Georeactor / encrypted-geofenceLinks
testing out homomorphic encryption
☆39Updated 6 years ago
Alternatives and similar repositories for encrypted-geofence
Users that are interested in encrypted-geofence are comparing it to the libraries listed below
Sorting:
- Testing and visualisation tool for observations☆13Updated 7 years ago
- Baseline organizational policies and practices☆10Updated 8 years ago
- attempts to map which submarine cables are tapped and where, based on Snowden documents.☆60Updated 10 years ago
- The Digital Standard is an ambitious, community-led effort to build a framework to test and rate products and services on the basis of pr…☆135Updated 3 years ago
- Freely available cryptographic iconography☆66Updated 9 years ago
- Scripts needed to support Trackography project☆73Updated 9 years ago
- Wristband research tools☆31Updated 9 years ago
- Allow anyone with a modern browser to stream a 1GB, 10GB, 100GB, or 1TB file over the Internet and into a happy home.☆15Updated 8 years ago
- Web crawling and document processing through a usable interface.☆72Updated 8 years ago
- Resume data and scripts for managing it☆92Updated 8 years ago
- Makes generating machine-readable, digitally signed warrant canary statements simpler☆148Updated 6 years ago
- A collaborative, open legislative redistricting tool, built atop GitHub.☆26Updated 3 years ago
- Intuitive and configurable search interface for document archives.☆199Updated 6 years ago
- Every document published from the Snowden archive☆71Updated 10 years ago
- A basic analysis of aircraft suspected to be operated by the FBI for the purpose of surveillance.☆21Updated 10 years ago
- USB key cleaner☆62Updated 8 years ago
- NIST/NCCoE Mobile Threat Catalogue☆150Updated 4 months ago
- Manage and display public record requests, built by the Code for America 2013 Oakland team, maintained by @richaagarwal☆60Updated 4 years ago
- Encryption for Journalists - Hacks/Hackers NYC☆40Updated 12 years ago
- CFPB's streaming batch geocoder☆36Updated 9 years ago
- set up a ghost blog on tor in under 2 minutes☆18Updated 9 years ago
- NSA documents in machine readable form☆96Updated 7 years ago
- Pursuance: end-to-end encrypted task management optimized for large numbers of volunteers. We are building a vast and formidable ecosyste…☆139Updated 6 years ago
- Documents pertaining to internal policies and guidelines☆12Updated 8 years ago
- Anti-Shipping Activity Messages (ASAM) App for Android displays location and descriptive information about hostile acts against ships and…☆19Updated 3 years ago
- ⚠️ THIS PROJECT IS DEPRECATED ⚠️ Search your repository's git history for undesirable text patterns such as passwords, ssh keys and othe…☆96Updated 6 years ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆30Updated 8 years ago
- ☆31Updated 5 years ago
- Monitor datasets, gets alerts when something happens☆210Updated 7 years ago
- An attempt to document commonly believed misconceptions about Tor.☆14Updated 8 years ago