X-Ryl669 / FrostLinks
A backup program that does deduplication, compression, encryption
☆28Updated 5 years ago
Alternatives and similar repositories for Frost
Users that are interested in Frost are comparing it to the libraries listed below
Sorting:
- Encrypted, compressed, distributed backups☆27Updated 10 years ago
- salty privacy☆52Updated 5 years ago
- tox dns server☆43Updated 10 years ago
- Encrypted, taggable, searchable cloud storage. Unveiled at DEF CON 23☆211Updated last month
- paxrat is a utility to set PaX flags on a set of binaries.☆34Updated 7 years ago
- Protected E-mail Headers☆73Updated 5 years ago
- ☆91Updated 2 years ago
- NameCoin-style names using consensus instead of proof of work☆100Updated 7 years ago
- Build and user tools for the Gitian project☆22Updated 4 years ago
- (Deprecated PoC) Innovative censorship evading technology based on p2p distributed caching network☆58Updated 9 years ago
- A python implementation of the Axolotl ratchet protocol.☆71Updated 8 years ago
- Encrypted backups (without the backups)☆121Updated 11 years ago
- search, dedupe, and media ingestion for mediachain☆32Updated 9 years ago
- OpenSSL library interposer to make existing binary software use more secure TLS protocol variants☆38Updated 10 years ago
- Recover files using lists of blocks hashes, bypassing the File System entirely☆50Updated 6 years ago
- CPGB is the Curve Privacy Guard B, a secure replacement for GPG using ECC.☆24Updated 14 years ago
- Totally Isolated TLS Unwrapping Server☆110Updated 5 years ago
- Replicating Encrypted PasteBin☆75Updated 8 years ago
- Re-decentralize email. Make it secure. Make it simple. Make it yours.☆49Updated 11 years ago
- Tools and ideas to help with PGP keys and fingerprint verification☆58Updated 2 years ago
- Asynchronous Filesystem Replication☆280Updated 4 years ago
- Toxmail Client☆45Updated 11 years ago
- Decentralized, trustless backup tool☆92Updated 7 years ago
- A privacy-preserving contact discovery server☆51Updated 10 years ago
- Secure multi-party cloud backup solution based on Shamir's Secret Sharing scheme.☆29Updated 9 years ago
- Cluster management☆79Updated 5 years ago
- Stupid simple password safe☆38Updated 6 years ago
- Certbot plugin that uses an external shell script for domain validation☆50Updated 8 years ago
- The Awareness Hub for the Internet of Things☆169Updated last year
- Easy creation of Tor Hidden Services☆39Updated 10 years ago