Install shadowsocks-libev server with simple-obfs on Raspberrypi

Introduction Shadowsocks-libev is a lightweight secured SOCKS5 proxy for embedded devices and low-end boxes. Shadowsocks-libev can run on OpenWRT routers, raspberrypi. Simple-obfs is a simple obfuscating tool, designed as plugin server of shadowsocks. It can pretend your shadowsocks traffic as http traffic and not recognized by firewall. This article show how to install Shadowsocks-libev and Simple-obfs on raspberrypi buster. It should also apply to all Debian Linux running on Buster.

End to End Encrypted Cloud Storage Apps

Introduction With end to end encrypted cloud storage, file is encrypted before upload to cloud service provider. Only you hold the key to decrypt your files, even service provider can not decrypt your files. Note: Due to natural of end to end encryption, if you lost your key, there is no way to recover and you can not decrypt your encrypted files. Hint: If the end to end encryption service provide provide a way to restore your password, that means the service provider store your encryption key somewhere, to avoid data leak avoid those service providers.

End to End Encrypted Mail Services/Apps

Introduction Email encryption makes sure that your private emails can only be read by yourself and the intended recipient. With end to end encryption, All emails are encrypted before sending and stored in encrypted format. Even email provider cannot decrypt and read your emails. Recommended Services/Apps App Country Free Premium Open Source GDPR-compliant Clients Two Factor Ad Tutanota Germany 1GB 1GB. €12/year with custom domains, 5 alias. Yes Yes Web, Android, iOS Yes No ProtonMail Switzerland 500MB 5GB.

A Comparison of End to End Encrypted Messaging Apps

What is End to End Encrypted Messaging Apps End-to-end encrypted messaging apps are a category of communication platforms that employ advanced encryption techniques to ensure the privacy and security of messages exchanged between users. Unlike traditional messaging services, where messages might be stored and processed on the service provider’s servers, end-to-end encryption ensures that only the sender and intended recipient can access the content of the messages. In this system, messages are encrypted on the sender’s device and remain encrypted as they traverse the communication channel until they are decrypted on the recipient’s device.

End to End Encrypted Note Apps

Free end to end encrypted notes apps. Standard Notes Standard Notes is a free, open-source, and completely encrypted notes app. It has Web, Mac, Windows and Linux desktop app, Android, iOS app. 100% Private. AES-256 encryption. Your notes are encrypted and secured so only you can decrypt them. No one but you can read your notes. Markdown format. Free Features AES-256 encryption. No one but you can read your notes. Easy to use, open-source apps on Mac, Windows, iOS, Android, and Linux Automatic sync with no limit on data capacity Unlimited devices Web access Offline access Joplin Joplin is a free, open source note taking and to-do application, which can handle a large number of notes organised into notebooks.

VPN

VPN (Virtual Private Network) is a connection between two computers or other endpoints in which packets sent over a shared network, for example, the Internet, are automatically encrypted and decrypted by the endpoints. Although the packets are carried on a shared network, their contents are protected from unauthorized access between the endpoints. Virtual private networks are commonly used to connect branch offices to a headquarters when the cost of a physically separate communications link cannot be justified, or to allow workers to access their company network across the Internet when they are not on the premises.

Nostr protocol in a single page

NIPs NIPs stand for Nostr Implementation Possibilities. They exist to document what may be implemented by Nostr -compatible relay and client software. List Event Kinds Message Types Client to Relay Relay to Client Common Tags Criteria for acceptance of NIPs Is this repository a centralizing factor? How this repository works License List NIP-01: Basic protocol flow description NIP-02: Follow List NIP-03: OpenTimestamps Attestations for Events NIP-04: Encrypted Direct Message — unrecommended: deprecated in favor of NIP-17 NIP-05: Mapping Nostr keys to DNS-based internet identifiers NIP-06: Basic key derivation from mnemonic seed phrase NIP-07: window.