Documentation for nanogram available here for awhile

Edit: Dont be a ungrateful Be nice pls. I put a lot of time, effort, and my own money into making this. I’m choosing to freely share it :)

Yes I get help from LLM’s. Review the code if you think it’s unsafe, or just move on and don’t use it. Happy to answer any technical questions.

Edit 2: Expanded source code for termux version here.

Edit 3: Expanded source for pi version here

  • hereforawhile@lemmy.mlOP
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    1 day ago
    1. You list “Activist/journalist secure communication” as a use case. Not all countries have freedom of press.

    Is that an inaccurate claim? It should provide the means to organize and communicate securely…to the extent Tor is secure, and if your using the official Tor browser, web crypto can be utilized for group and 1-1s for an additional layer of encryption. I thought it was a fine claim. It should be able to handle quite a few people messaging all at once on the PI varient.

    1. Looks like you name images based on a random uuid, so that should protect against filename attacks. But if you do have a filename you can tell whether the image has been an image or not.

    How would you ever discover a filename?

    If you did have a filename and the exact url to the image you would need to be logged in as a valid user, and the person who shared the photo would have needed to allow access to their profile.

    Even if you have the correct link, if those two conditions arnt satisfied you will not be able to view.

    Also, looks like all uploads are converted to jpg, regardless as to whether the original image was a jpg (or even an image) or not. Don’t do that.

    This was a design choice to have consistency in filetypes. What’s the downside? All browsers will support displaying a jpg.

    1. Can you point to where in code this invariant is enforced?

    Which part are you talking about? The image compression is defined as the compress and store function.

    The “API reference” in the readme goes into further specifics on how this works with flask.

    Everything except the login page, registration link will behind these two checks see (def login) where the @loginrequired logic is defined for each of the app routes.

    • SavvyWolf@pawb.social
      link
      fedilink
      English
      arrow-up
      1
      ·
      49 minutes ago

      to the extent Tor is secure

      Tor doesn’t automatically secure your app. If your social media instance has 1000 users on it, and one user gets compromised, then the other 999 users shouldn’t have any interactions outside of that user leaked.

      web crypto can be utilized for group and 1-1s for an additional layer of encryption

      Are file uploads encrypted?

      How would you ever discover a filename?

      Maybe you have a data leak. Maybe they send the filename in plaintext somewhere. Maybe they take advantage of the fact that UUIDs might be deterministic. But if I may flip the question… Why does an inaccessible post even need to return 403 anyway? It just functions as a big footgun that may cause any other exploits to behave worse.

      Even if you have the correct link, if those two conditions arnt satisfied you will not be able to view.

      But you can determine its existence or not through the status code.

      This was a design choice to have consistency in filetypes. What’s the downside? All browsers will support displaying a jpg.

      Gifs will lose any animation, pngs will lose quality. Also, as far as I can tell, there’s nothing stopping a malicious user uploading a non-image file.

      Which part are you talking about?

      There are two steps to making a post: Upload and store the image and add the post to the database. There’s also similar steps to deleting a post: Removing the image upload and removing the post from the database. Are both these operations atomic?

      Everything except the login page, registration link will behind these two checks see (def login) where the @loginrequired logic is defined for each of the app routes.

      It’s not that hard for a sufficiently motivated adversary to get an account on a sufficiently large instance. You need to ensure that one user account being compromised doesn’t result in information leakage from unrelated accounts.

      This discussion stems from issues I found in just one function. You’re making a product which requires a very high level of security. You need to understand how to write secure code, and your LLM won’t be able to do it for you.

      I don’t want to discourage you from programming in general, but making a very secure social media site is a rather complex undertaking for someone new to programming.