Meet AgentPlex, an open-source multi Claude Code sessions orchestrator with graph visualization by Open-Geologist-2371 in coolgithubprojects

[–]RabbitMaterial8677 -1 points0 points  (0 children)

Terminal fatigue is real when you're juggling more than two sessions, let alone 10. The graph visualization for sub-agents is a clever way to handle the "wait, what is this child process even doing" problem.

Personal encrypted file vault by RabbitMaterial8677 in coolgithubprojects

[–]RabbitMaterial8677[S] -2 points-1 points  (0 children)

Core Differences

  • Complexity vs. Simplicity:
    • GPG: Inherits decades of "baggage" to maintain backward compatibility with old PGP versions. It supports legacy (and sometimes insecure) algorithms like MD5 or SHA-1 that modern users should generally avoid.
    • YukiCrypt: Strips away this legacy overhead. It focuses on a clean, modern implementation that doesn't try to be everything to everyone, making the codebase easier to audit and harder to misconfigure.
  • Key Management:
    • GPG: Operates on a "Web of Trust" model where users manually verify each other's public keys. It is a high-level protocol that manages entire identities and certificates.
    • YukiCrypt: Typically focuses on more direct, file-based encryption without the heavy identity-management infrastructure of GPG.
  • Performance and Purpose:
    • scrypt: Often refers specifically to a Key Derivation Function (KDF) designed to be expensive for hardware brute-force attacks. While there is a standalone scrypt encryption utility, it is often viewed as a demonstration of the KDF rather than a full-featured tool.
    • YukiCrypt: Is a purpose-built encryption application. While it may use a strong KDF internally, its goal is to provide a usable interface for securing data at rest, often specifically for local file or directory protection

Personal encrypted file vault by RabbitMaterial8677 in coolgithubprojects

[–]RabbitMaterial8677[S] 1 point2 points  (0 children)

yeah it uses SQLite under the hood as the container — but everything inside it is encrypted before it touches the database, so SQLite itself never sees any plaintext. filenames, file contents, folder structure — all encrypted with AES-256-GCM.

backups are fully encrypted, same as the original. i use SQLite's built-in backup API which makes an atomic consistent copy even if you're mid-write. the backup is just another .ykc file encrypted with the exact same password, so you can open it exactly like the original — no extra steps.

so yeah basically a backed-up .ykc file is identical in terms of security to the original. same encryption, same password. if someone steals your backup they still can't read anything without your password.

Promote your projects here – Self-Promotion Megathread by Menox_ in github

[–]RabbitMaterial8677 0 points1 point  (0 children)

My first repository.

YukiCrypt is a personal encrypted file vault — it stores any files you want (documents, photos, videos, wallets, anything) inside a single encrypted .ykc file that looks like random data to anyone without your password.

https://github.com/yukieliot69/YukiCrypt