Ward

joined 1 year ago
[–] Ward@lemmy.nz 2 points 1 week ago

yea considering its FOSS it was good enough compared to a lot of the other clients for me to move away from Symfonium

 

Materialious now can be used as a Desktop or Android application. Allowing it to be used for any Invidious instance!

https://github.com/Materialious/Materialious/tree/main?tab=readme-ov-file

[–] Ward@lemmy.nz 0 points 5 months ago (1 children)

Material design 3 was released in 2021, so I'd call that somewhat modern and is the latest release of Material design. Unlike Apple's design language Material design is also meant for the web.

There is already a Invidious interface for Apple devices, but ofc isn't a web interface like Materialious.

https://github.com/yattee/yattee

 

For the last month I've been working on a modern, material you interface for Invidious.

Github (Leave a star if you want)

Hosted instance

Features

  • Sponsorblock built-in.
  • Return YouTube dislikes built-in.
  • Video progress tracking & resuming.
  • No ads.
  • No tracking.
  • Light/Dark themes.
  • Custom colour themes.
  • Integrates with Invidious subscriptions, watch history & more.
  • Live stream support.
  • Dash support.
  • Chapters.
  • Audio only mode.
  • Playlists.
  • PWA support.

 

For the last month I've been working on a modern, material you interface for Invidious.

Github (Leave a star if you want)

Hosted instance

Features

  • Sponsorblock built-in.
  • Return YouTube dislikes built-in.
  • Video progress tracking & resuming.
  • No ads.
  • No tracking.
  • Light/Dark themes.
  • Custom colour themes.
  • Integrates with Invidious subscriptions, watch history & more.
  • Live stream support.
  • Dash support.
  • Chapters.
  • Audio only mode.
  • Playlists.
  • PWA support.

 

For the last month I've been working on a modern, material you interface for Invidious.

Github (Leave a star if you want)

Hosted instance

Features

  • Sponsorblock built-in.
  • Return YouTube dislikes built-in.
  • Video progress tracking & resuming.
  • No ads.
  • No tracking.
  • Light/Dark themes.
  • Custom colour themes.
  • Integrates with Invidious subscriptions, watch history & more.
  • Live stream support.
  • Dash support.
  • Chapters.
  • Audio only mode.
  • Playlists.
  • PWA support.

 

With simple messager selling out & qksms no longer being actively worked on. What's our options for open source sms messagers?

Should I dedicate time to learning flutter and building my own or does anyone know any cool foss projects working on this issue?

0
submitted 11 months ago* (last edited 11 months ago) by Ward@lemmy.nz to c/privacyguides@lemmy.one
 

Github: https://github.com/WardPearce/Purplix.io

View our canary: https://purplix.io/c/purplix.io/3ZjhTlZRWv8iqa6sn9yJ3TRiIkVbwITOOlwLjJD36jQ

What is Purplix Canary?

Purplix Canary is a free & open source warrant canary tool what helps you to build trust with your users.

It allows you to inform users cryptographically if your site has been compromised, seized or raided by anyone.

How does it work?

Site verification

Purplix uses DNS records to verify the domain the canary is for, giving your users confidence they are trusting the right people.

Canary signatures

Each domain is associated with a unique key pair. The private key is generated locally and securely stored within the owner's keychain. When a user visits a canary from a specific domain for the first time, their private key is used to sign the public key. This signed version of the public key is then automatically employed for subsequent visits, effectively mitigating man-in-the-middle attacks and ensuring the trustworthiness of canary statements from the respective domain.

Files

Canaries can include signed documents to help users further understand a situation.

Notifications

Users are automatically notified on the event of a new statement being published.

[–] Ward@lemmy.nz 0 points 1 year ago (2 children)

Worthwhile plugging Obtainium what is helpful for pulling prebuilt apks off Git

https://github.com/ImranR98/Obtainium

[–] Ward@lemmy.nz 0 points 1 year ago* (last edited 1 year ago) (1 children)

Not sure if this is entirely true, it is possible Proton mail is encrypting everything at rest (with the users public key) and only following PGP mail limitations during transit.

Like for example plaintext emails are encrypted at rest on Proton mail, what isn't ideally (compared to e2ee) but still minimizes the attack surface.

Actually for reference this is exactly the case

Message storage All messages in your Proton Mail mailbox are stored with zero-access encryption. This means we cannot read any of your messages or hand them over to third parties. This includes messages sent to you by non-Proton Mail users, although keep in mind if an email is sent to you from Gmail, Gmail likely retains a copy of that message as well. Password-protected Emails are also stored end-to-end encrypted. Subject lines and recipient/sender email addresses are encrypted but not end-to-end encrypted.

https://proton.me/support/proton-mail-encryption-explained