TransparencyToolkit / dataspec-siiLinks
Dataspec for SII
☆10Updated 9 years ago
Alternatives and similar repositories for dataspec-sii
Users that are interested in dataspec-sii are comparing it to the libraries listed below
Sorting:
- Mirror of freehaven's anonymous research bibliography☆14Updated 10 years ago
- Web crawling and document processing through a usable interface.☆72Updated 8 years ago
- Your Access To Data☆73Updated 3 years ago
- Every document published from the Snowden archive☆73Updated 10 years ago
- secure messaging, file-transfer, and directory synchronization☆41Updated 8 years ago
- Browser extension that complements the PhishDetect service☆24Updated 3 years ago
- Analysis of archived Tor relay RSA public keys☆24Updated 8 years ago
- An attempt to document commonly believed misconceptions about Tor.☆14Updated 8 years ago
- Resume data and scripts for managing it☆92Updated 9 years ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆90Updated 6 years ago
- Qubes Split GPG configuration for qubes-gpg-server over TCP☆21Updated last year
- A simple, but damn fast sinkhole☆65Updated last month
- Satellite: Measuring The Internet's Stars☆39Updated 5 years ago
- Passive Bitcoin Project☆10Updated 10 years ago
- Intuitive and configurable search interface for document archives.☆199Updated 6 years ago
- :e-mail: A simple Cypherpunk message preprocessor that makes it easy to chain Type I anonymous remailers together.☆37Updated 10 years ago
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago
- A Flask-like µFramework for Gopher☆20Updated 6 months ago
- Threat Specification Language☆28Updated 10 years ago
- Decentralised gossip driven data sharing for the 21st century.☆60Updated 2 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 11 years ago
- Password manager for USB Armory☆37Updated 10 years ago
- Standalone VPN/Tor WiFi router for journalists and activists☆47Updated 9 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Updated 2 years ago
- security in a box - tools and tactics for your digital security☆20Updated 10 years ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆107Updated 4 years ago
- Baseline organizational policies and practices☆10Updated 8 years ago
- An analytic technique created at the CIA, ACH helps you analyze complex situations with multiple hypotheses and countless pieces of evide…☆106Updated 14 years ago
- Tools to interact with a certificate transparency server☆23Updated 10 years ago
- Scripts needed to support Trackography project☆73Updated 10 years ago