/openfaux-client

Browser add-on for encrypting and masking internet traffic.

Primary LanguageJavaScriptGNU Affero General Public License v3.0AGPL-3.0

OpenFaux

Browser add-on for encrypting and masking internet traffic.

Our mission is to advance the security of the internet and privacy for all online users. To begin fulfulling our mission, we've began working on OpenFaux. OpenFaux is an open source browser add-on for encrypting and masking internet traffic.

For more information, please see https://www.openfaux.org

Warning: OpenFaux is experimental, early-stage software. There may be flaws.

Problem

One of the most prevalent issues today is protecting our internet activity from being obtained by outsiders. Defending yourself from being a victim of MITM Attacks, Network Sniffing, Nosy ISPs, Employers, Network Administrators, Systems Administrators, Internet Censorship and Surveillance seems like an impossible, everlasting chain of threats that everyone online faces. OpenFaux solves these problems by utilizing and innovating on some of the most complex internet technologies.

Use Case

  • John the Journalist is at his local coffee shop and needs to send a very sensitive email over their Wi-Fi network. OpenFaux allows him to send an email over Gmail.com, but to someone sniffing the network it would look as if he’s simply doing a Google search.

Features

  • Data Obfuscation - OpenFaux masks your real data with benign data, misleading outsiders looking in.
  • Encryption - OpenFaux adds an additional layer of security by encrypting the benign data.
  • Hide IP - By routing your data through servers of your choice, your IP Address is masked.
  • Simplicity - No manual configuration. UI has been simplified to one-click.
  • Free - Free software allows for accessibility and aligns with our mission.

Flowchart

OpenFaux

Software Stack

  • Server-Side
    • Python
  • Client-Side
    • HTML
    • CSS
    • JavaScript
      • AJAX
      • jQuery
  • Website
    • HTML
    • CSS
    • JavaScript
    • Foundation

Contributing

  1. Fork it
  2. Create your feature branch (git checkout -b my-new-feature)
  3. Commit your changes (git commit -am 'Added some feature')
  4. Push to the branch (git push origin my-new-feature)
  5. Create new Pull Request

Bug Tracker

Found a bug? Report it here!

Feature Request

Have an idea? Add it here!

FAQs

  • OpenFaux vs Proxy - Proxies just mask your IP.

  • OpenFaux vs SSL/TLS - SSL/TLS is an encryption standard that we are utilizing.

  • OpenFaux vs Tor - Tor is a network of proxies used for masking your IP. Anyone can host a server and join their network.

  • OpenFaux vs VPN - VPNs (Virtual Private Networks), have you login (private) and enable you to have access to all of the network's resources, including their internet. VPNs have added security measures in place that are used in the connection (tunneling) process and "mask" your IP in a way, but it's a private network so they can see who owns the network then there's records of all of the members so it can be traced back to you.

Additionally, recent news states that SSL/TLS, HTTPS, SSH, VPN, PGP, AES, Encrypted VoIP, and 4G technologies have been broken (even Tor and L2TP/IPSec potentially being compromised).

Article Citations: The Guardian | The New York Times | USA TODAY | InformationWeek | ExtremeTech | ZDNet | ZDNet

Contact

Twitter: @OpenFaux

Email: nbernard[at]openfaux.org

IRC: irc.openfaux.org:6667 #Dev

License

OpenFaux is released under the GNU Affero General Public License (AGPL3).

The full license text is included in LICENSE.txt.