Hi there.

Research on security and privacy.

Identifying Secure Software

A lot of people ask, “How do I know if an app is secure?” So, I decided to compile all the best practices developers should be following, so the end user could determine if their app is taking security seriously. Feel free to suggest any improvements here. Android Fewer permissions (shouldn’t access resources it doesn’t need). Provides hashes for releases for integrity checks; releases should also be signed by the developer’s private key and then share its public public key to verify the signature for authenticity....

April 1, 2024 · 2 min · Jermanuts

Fully Encrypted Protocols (FEP) Overview

Obfuscation methods V2Ray, Trojan-GFW, ShadowSocks, Obfsproxy These methods strive to achieve something in common which is making it difficult for firewalls to differantiate the internet traffic, which are useful for countries that uses sophisticated deep packet inspection (DPI) such as China, Vietnam, Iran, Egypt, Russia and Uzbekistan. V2Ray V2ray/V2fly is a multi-protocol proxy server and client (Framework). It can encapsulate any protocol into any other, as well as build protocol/proxy chains....

October 2, 2023 · 5 min · Jermanuts