID, transmitted to server.
  • /KfcrkxiR-4nomGbEqNos0dyhEBsgiUAqPpZiRQt5syE - This is a hash of the survey’s signing public key, this is to stop MITM attacks from the host & validation of the survey questions.
  • #oAnQnjWhxq2IFTZBvrylVSHxg92HoWQr2mJQ-qZwvPY - This is the secret key for decrypting questions, this is also used to decrypt the public key for encrypting answers. This key is never transmitted to server.

All encryption & decryption happens locally, so the server never sees any plain text. It is possible for the host to modify the frontend to expose keys, but this is true of any web app & Purplix is hosted from Vercel straight from our Git repo, so it would be quite obvious if this happened.


No not currently, not comfort taking funding for any of my projects right now, until I establish some sort of expensive breakdown and transparent fund use. But even with funding a decent audit from a company who knows what they are doing would probably be 7k USD minimum.

I do have a personal fund for hosting, what is used for Paaster. https://github.com/sponsors/WardPearce


Yea I’d love to have Paaster audited, currently I don’t think its likely I’d get enough funding to do so as auditing is expensive.


Encrypted at rest doesn’t always mean E2EE. For example if data is transmitted in plain text to the server and then encrypted before storage. This is still encrypted at rest.


No, survey questions and answers are encrypted & decrypted locally. At no point does the server or any other actors can view that plain data said from whom the survey is intended for.


E2EE meaning survey questions and answers are encrypted locally & decrypted locally. The server or any other actors can’t view survey questions aside from users its shared with and survey answers are only readable by the owner of such survey.

This means on a data leak, nothing is readable.

Yea Purplix.io is still in development, so it isn’t live yet. Hense the fail DNS lookup you show.


Thought people might be interested in seeing a project I've almost completed. Purplix.io is a open source end-to-end encrypted survey system & warrant canary manger / viewer. Would love some feedback or to answer any questions anyone has! (Ignore the Nav not expanding to the bottom on some of the screenshots, thats just due to the screen shotting tool i use for full page screenshots.) ![](https://lemmy.nz/pictrs/image/e4beae46-3b08-4480-8037-3c243ca51bd2.png) ![](https://lemmy.nz/pictrs/image/f99f1898-bf7d-43cf-aa3d-a2a760041168.png) ![](https://lemmy.nz/pictrs/image/bc37fad3-30e5-49e7-9dd9-aaf72437c81d.png) ![](https://lemmy.nz/pictrs/image/47d8db2c-bf5b-4d0a-8e90-0c8eafffde16.png) ![](https://lemmy.nz/pictrs/image/05c4fa2e-68dd-4339-97ba-4af8a81c8149.png) ![](https://lemmy.nz/pictrs/image/981f4888-c508-4342-8f27-46fa1a79e868.png)
fedilink

Your legal name & website pattern is not a secure password.


Using a KDF for stateless passwords is a interesting concept. It isn’t prefect tho. What if you want multiple passwords for one site, lack of any 2FA, KDF has to be somewhat fast (bcrypt or scrypt what takes under a second) & once your master password gets leaked your screwed (compared to cloud stored passwords with 2FA, key rotation etc)

Realistically stateless password managers suffer from the same attacks cloud based ones do, MITM attacks. If the client is open to being tampered with, your keys can always get leaked.


Fundamentally F-Droids design and infrastructure is outdated (admitted by F-Droid developers too.) F-Droids security scanning may be faster but also less robust then Google in terms of detection of harmful apps.