165 Followers
40 Following
194 Posts
Creating decentralized P2P technology. Aiming to provide industry-grade cryptographic capabilities encapsulated into a webapp.
Websitehttps://positive-intentions.com
GitHubhttps://github.com/positive-intentions
Enkrypted Chathttps://Enkrypted.Chat

React-Like JSX Syntax for Webcomponents

TLDR: I’ve been #experimenting with react-like jsx-syntax with webcomponents to see if I could theoretically replace #React in one of my larger #software projects. It is not ready for production use, but rather a #Research exploration into #CustomElements and #ModernJS performance.

The goal was to build #FunctionalWebComponents that handle #StateManagement and #DOM updates without the overhead of a massive #JavaScript framework. By leveraging #StandardWebAPIs and #Proxy objects, I’ve managed to create a #Reactive programming model that feels familiar but stays closer to the #Platform.

Check out the full #TechnicalTutorial and #DeepDive here: https://positive-intentions.com/docs/research/Tutorials/dim/dim-functional-webcomponents

(Disclosure: this project may be getting deprecated. Sharing this because it might still be interesting or educational.)

#WebDevelopment #Frontend #BuildTheWeb #NoFramework #JS #JSX #WebStandards #Coding #ResearchAndDevelopment #VanillaJS #SoftwareEngineering #TechBlog #WebDevCommunity

WhatsApp Clone... But Decentralized and P2P Encrypted Without Install or Signup.

Features include:
* P2P
* End to end encryption
* forward secrecy
* Multimedia
* Open source
* No registration
* No installation
* Encrypted storage
* TURN server

The project is far from finished and presented for testing, feedback and demo purposes (USE RESPONSIBLY!).

https://positive-intentions.com

#Privacy #OpenSource #P2P #WebRTC #Decentralization #DigitalSovereignty #CyberSecurity #FOSS #SelfHosted #NoCloud #AntiCorp #Encryption #WebDev #TechLiberty #PrivateMessaging #Networking #DataPrivacy #InternetFreedom #LocalFirst #SoftwareEngineering #WebApps #ZeroKnowledge #PrivacyTech #IndieDev #NoSignup #NoInstall #DecentralizedWeb #SecureMessaging #BrowserApp #TechEthics

@fasnix

An understandable concern. The app runs on a browser, but the aim is for it to not rely on the internet for the static functionally. It's better demonstrated on the open source version where you can run index.html in a browser without a static server (making it portable). Check the readme for more details.

https://github.com/positive-intentions/chat

The https://Encrypted.Chat app (as seen on the landing page) is currently close-source and far from finished.

That's right that if you open it in a different browser, it'll be a different identity. I'm working towards that not being an issues by moving towards using the filesystem API, but that's further from finished.

@kubikpixel

Thanks for the interest in my app. I'd like to make it clear a lot of my work is still in development and not ready to replace any other app or service. The app is working as described in the docs,but that doesn't make it production-ready. You can reach out for clarity on any details, but at this early stage in development, there will be breaking changes as I introduce improvements... so use cautiously.

Ultimately the app is presented for testing and demo purposes as I work towards something that is production-ready(, which is not the case at the moment!)

GitHub - positive-intentions/chat: Decentralized chat

Decentralized chat. Contribute to positive-intentions/chat development by creating an account on GitHub.

GitHub

TLDR: I’ve implemented #QuantumResistant #Encryption into my #P2P messaging #webapp using #MLKEM (#Kyber) to protect against future #QuantumComputing threats. Read my latest #Blog post to see how I’m securing #DataPrivacy today.

My journey into #PostQuantum #Security
I’ve been working hard on my latest project update, focusing on how we can protect our #Privacy from the looming threat of "harvest now, decrypt later" attacks. I just finished writing a technical deep dive into how I’ve implemented #QuantumResistant #Cryptography into my #P2P messaging platform.

The core of my approach involves using #MLKEM (formerly #Kyber) to ensure long-term #DataSecurity. I’m particularly proud of the #CascadingEncryption layer I’ve built; by combining #NIST standards with the #SignalProtocol, I'm ensuring that your #Communications remain #Secure even if a single algorithm is compromised in the future.

If you are into #OpenSource, #InfoSec, or #Decentralized #Tech, I’d love for you to read about my implementation and the challenges of bringing #QuantumResistance to the #Browser using #JavaScript.

Read my write-up here:
https://positive-intentions.com/blog/quantum-resistant-encryption

Demo: https://cryptography.positive-intentions.com/?path=/story/cascading-cipher-ml-kem-demo--mlkem-standalone

Crash course in ML-KEM: https://positive-intentions.com/blog/ml-kem-beginner-tutorial

I'm excited to hear what the #Developer and #CyberSecurity community thinks about this #PrivacyFirst milestone!

Introducing Quantum-Resistant Encryption in JavaScript | positive-intentions

We're excited to announce that our P2P messaging application now supports quantum-resistant encryption using ML-KEM (CRYSTALS-Kyber), a NIST-standardized post-quantum key encapsulation mechanism. This addition brings quantum-resistant security to our cascading cipher system, providing protection against future quantum computing attacks.

positive-intentions

@wrenix

I'm trying it out. While I have a basic version of it, there is much to consider. Group messaging isn't working well in the app. 3 people in a group can be a struggle in a P2P system... I basically sent the messages to all the participants.

MLS is good for group messages at a scale and I think I'm a while from being able to demonstrate that.

MLS key updates per epoch are not great on a P2P system where people can be offline.

@rootkitty

Webrtc doesn't work well on the tor network. (UDP isnt supported)

As an alternative, I'm investigating on having peers use different turn servers relay messages to provide an extra layer of IP masking.

@khleedril

i havent considered those compile targets. i supose it could be done. is there not something already out there? my version is created specifically for the browser environment.

i think it would be better to start off with the official version and take it from there.

https://github.com/signalapp/libsignal

GitHub - signalapp/libsignal: Home to the Signal Protocol as well as other cryptographic primitives which make Signal possible.

Home to the Signal Protocol as well as other cryptographic primitives which make Signal possible. - signalapp/libsignal

GitHub

@khleedril

fraid so. i would prefer to avoid it, but it seemed nessesary. i had an older version of it that was using the js primitives from the browser, but the issue there was that crypto primitives were not always provided by the browsers and different browsers have their only roadmap for supporting it.

so rust to wasm was a reliable way to get the crypto primitives needed. that was how it was done on several other projects including the official signal one.

Signal Protocol for a P2P Webapp

TL;DR: I have open-sourced a #Rust implementation of the #SignalProtocol that compiles to #WASM for #Browser-based #P2P messaging, overcoming the #NodeJS limitations of the official library.

I am sharing my implementation of the Signal Protocol designed specifically for the #Frontend. While the official libsignal is the gold standard, its #JavaScript targets are often optimized for Node.js, which creates integration challenges for client-side web applications.

My version is built in #RustLang and compiles to #WebAssembly, utilizing #ModuleFederation to provide robust #Encryption for decentralized environments. It currently powers the end-to-end security for my #P2P messaging project.

Protocol Demo:
https://signal.positive-intentions.com/

P2P App Demo:
https://p2p.positive-intentions.com/iframe.html?globals=&id=demo-p2p-messaging--p-2-p-messaging&viewMode=story

I am looking for feedback from the #Dev and #Infosec community. If you have experience with #Cryptography audits or formal-proof verification, I would appreciate your eyes on the codebase as I work toward a more finished state.

GitHub Repository:
https://github.com/positive-intentions/signal-protocol

#Signal #SignalProtocol #Rust #RustLang #WASM #WebAssembly #OpenSource #OSS #Privacy #Encryption #E2EE #WebDev #Frontend #BrowserTech #Decentralized #WebApps #Coding #Security #SoftwareEngineering #Networking #PeerToPeer #P2P #Cryptography #Audit #CyberSecurity #Tech #JavaScript #Programming #ModuleFederation #P2PWeb #PrivacyTech #SecureMessaging #WebPerf #TechCommunity #InfoSec #WebSecurity

Local-Only File Encryption with JavaScript.

I've been exploring the #WebCryptoAPI and I'm impressed!

When combined with the #FileSystemAPI, it offers a seemingly secure way to #encrypt and #store files directly on your device. Think #localstorage, but with #encryption!

I know #webapps can have #security vulnerabilities since the code is served over the web, so I've #OpenSourced my demo! You can check it out, and it should even work if #selfhosted on #GitHubPages.

Live Demo: https://dim.positive-intentions.com/?path=/story/usefs--encrypted-demo

Demo Code: https://github.com/positive-intentions/dim/blob/staging/src/stories/05-Hooks-useFS.stories.js

About the Dim framework:
https://positive-intentions.com/docs/category/dim

IMPORTANT NOTES (PLEASE READ!):
* This is NOT a product. It's for #testing and #demonstration purposes only.
* It has NOT been reviewed or audited. Do NOT use for sensitive data.
* The password encryption currently uses a hardcoded password. This is for demonstration, not security.
* This is NOT meant to replace robust solutions like #VeraCrypt. It's just a #proofofconcept to show what's possible with #browser #APIs.

#Encryption #Cryptography #JavaScript #Frontend #Privacy #Security #WebDevelopment #Coding #Developer #Tech #FOSS #OpenSource #GitHub #MastodonDev #Programming #WebStandards #FileSystem #WebAPI #ProofOfConcept

@storybook/core - Storybook