Building Privacy: My End-to-End Encrypted (E2EE) Chat Application 🔐 Privacy shouldn’t be an afterthought; it should be baked into the architecture. I recently finished building SecureChat, a Flask-based messaging system where the server is "blind" to your conversations. The Tech Stack: Frontend/API: Flask + Server-Sent Events (SSE) for real-time delivery. Asymmetric Encryption: RSA-2048 (OAEP) for secure key exchange. Symmetric Encryption: AES-256-GCM for message confidentiality and integrity. Server Logs: Metadata is encrypted using AES-256-CBC before being stored. How it works: Zero-Knowledge Registration: The server generates an RSA keypair, hands the private key to the user once, and keeps only the public key. Hybrid Encryption: Messages are encrypted with a random AES key. That key is then wrapped using the recipient’s RSA public key. The "Blind" Server: The server only ever sees ciphertext. Even if the database were compromised, the messages remain unreadable. I'm diving deeper into the Cryptography.hazmat library and learning a ton about secure key management. Check out the code here: https://lnkd.in/ggEvhpt8 link to the Website:https://lnkd.in/g3uu69TN 👍 #CyberSecurity #Python #Cryptography #WebDevelopment #Backend #Privacy #E2EE
Building End-to-End Encrypted Chat App with Flask and Cryptography
More Relevant Posts
-
AI adoption is moving faster than security teams can keep up. Every week, a new native desktop app lands on endpoints and half of them break your visibility without anyone noticing. ChatGPT's native macOS app is one of them. It pins TLS certificates, rejects your CA, and the moment your team adds a steering exception to "fix" it -DLP is gone. Completely blind to what's being uploaded, pasted, or shared. Dug deeper, turns out there's a way to keep full SSL inspection active without any exceptions. Check out the article below on how to get this configured. https://lnkd.in/gK5KHM3J
To view or add a comment, sign in
-
The project developer for one of the Internet’s most popular networking tools is scrapping its vulnerability reward program after being overrun by a spike in the submission of low-quality reports, much of it AI-generated slop. “We are just a small single open source project with a small number of active maintainers,” Daniel Stenberg, the founder and lead developer of the open source app cURL, said Thursday. “It is not in our power to change how all these people and their slop machines work. https://lnkd.in/gir-iG2D
To view or add a comment, sign in
-
OpenAI identifies security issue involving third-party tool, says user data was not accessed Samuel Boivin | Nurphoto | Getty Images OpenAI said on Friday it had identified a security issue involving a third-party developer tool called Axios and is taking steps to protect the process that certifies its macOS applications are legitimate OpenAI apps. The ChatGPT maker said it found no evidence that its user data was accessed, that its systems or intellectual property was compromised, or that its software was altered....
To view or add a comment, sign in
-
Most apps don’t get hacked in some Hollywood way. They get hacked because someone forgot the basics. And honestly… A scary number of founders are shipping apps right now that are one stupid mistake away from a serious problem. Here are 10 things that can get your app hacked fast: 1. API keys exposed in the frontend 2. No rate limiting on login 3. Unsafe SQL queries 4. Admin access protected only in the UI 5. Tokens stored in localStorage 6. Secrets committed to GitHub 7. Error messages exposing internals 8. Unsafe file uploads 9. Publicly exposed databases/services 10. Dependencies never audited after launch The truth? Most security failures are not sophisticated. They’re just carelessness at scale. People obsess over shipping fast. Very few ask: “Would this survive 24 hours in the real world?” If you’re building SaaS, AI tools, internal apps, client projects, or MVPs: Security is not a “later” problem. It becomes your problem the second real users touch your product. Bookmark this and audit your app before someone else does it for you. #AI #Security #Audit
To view or add a comment, sign in
-
-
The Netskope AI Index shows that Claude Code has hit 51.4% enterprise org adoption making it the #2 coding AI tool globally. (https://lnkd.in/gJm-Bhh3) With that kind of adoption, a common ask from enterprise security teams is: how do we allow Claude Code CLI for developers while blocking the Claude web chat and desktop app? In this article, I walk through exactly how to do that using Netskope's HTTP Header Policy feature leveraging the distinct User-Agent\Referer strings each Claude client sends to apply differentiated policy actions. ✅ Allow Claude Code CLI (developer API access) 🚫 Block Claude Web Chat 🚫 Block Claude Desktop App Check it out here 👇 https://lnkd.in/gB5Ykw6s
To view or add a comment, sign in
-
The hidden cost: That small oversight in your API key management could expose your app. If your Anthropic Claude API practices aren't airtight, you might be one misstep away from serious security issues. What's inside: → Proper configuration of your API key environment → Streamlining API calls with Node.js → Detecting and fixing common security leaks Discover the details: https://lnkd.in/dqh9qMhm #AIIntegration #NodeSecurity #ClaudeAPI
To view or add a comment, sign in
-
I built a chat app that works even without the Internet! EchoLAN is a peer-to-peer chat application that works entirely over a local network using TCP sockets. No central server, no Internet dependency. Just direct communication between peers on the same LAN. One practical issue I ran into early was usability. Exchanging raw IPv4 addresses isn’t ideal, especially for non-technical users. To solve this, I implemented a “magic address” system: IPv4 addresses are deterministically mapped to 3-word phrases using a 2048-word BIP39-style wordlist, and can be reversed back to the original IP. This allows users to connect using something like: → scheme dove gift instead of manually typing IPs. The app also enumerates available network interfaces and lets the user choose which one to bind to. This is useful in setups with multiple adapters (Wi-Fi, Ethernet, VPN, virtual interfaces), where automatic selection can be unreliable. Features implemented so far: • TCP socket-based peer-to-peer messaging • Image transfer over the same connection • Deterministic IP ⇄ 3-word address mapping • Network interface selection • CLI interface using JLine Tech stack: Java, Network Sockets, JLine, Maven This project was a focused exercise in understanding low-level networking, interface binding, and building a simple protocol over raw sockets without relying on external services. Source code: https://lnkd.in/gKYzqj7D
To view or add a comment, sign in
-
Sometimes you just want to bring your LLM companion right into the browser DevTools. For instance, yesterday i wanted to figure out the tech stack of a web app. The tricky part? It was behind a login. After a bit of digging, I found the excellent mcp-chrome https://lnkd.in/d5FyTxyT. Two clicks to install and configure and your LLM is already: - taking screenshots - analyzing bundles - inspecting markup And it only gets better from there. For my experiments - for example, with performance - I wanted to build a test bench for a trading app. I asked my crew of agents to handle it for me... and voilà, it was done! I believe that beyond reverse engineering, finding vulnerabilities, and spotting performance bottlenecks, there's a whole world of research and productivity use cases here. I'd love to hear about your experiences - what have you been using it for? #AI #LLM #mcp #DevTools #ChromeExtension #WebDevelopment
To view or add a comment, sign in
-
-
North Korea's UNC1069 socially engineered the lead Axios maintainer, hijacked his npm account, and pushed poisoned versions of a library with 100 million weekly downloads. OpenAI's macOS signing pipeline pulled the compromised package during a GitHub Actions workflow run, exposing the certificates used to authenticate ChatGPT Desktop, Codex, and Atlas. No confirmed exfiltration, but they rotated everything anyway. Correct call. https://lnkd.in/e3sM_eWi
To view or add a comment, sign in