Skip to content

Releases: Dangerous-Community/Dangerous-net

1.1.1 Functionality Update

12 Dec 02:28
18f4d2c
Compare
Choose a tag to compare

Multi Level encryption Update

Set encryption levels, improved logging

  1. Set your complexity requirements and desired encryption level.

    • Easy
    • Medium
    • Hard
  2. The desired encryption level is also stored in the CID log. See below:

image

  1. CID LOG BELOW:

image

[arch@archlinux IPFSS_IPFS-Secure]$ gpg --verify dangerous-net.asc dangerous-net && sha256sum dangerous-net
gpg: Signature made Tue 12 Dec 2023 12:27:15 PM AEST
gpg:                using RSA key 2A13DB3A3030F0A898B1C63203AB6B252595802B
gpg: Good signature from "Anthony Grace (satunix.eth) <[email protected]>" [ultimate]
87be00b413b9ca30135bd012d16c962b946fa61a3f2c48e9ce2f3c4412f774e8  dangerous-net
[arch@archlinux IPFSS_IPFS-Secure]$ 

1.1.0

07 Dec 05:44
880c1be
Compare
Choose a tag to compare

V1.10 FUNCTIONALITY UPDATE

Lots of changes:

  1. Got some bug spray

  2. Colorful terminals

  3. Fixed some issues between branch 1.0.8 and 1.0.7

    • Such as no connection test, incorrect menu etc
    • Went straight to 1.1, lots of changes offline, submitting now.
  4. The loading screen is horrible, does not work well in go but i spent so much time trying to get one to work in go.

[anthony@archlinux IPFSS_IPFS-Secure]$ gpg --verify IPFSS_IPFS-Secure.asc IPFSS_IPFS-Secure && sha256sum IPFSS_IPFS-Secure
gpg: Signature made Thu 07 Dec 2023 03:37:18 PM AEST
gpg:                using EDDSA key 44ABFF44CCBEB434D6B251F5CC1A9655CF7C8F0B
gpg: Good signature from "Anthony Grace (satunix.eth) <[email protected]>" [ultimate]
0200c94601650d289077cd84898cef847d5a498465bca57569f5cf0b4b1e2f20  IPFSS_IPFS-Secure
[anthony@archlinux IPFSS_IPFS-Secure]$ 

Message to the community.

Enjoy the new update everyone :) !!

This ones a lot of smoothing out the imperfections, adding in color and animations. Still a long way to go before it can hold its own, though it is usable.

  • Love from the Dangerous Things community, happy hacking

Have a look at the new menu below !

  1. Detailing new functions:
    • Install dependencies
    • Install Keycard onto Implant / JavaCard
    • *Etc... *

Screenshot_20231207_155245


1.0.7 FUNCTIONALITY UPDATE

23 Nov 03:47
1dbb54f
Compare
Choose a tag to compare

Functionality Update 1.0.7

Added a testing option in the menu.
Runs IPFS system diagnostic.
Downloads and prints welcome image to terminal.

  • Dependency:
  • viu (image viewer)
[arch@archlinux IPFSS_IPFS-Secure]$ gpg --verify IPFSS_IPFS-Secure.sig IPFSS_IPFS-Secure && sha256sum IPFSS_IPFS-Secure && echo "1.0.7 FUNCTIONALITY UPDATE 
> "
gpg: Signature made Thu 23 Nov 2023 01:43:49 PM AEST
gpg:                using RSA key 2A13DB3A3030F0A898B1C63203AB6B252595802B
gpg: Good signature from "Anthony Grace (satunix.eth) <[email protected]>" [ultimate]
0cdcc4a86d8c64ebc9ca2751a6292120a920080267a680eaa2c1c5c7988981ff  IPFSS_IPFS-Secure
1.0.7 FUNCTIONALITY UPDATE 


1.0.6 SECURITY UPDATE

23 Nov 01:20
c222d90
Compare
Choose a tag to compare

Improving the encryption method used in the program.

  • Now using PBKDF2 key gen
  • AES256 encryption against uploaded files on IPFS.
    Determinate via printing the 3 word salt used.

New usage:

  1. Scan Keycard
  2. Input passphrase
  3. Write down the random three words

To decrypt:

  1. Scan Keycard
  2. Input passphrase
  3. Input the three random words used against that file.

This salting forces randomization and minimises the risk of two files using the same key.
It also reduces the risk of sensitive data being leaked against the bash history and process history.
All encryption is done "In house"

[anthony@archlinux IPFSS_IPFS-Secure]$ gpg --verify signature.asc IPFSS_IPFS-Secure && sha256sum IPFSS_IPFS-Secure && echo "VERSION 1.0.6 SECURITY UPDATE" 
gpg: Signature made Thu 23 Nov 2023 11:14:00 AM AEST
gpg:                using EDDSA key 44ABFF44CCBEB434D6B251F5CC1A9655CF7C8F0B
gpg: Good signature from "Anthony Grace (satunix.eth) <[email protected]>" [ultimate]
d46d9c33beb328f3700c5e8158e2d9178c31fe235dba2938f71681467c515142  IPFSS_IPFS-Secure
VERSION 1.0.6 SECURITY UPDATE

1.0.5 Functionality Update

22 Nov 03:57
9d8e80b
Compare
Choose a tag to compare

Improved logging functionality.

  • You can now bulk import CID's using the previous log file in the directory. (created on encryption)
  • You can also transfer the text data of this log to a smartphone using the inbuilt QR code generator

1.0.5 Functionality update SHA256 hash:

[arch@archlinux IPFSS_IPFS-Secure]$ sha256sum IPFSS_IPFS-Secure
aa4c8a3a8a9661b1cdb3444ea3f5cd7dd8e17a38b1452feb335f3e8ee019a68e  IPFSS_IPFS-Secure

1.0.4 Security Update

22 Nov 00:28
1a343ea
Compare
Choose a tag to compare

Fixed an issue where the seed KDF would be printed to console.
Also the way the seed KDF was generated was not secure enough.
Now using byte slices and hashing for the two sections of the KDF for keygen.
Another security update coming in future to handle all cryptography in the app. Removing the GPG dependency.

1.0.3

21 Nov 04:56
8437582
Compare
Choose a tag to compare

Changed directory structure.
Changed dependencies.

1.0.2

21 Nov 01:56
4426ffb
Compare
Choose a tag to compare

Added more verbosity and some ascii art.
Added more descriptive error messages,

Note if you get exit satus 1 when scanning, you probablly have an issue with your PCSCD or PCSC reader. make sure it is running nad plugged in, may need to unplug / plug in again as this solved my issues :)

1.0.1

20 Nov 23:14
bac5605
Compare
Choose a tag to compare

Working release now, run as normal user in linux, (must have a kubo node on your machine)

Current improvements:

  • Fixed GPG file path error from version 1.0.0
  • Added more verbosity for the user "ask to scan card when needed"

Fixes and improvements for future:

  • Add more verbosity / animations for the usability
  • Add more verbosity in the errors instead of just the standard "usage" error

1.0.0

20 Nov 07:41
57c5e3b
Compare
Choose a tag to compare

Version 1 outline.
Working binary, submit issues, fork and create pull requests if you want to add your developments to main.