This project is currently in a very early stage of development. Kando is not yet a functional menu but rather a prototype which demonstrates the feasibility of the concept.
Since Kando is still in early development, it might be a good idea to look at the Gnome Extension Fly-Pie. It’s from the same developer and it looks like Kando will be similar.
simplex seems to check all boxes for respecting privacy. it doesnt rely on using any identity (no strong selectors like email addresses or phone number). seems very forward-thinking in its concepts.
there is now a discovery mechanism of some sort… but otherwise it’s a feature and not a bug that you can only identify people whom you had an initial exchange with. much preferable than something that Signal that without asking (and without opting out?) will by default access all your contacts and match them through the use of a strong selector (phone number) also:
i think with the minimal knowledge the server has of its users (and the no-identity concept) this really limits risk. Also it means that for the most tight of security models, one can use their own server (which is not feasible with most other chat protocols)
Its pretty nice. I am using it for a couple groups. It has some screen reader accessibility issues, but the devs are responsive and fix them as i find them.
been selfhosting the smtp relay and using the app for quite a while. If you use it as a private chat for sensitive content, it is PERFECT. Really looking forward to its future development in group chats.
npm means it’s a JS app running on a JS runtime, which is roughly similar to what python does. Electron runs on top of the runtime and indeed provides some kind of stripped down browser.
But yeah, in this case the app does use electron :)
Firejail has some big security flaws. There us bubblejail, which uses the way better bubblewrap also used for Flatpaks.
But the Bubblewrap and Flatpak Situation is quite complex. Flatpaks, as well as Podman containers, require user namespaces. Through these namespaces programs can get privileged access to system components, which is why secureblue now has bubblewrap-suid installed.
bubblejail maybe uses that binary already, or it needs to be patched too.
To add to this systemd can do everything they can. You can isolate network, do fire-walling, and sandboxing pretty easily. Any OCI container can be used too if you don’t want to install something too.
github.com
Oldest