Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Privacy
  3. I want to make it dead-easy for others to chat with me. I want a browser-based, FLOSSS, E2EE chat solution that doesn't require the other party to log in. Does that exist?

I want to make it dead-easy for others to chat with me. I want a browser-based, FLOSSS, E2EE chat solution that doesn't require the other party to log in. Does that exist?

Scheduled Pinned Locked Moved Privacy
privacy
41 Posts 18 Posters 92 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S [email protected]

    Here's my problem: every F(L)OSS and E2EE solution that I know of requires other people to download an app or log in.

    I want to reduce the friction for others to communicate for me. I want to give a business card with a URL where people can go and immediately send messages to my Matrix or my email or something, and they don't need to log in at all.

    They just open their browser, go to snek_boi.io or whatever and a chat appears.

    A couple of years ago, I was suggested Cactus Comments. I suppose that works, but I was wondering if there are other solutions. I was wondering if now there was an even easier solution for my purposes.

    miss_demeanour@lemmy.dbzer0.comM This user is from outside of this forum
    miss_demeanour@lemmy.dbzer0.comM This user is from outside of this forum
    [email protected]
    wrote on last edited by
    #5

    https://chat-e2ee-2.azurewebsites.net/

    S 1 Reply Last reply
    0
    • S [email protected]

      Here's my problem: every F(L)OSS and E2EE solution that I know of requires other people to download an app or log in.

      I want to reduce the friction for others to communicate for me. I want to give a business card with a URL where people can go and immediately send messages to my Matrix or my email or something, and they don't need to log in at all.

      They just open their browser, go to snek_boi.io or whatever and a chat appears.

      A couple of years ago, I was suggested Cactus Comments. I suppose that works, but I was wondering if there are other solutions. I was wondering if now there was an even easier solution for my purposes.

      pudutr0n@feddit.clP This user is from outside of this forum
      pudutr0n@feddit.clP This user is from outside of this forum
      [email protected]
      wrote on last edited by
      #6

      Idk how to help you, snek boi.

      S 1 Reply Last reply
      0
      • S [email protected]

        Here's my problem: every F(L)OSS and E2EE solution that I know of requires other people to download an app or log in.

        I want to reduce the friction for others to communicate for me. I want to give a business card with a URL where people can go and immediately send messages to my Matrix or my email or something, and they don't need to log in at all.

        They just open their browser, go to snek_boi.io or whatever and a chat appears.

        A couple of years ago, I was suggested Cactus Comments. I suppose that works, but I was wondering if there are other solutions. I was wondering if now there was an even easier solution for my purposes.

        povoq@slrpnk.netP This user is from outside of this forum
        povoq@slrpnk.netP This user is from outside of this forum
        [email protected]
        wrote on last edited by
        #7

        e2ee is not really compatible with what you want due to necessary key management, and once you drop that there are so many possible options for what you want that I don't want to list them all here.

        M 1 Reply Last reply
        0
        • povoq@slrpnk.netP [email protected]

          e2ee is not really compatible with what you want due to necessary key management, and once you drop that there are so many possible options for what you want that I don't want to list them all here.

          M This user is from outside of this forum
          M This user is from outside of this forum
          [email protected]
          wrote on last edited by
          #8

          Can you expand more on the key management? I thought https://chat-e2ee-2.azurewebsites.net/ passes a PSK Through the header and sets that as a cookie in the browser to sign further comms. I could be mistaken of course.

          povoq@slrpnk.netP 1 Reply Last reply
          0
          • stinky@redlemmy.comS [email protected]

            it's so easy to chat with you!

            hi

            I'm nicole, but you can call me the fediverse chick

            S This user is from outside of this forum
            S This user is from outside of this forum
            [email protected]
            wrote on last edited by
            #9

            Oh no. What have I done?

            1 Reply Last reply
            0
            • miss_demeanour@lemmy.dbzer0.comM [email protected]

              https://chat-e2ee-2.azurewebsites.net/

              S This user is from outside of this forum
              S This user is from outside of this forum
              [email protected]
              wrote on last edited by
              #10

              This ticks all the boxes! Thanks! I suppose something I didn't contemplate is that I would like to close the chat and still be able to get notifications on my phone. I don't want to always have a dozen chats open, ready for the other party to send me a message. Regardless, I'm glad this project exists!

              1 Reply Last reply
              0
              • j4k3@lemmy.worldJ [email protected]

                The Graphene OS homepage has a Matrix chat page configured like this that automatically generates a guest user

                S This user is from outside of this forum
                S This user is from outside of this forum
                [email protected]
                wrote on last edited by
                #11

                This sounds amazing. It's unfortunate that Graphene OS has so much toxicity around it, but this design decision is amazing. Love it.

                I tried quickly looking for the feature, but I couldn't find it. I searched for "Graphene OS Matrix chat homepage guest user", "Graphene OS chat homepage guest user", "Graphene OS chat homepage", and "Graphene OS homepage QR" but didn't find what you mentioned.

                A M O 3 Replies Last reply
                0
                • stinky@redlemmy.comS [email protected]

                  it's so easy to chat with you!

                  hi

                  I'm nicole, but you can call me the fediverse chick

                  lyra_lycan@lemmy.blahaj.zoneL This user is from outside of this forum
                  lyra_lycan@lemmy.blahaj.zoneL This user is from outside of this forum
                  [email protected]
                  wrote on last edited by
                  #12

                  Even better that only the first line was visible until I scrolled

                  1 Reply Last reply
                  0
                  • S [email protected]

                    This sounds amazing. It's unfortunate that Graphene OS has so much toxicity around it, but this design decision is amazing. Love it.

                    I tried quickly looking for the feature, but I couldn't find it. I searched for "Graphene OS Matrix chat homepage guest user", "Graphene OS chat homepage guest user", "Graphene OS chat homepage", and "Graphene OS homepage QR" but didn't find what you mentioned.

                    A This user is from outside of this forum
                    A This user is from outside of this forum
                    [email protected]
                    wrote on last edited by
                    #13

                    Toxicity? How so?

                    S 1 Reply Last reply
                    0
                    • M [email protected]

                      Can you expand more on the key management? I thought https://chat-e2ee-2.azurewebsites.net/ passes a PSK Through the header and sets that as a cookie in the browser to sign further comms. I could be mistaken of course.

                      povoq@slrpnk.netP This user is from outside of this forum
                      povoq@slrpnk.netP This user is from outside of this forum
                      [email protected]
                      wrote on last edited by
                      #14

                      Yes you can juryrig something like that with cookies, but it is highly fragile and browser based e2ee is basically a scam anyways as the server serving the website can always swap out the javascript that decrypts the messages.

                      M 1 Reply Last reply
                      0
                      • A [email protected]

                        Toxicity? How so?

                        S This user is from outside of this forum
                        S This user is from outside of this forum
                        [email protected]
                        wrote on last edited by
                        #15

                        https://www.reddit.com/r/degoogle/comments/v5n1yv/whats_your_opinion_on_graphene_os_community/

                        https://news.ycombinator.com/item?id=30929526

                        A quick search lead to these links. They're 3 years old. Maybe the community has changed since then.

                        M 1 Reply Last reply
                        0
                        • povoq@slrpnk.netP [email protected]

                          Yes you can juryrig something like that with cookies, but it is highly fragile and browser based e2ee is basically a scam anyways as the server serving the website can always swap out the javascript that decrypts the messages.

                          M This user is from outside of this forum
                          M This user is from outside of this forum
                          [email protected]
                          wrote on last edited by
                          #16

                          Fragility is by design as it's ephemeral comms. Swapping the js decryption doesn't make sense as wouldn't the client just fail or refuse the message stream as the decrypt/encrypt changed? It's an interesting problem. Thanks for giving me something to noodle on.

                          povoq@slrpnk.netP 1 Reply Last reply
                          0
                          • S [email protected]

                            https://www.reddit.com/r/degoogle/comments/v5n1yv/whats_your_opinion_on_graphene_os_community/

                            https://news.ycombinator.com/item?id=30929526

                            A quick search lead to these links. They're 3 years old. Maybe the community has changed since then.

                            M This user is from outside of this forum
                            M This user is from outside of this forum
                            [email protected]
                            wrote on last edited by
                            #17

                            It has. Strangely enough they posted a code of conduct after that feedback and started weilding the ban hammer. However I cannot speak to outside forums like XDA or Reddit or even comms here. I tend to stick to their forums or github

                            https://discuss.grapheneos.org/t/general

                            https://github.com/GrapheneOS/os-issue-tracker/issues

                            S 1 Reply Last reply
                            0
                            • M [email protected]

                              Fragility is by design as it's ephemeral comms. Swapping the js decryption doesn't make sense as wouldn't the client just fail or refuse the message stream as the decrypt/encrypt changed? It's an interesting problem. Thanks for giving me something to noodle on.

                              povoq@slrpnk.netP This user is from outside of this forum
                              povoq@slrpnk.netP This user is from outside of this forum
                              [email protected]
                              wrote on last edited by
                              #18

                              The server can swap to a modified JS that exfiltrates the e2ee key and thus allows the server owner to decrypt the messages, or in more advanced encryption schemes add additional keys without you knowing and achieve the same thing.

                              M 1 Reply Last reply
                              0
                              • povoq@slrpnk.netP [email protected]

                                The server can swap to a modified JS that exfiltrates the e2ee key and thus allows the server owner to decrypt the messages, or in more advanced encryption schemes add additional keys without you knowing and achieve the same thing.

                                M This user is from outside of this forum
                                M This user is from outside of this forum
                                [email protected]
                                wrote on last edited by
                                #19

                                https://medium.com/sessionstack-blog/how-javascript-works-cryptography-how-to-deal-with-man-in-the-middle-mitm-attacks-bf8fc6be546c

                                I still don't see how

                                swap to a modified JS that exfiltrates the e2ee key

                                or

                                add additional keys

                                Wouldn't significantly change the recieved hash and break the stream thus ending comms. Also unless you're hosting and building it yourself you have to trust the recipient and the cloud host.

                                I agree if an attacker owns the server comms can be compromised. I thought that was the benefit of the ephemeral nature. It's for quick relay of information. Best practices would probably include another cypher within the messages themselves like a one time pad or some such.

                                https://www.itstactical.com/intellicom/tradecraft/uncrackable-diy-pencil-and-paper-encryption/

                                https://github.com/muke1908/chat-e2ee

                                G 1 Reply Last reply
                                0
                                • S [email protected]

                                  This sounds amazing. It's unfortunate that Graphene OS has so much toxicity around it, but this design decision is amazing. Love it.

                                  I tried quickly looking for the feature, but I couldn't find it. I searched for "Graphene OS Matrix chat homepage guest user", "Graphene OS chat homepage guest user", "Graphene OS chat homepage", and "Graphene OS homepage QR" but didn't find what you mentioned.

                                  M This user is from outside of this forum
                                  M This user is from outside of this forum
                                  [email protected]
                                  wrote on last edited by
                                  #20

                                  That matters? Why does developer behavior influence your judgement over whether you will use certain pieces of software? Just curious

                                  S 1 Reply Last reply
                                  0
                                  • M [email protected]

                                    https://medium.com/sessionstack-blog/how-javascript-works-cryptography-how-to-deal-with-man-in-the-middle-mitm-attacks-bf8fc6be546c

                                    I still don't see how

                                    swap to a modified JS that exfiltrates the e2ee key

                                    or

                                    add additional keys

                                    Wouldn't significantly change the recieved hash and break the stream thus ending comms. Also unless you're hosting and building it yourself you have to trust the recipient and the cloud host.

                                    I agree if an attacker owns the server comms can be compromised. I thought that was the benefit of the ephemeral nature. It's for quick relay of information. Best practices would probably include another cypher within the messages themselves like a one time pad or some such.

                                    https://www.itstactical.com/intellicom/tradecraft/uncrackable-diy-pencil-and-paper-encryption/

                                    https://github.com/muke1908/chat-e2ee

                                    G This user is from outside of this forum
                                    G This user is from outside of this forum
                                    [email protected]
                                    wrote on last edited by
                                    #21

                                    i'm trying to understand your exact scenario.

                                    but in general, the problem is where do you get your original key, or original hash to verify from? if they are both coming from the server, along with the code which processes them, then if the server is compromised, so are you.

                                    thankfully browsers give alot of crypto API lately (as discussed in your link) so your byo code payload could be alot smaller these days.

                                    but you still need at minimum a secure key & a hash and trusted code to verify the code the server serves you. there are ofc solutions to this problem, but if the server is unstrusted, you absolutely can't get it from them, which means you have to get it from somewhere else (that you trust).

                                    M 1 Reply Last reply
                                    0
                                    • G [email protected]

                                      i'm trying to understand your exact scenario.

                                      but in general, the problem is where do you get your original key, or original hash to verify from? if they are both coming from the server, along with the code which processes them, then if the server is compromised, so are you.

                                      thankfully browsers give alot of crypto API lately (as discussed in your link) so your byo code payload could be alot smaller these days.

                                      but you still need at minimum a secure key & a hash and trusted code to verify the code the server serves you. there are ofc solutions to this problem, but if the server is unstrusted, you absolutely can't get it from them, which means you have to get it from somewhere else (that you trust).

                                      M This user is from outside of this forum
                                      M This user is from outside of this forum
                                      [email protected]
                                      wrote on last edited by
                                      #22

                                      I don't know yet. It's more a thought experiment than anything else.

                                      https://github.com/muke1908/chat-e2ee

                                      Looks like the URL is part of the seed and salt which is cool.

                                      Proving who you are is done in another stream. Like MFA.

                                      You do a one time pad, generate the URL with that. Communicate what's needed, then the URL dies.

                                      I'm still noodling with it.

                                      G 1 Reply Last reply
                                      0
                                      • S [email protected]

                                        Here's my problem: every F(L)OSS and E2EE solution that I know of requires other people to download an app or log in.

                                        I want to reduce the friction for others to communicate for me. I want to give a business card with a URL where people can go and immediately send messages to my Matrix or my email or something, and they don't need to log in at all.

                                        They just open their browser, go to snek_boi.io or whatever and a chat appears.

                                        A couple of years ago, I was suggested Cactus Comments. I suppose that works, but I was wondering if there are other solutions. I was wondering if now there was an even easier solution for my purposes.

                                        G This user is from outside of this forum
                                        G This user is from outside of this forum
                                        [email protected]
                                        wrote on last edited by
                                        #23

                                        out of interest, do you actually mean no login, or do you mean no email-verified login?

                                        S 1 Reply Last reply
                                        0
                                        • M [email protected]

                                          I don't know yet. It's more a thought experiment than anything else.

                                          https://github.com/muke1908/chat-e2ee

                                          Looks like the URL is part of the seed and salt which is cool.

                                          Proving who you are is done in another stream. Like MFA.

                                          You do a one time pad, generate the URL with that. Communicate what's needed, then the URL dies.

                                          I'm still noodling with it.

                                          G This user is from outside of this forum
                                          G This user is from outside of this forum
                                          [email protected]
                                          wrote on last edited by
                                          #24

                                          cool, sounds like you have most of the principles down.

                                          what i didn't yet see articulated with chat-e2ee is how the actual code itself verifies itself to the user in the browser? it sounds to me like it assumes the server which serves the code is 'trusted', while the theoretically different server(s) which transmits the messages can be 'untrusted'.

                                          M 1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups