Briar is an open-source mobile massager application with enhanced security for Android systems. It is designed to protect its users from surveillance and authority tracking.
With Briar, you don't need to worry about messages encryption as it uses a peer-to-peer encryption for all messages and forums.
The app can work seamlessly even with or without internet as it can sync the messages between devices using Bluetooth, Wi-Fi or Tor network.
Using Briar messenger you don't need to worry about denial of service, metadata surveillance, message/ content surveillance, takedown and internet blackouts.
Currently, the application works in the background, and asks for some permission to run as camera access, location access and Bluetooth access.
Briar application is an ideal solution for activists, journalists and whistleblowers who want a secure messenger without server footprint.
The application is available for download in Google Play Store, and F-Droid as many may prefer another mean to install the app security for a reliable source.
Briar is packed by a strong community of developers, activists, enthusiasts and privacy activists. So, there is no need to worry about it shutting down or selling the data to a third party.
The project is governed by a voluntary board of activists, developers, and software engineers.
What is ARP protocol?
ARP protocol (Address Resolution Protocol) is a protocol that provides addresses and other information for network devices. It is commonly used in routers, switches, and other network components.
The ARP protocol works by creating a mapping between the IP address of a device on the network
Introduction to Blocky!
Blocky is an open-source local network DNS proxy and ad-blocker developed in Go. Its features include the blocking of DNS queries with external lists for ad-blocking and malware protection, as well as the allowance of whitelisting. It allows the definition of allow/denylists per client group, such
What is Pi.Alert?
Pi.Alert is a comprehensive WIFI and LAN intruder detector equipped with web service monitoring for enhanced security and efficiency.
This powerful tool conducts regular scans on all the devices that are connected to your WIFI or LAN. It meticulously records the identities of all known
Digitalization is ongoing since many decades in a lot of healthcare institutions. The more digitized a healthcare institution is, the more services and quality it can be provided to patients.
This, however, means that medical data and transactions which once were offline, are now possibly accessible from anywhere on Earth.
Anonymous chat apps are applications that allow users to communicate with others without revealing their identity. They offer users the ability to engage in real-time conversations while maintaining their privacy.
Use-cases of Anonymous chat apps
These applications are used in various scenarios. For instance, they can be used for online
In a major cybersecurity incident, an alleged database containing personal information of 85 million Egyptian citizens is reportedly up for sale on a hacking forum. The threat actor claims the database includes sensitive data such as National Identification numbers, full names, family information, mother's names, insurance numbers, and
In the dynamic world of web application security, SQL injection continues to be a dominant threat. Fear not, an abundance of open-source SQL injection tools stands ready to counter this menace.
Equipped with diverse functionalities, these tools are designed to pinpoint and attack vulnerabilities, guaranteeing the unassailable strength of your
A web application vulnerability scanner is an expertly crafted software program, engineered to methodically scan web applications for security vulnerabilities.
It operates with precision, simulating attacks and meticulously observing the application's response to pinpoint potential weak points with absolute certainty.
The scanner isn't just helpful, it&
RapidScan is a free and open-source multi-tool web app vulnerability scanner, that allows pentesters, web developers and ethical hackers looks for bugs, and security issues in any web app.
It is written using Python and can be installed on any system either from source using Python or using Docker.
Features