Muterra / doc-golixLinks
PGP-like encryption + torrent-like addressing + blockchain-like enforcement of data expiry
☆122Updated 8 years ago
Alternatives and similar repositories for doc-golix
Users that are interested in doc-golix are comparing it to the libraries listed below
Sorting:
- Pretty Curved Privacy☆122Updated 7 years ago
- SC4 - Strong Crypto for Mere Mortals☆122Updated 3 years ago
- serverless, encrypted, NAT-breaking p2p connections - DEPRECATED☆264Updated 4 years ago
- Provably Anonymous Overlay☆324Updated 10 years ago
- A tool to create web frontends to introspect, administer, and deploy mesh networks☆29Updated 10 years ago
- Securely locate peers without central servers☆152Updated 8 years ago
- Tools and ideas to help with PGP keys and fingerprint verification☆58Updated last year
- As a proof-of-concept, we will show how easy it is to revoke a self-signed certificate using the bitcoin blockchain. This will also demon…☆121Updated 10 years ago
- A public database for software and firmware hashes☆215Updated 8 years ago
- netcat that takes unfair advantage of traffic shaping systems that don't initially ratelimit☆2Updated 4 years ago
- aims to distribute the DNS service on many nodes so it can neither be taken down nor be manipulated☆250Updated 11 years ago
- 🔒 Simple perfect xor encryption cipher 🔒☆62Updated 8 years ago
- chkboot is a tool to help detect changes to an unencrypted /boot partition.☆148Updated 4 years ago
- Programmable Dropbox for secure IoT☆70Updated 8 years ago
- A multi-transaction protocol for storing data in the Bitcoin blockchain.☆55Updated 9 years ago
- Like Cloudapp using IPFS☆126Updated 8 years ago
- A library for off-the-record (deniable authenticated forward secure confidential) multiparty messaging☆404Updated 7 years ago
- Replicating Encrypted PasteBin☆75Updated 8 years ago
- Double Ratchet Algorithm☆377Updated 9 years ago
- ☆89Updated 9 years ago
- Chair and the Key☆64Updated 9 years ago
- Next-generation bcrypt, scrypt, pbkdf2☆114Updated 9 years ago
- ZeroDB server and client-side example of using it☆136Updated 8 years ago
- A Password hash storage scheme that prevents an attacker from cracking passwords individually and efficiently.☆323Updated 8 years ago
- Peer-to-peer IPv6 networking, secure and near-zero-conf.☆152Updated 8 years ago
- A python implementation of the Axolotl ratchet protocol.☆71Updated 7 years ago
- Open source water generation☆46Updated 9 years ago
- The read/write client for a distributed peer-to-peer network of (social) data☆60Updated 9 years ago
- Open Database of Firmware Test Results☆150Updated 9 years ago
- Noise Specification☆455Updated 6 years ago