agl / pond
Pond
☆911Updated 3 years ago
Alternatives and similar repositories for pond:
Users that are interested in pond are comparing it to the libraries listed below
- OZ: a sandboxing system targeting everyday workstation applications☆436Updated 7 years ago
- An XMPP client with OTR support☆365Updated 3 years ago
- Noise Specification☆454Updated 6 years ago
- Double Ratchet Algorithm☆375Updated 9 years ago
- opmsg message encryption☆753Updated 2 years ago
- ☆781Updated 7 years ago
- Provably Anonymous Overlay☆324Updated 10 years ago
- Encrypted peer-to-peer web application platform for decentralized, privacy-preserving applications☆1,148Updated 9 years ago
- Memory-hard scheme Argon2☆204Updated 4 years ago
- OnionBalance provides load-balancing and redundancy for Tor hidden services☆273Updated 5 years ago
- The DIME resolver library and command line utilities.☆414Updated last year
- Quantum Insert detector/recorder☆307Updated 5 years ago
- Use OpenPGP-based encryption in Yahoo mail.☆221Updated 8 years ago
- A library for off-the-record (deniable authenticated forward secure confidential) multiparty messaging☆404Updated 7 years ago
- Configuration to use gpg smartcards for ssh authentication☆158Updated 7 years ago
- A public database for software and firmware hashes☆214Updated 8 years ago
- Deprecated - MIG Memory Forensic library☆386Updated 3 years ago
- GPG Sync is designed to let users always have up-to-date public keys for other members of their organization☆348Updated 2 years ago
- PGP-like encryption + torrent-like addressing + blockchain-like enforcement of data expiry☆123Updated 7 years ago
- INTERLOCK - file encryption and HSM front-end☆302Updated 2 weeks ago
- Run a script when one or more sensors fail.☆874Updated 8 years ago
- Cross-platform GUI for the Tarsnap backup service.☆252Updated 5 months ago
- TextSecure client package for Go☆129Updated 5 years ago
- duraconf - A collection of hardened configuration files for SSL/TLS services☆974Updated 2 years ago
- Best Current Practices regarding secure online communication and configuration of services using cryptography.☆704Updated 3 years ago
- netcat that takes unfair advantage of traffic shaping systems that don't initially ratelimit☆2Updated 4 years ago
- ☆88Updated 9 years ago
- WARNING: Deprecated! See Privacy Pass☆98Updated 8 years ago
- ☆307Updated 2 years ago
- A Password hash storage scheme that prevents an attacker from cracking passwords individually and efficiently.☆323Updated 7 years ago