-
-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Do you accept suggestions of links? #1
Comments
Sure! I will check your second one 🍺 |
https://wonderfall.dev/docker-hardening |
I added all but last one. If you don't have more stuff, i would close this issue for now. |
Thanks for adding some of them! Got more suggestions :) https://research.nccgroup.com/2021/10/27/public-report-whatsapp-end-to-end-encrypted-backups-security-assessment/ a research done also on whatsapp E2EE backups https://sudneela.github.io/posts/the-workings-of-whatsapps-end-to-end-encrypted-backups/ https://www.ndss-symposium.org/ndss-paper/improving-signals-sealed-sender/ the video is well explained too. https://www.scss.tcd.ie/Doug.Leith/pubs/gboard_kamil.pdf Add https://www.hardenize.com/ , https://mxtoolbox.com/ to (How to test your eMail provider (security & privacy) ?? Also https://youtu.be/aC9Uu5BUxII (monreo) |
(An Antivirus does not improve your security) Most of these links are dead and not technical but rather opinion based, maybe in future add archive.org or arhive.ph link when referencing a tweet. |
Only first link is dead. @Zanthed @terezipyrope But yeah they’re not technical. |
https://sudneela.github.io/posts/the-workings-of-whatsapps-end-to-end-encrypted-backups https://www.ndss-symposium.org/ndss-paper/improving-signals-sealed-sender/ https://portswigger.net/daily-swig/multiple-encryption-flaws-uncovered-in-telegram-messaging-protocol https://www.cryptofails.com/post/70546720222/telegrams-cryptanalysis-contest Thanks @jermanuts #1 (comment) & #1 (comment)
I added most of it and also mentioned you again in the commits. |
Thanks, glad you liked them. |
https://www.bejarano.io/sms-phishing/ |
Added 🍺 Last link added in https://github.com/beerisgood/Smartphone_Security/blob/main/README.md |
https://tonyarcieri.com/4-fatal-flaws-in-deterministic-password-managers EDIT: do you think the last 2 links fit/related to security? Not related. |
Password manager link added. Thanks 👍 I read about Meta the other day, but since Meta itself is a problem in itself, i don't see the point of recording individual things about it. I am only active on GitHub. All other community platforms are always crap from the users or even from the moderation and i don't want that anymore |
Thanks for replying, What about #1 (comment) https://www.hardenize.com/ , https://mxtoolbox.com/ they seem to be more accurate than the ones recommended in this repo guardianproject/haven#454 (haven is broken) Mind changing the antivirus part in this repo with https://privsec.dev/knowledge/badness-enumeration/#antiviruses instead as we discussed #1 (comment) |
GrapheneOS is already listed in my Smartphone repository. Will check your newest links 👍 |
while they're nice, both doesn't provide any further information or are even bloated with too much different stuff. added other ones 🍺 |
Thanks I add both 🍻 Good luck with your collection! |
thanks I added some. |
Your Messages on Telegram Are Not Encrypted, the Platform Is Not as Private as You Think Takeout: only Secret Chat's are e2e encrypted. Everything else is cleartext. |
@CompSciFutures yes this is sadly still the case since years and I already include three links about that: |
fab :)
…On Sun, Feb 25, 2024 at 5:54 AM beerisgood ***@***.***> wrote:
@CompSciFutures <https://github.com/CompSciFutures> yes this is sadly
still the case since years and I already include three links about that:
https://portswigger.net/daily-swig/multiple-encryption-flaws-uncovered-in-telegram-messaging-protocol
https://www.cryptofails.com/post/70546720222/telegrams-cryptanalysis-contest
https://blog.bytebytego.com/p/ep29-online-gaming-protocol#§is-telegram-secure
—
Reply to this email directly, view it on GitHub
<#1 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ACGU3TMGC7JWTH6QDL423V3YVIZPBAVCNFSM54FYG5KKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOJWGI2TGOBRGI2A>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
Thanks. |
https://educatedguesswork.org/posts/public-wifi/ public wifi security (clears all FUD about public wifi VPN marketing) EDIT: Adding quantum resistance to Signal double ratchet algorithm SimpleX Chat 😎 |
This comment was marked as spam.
This comment was marked as spam.
Thanks. I added this and also another new post about VPN. |
https://words.filippo.io/dispatches/telegram-ecdh/ (THE MOST BACKDOOR-LOOKING BUG I’VE EVER SEEN) TokTok/c-toxcore#426 (https://blog.tox.chat/2023/03/redesign-of-toxs-cryptographic-handshake/) |
Thanks! I added both 🍻 |
Sorry for hijacking this issue but https://ynwarcs.github.io/Win11-24H2-CFG |
Sounds like a good thing for user. |
Thanks. Added 🍺 |
Arc Browser insecurity : https://kibty.town/blog/arc/ |
Added 🍺 |
Obvious vulnerabilities in self-proclaimed "most secure messenger" |
Thanks! |
https://wonderfall.dev/fdroid-issues/
https://cronokirby.com/posts/2021/06/e2e_in_the_browser/
The text was updated successfully, but these errors were encountered: