Georeactor / encrypted-geofence
testing out homomorphic encryption
☆38Updated 6 years ago
Alternatives and similar repositories for encrypted-geofence:
Users that are interested in encrypted-geofence are comparing it to the libraries listed below
- Freely available cryptographic iconography☆66Updated 8 years ago
- Wristband research tools☆31Updated 8 years ago
- A resource which illustrates how surveillance is being carried out around the world.☆18Updated 9 years ago
- FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Re…☆12Updated 2 years ago
- Baseline organizational policies and practices☆10Updated 8 years ago
- Security and Privacy Assurance Research Test and Assessment (SPARTA) tool suite☆37Updated 7 years ago
- Satellite: Measuring The Internet's Stars☆38Updated 4 years ago
- An Implementation of the Fully Homomorphic Smart-Vercauteren Cryptosystem☆44Updated 9 years ago
- attempts to map which submarine cables are tapped and where, based on Snowden documents.☆60Updated 10 years ago
- Advices to look for malicious software on your devices☆17Updated 4 years ago
- This is where we work on the newsletter☆28Updated 7 years ago
- Basic script for monitoring new posts on Pastebin for keywords☆12Updated 8 years ago
- A python library that implements a number of Privacy Enhancing Technolgies☆132Updated 2 years ago
- Testing and visualisation tool for observations☆13Updated 6 years ago
- ☆198Updated 9 years ago
- Allow anyone with a modern browser to stream a 1GB, 10GB, 100GB, or 1TB file over the Internet and into a happy home.☆15Updated 7 years ago
- Documents pertaining to internal policies and guidelines☆12Updated 8 years ago
- security in a box - tools and tactics for your digital security☆19Updated 9 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- Top Level Domain data☆65Updated 5 years ago
- Privacy-preserving Tor statistics aggregation tool that implements the secret-sharing variant of the PrivEx algorithm.☆26Updated 4 years ago
- Replaced with Foreman + Puppet to not reinvent the wheel.☆9Updated 8 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆14Updated 2 years ago
- An attempt to document commonly believed misconceptions about Tor.☆14Updated 7 years ago
- free crypto audit☆31Updated 8 years ago
- A user-first approach to threat modeling.☆16Updated 5 years ago
- Every document published from the Snowden archive☆68Updated 10 years ago
- Inside hundreds of surveillance experiments along the US-Mexico border☆127Updated 5 years ago
- Web crawling and document processing through a usable interface.☆71Updated 7 years ago
- Code release for: Cookies that give you away: The surveillance implications of web tracking☆53Updated 6 years ago